Namnesh Network+
Namnesh Network+
BY:-NAMNESH
CompTIA
Network+ 11. TCP & UDP with Protocols & Ports
Syllabus 12. IP Address Fully Explained
13. Subnetting Fully Explained
• CompTIA N+ Scope, Salary & Certification
• What is Network & Networking 14. Networking Services (DNS, DHCP like)
• Types of Networks Explained
• Types of Topologies in Network
15. Routing Protocols Explained
• Types of Networking Devices 16. WAN Technology Fully Explained
• Types of Connectors, Ports & Wires
• Wireless, Wires & Cables Standard 17. Remote Protocols & Services
• Threats & Shields of a Network
18. Networking Tools & Safety
• OSI Model Fully Explained
• TCP/IP Model Fully Explained 19. Network Threats & Attacks
20. All about Network Security
CompTIA
Network+
Syllabus
CompTIA
wireless networks found in companies around the world.
CompTIA Network+ certifies a professional-level understanding
of emerging technologies, including cloud and virtualization
technologies.
Certificati
•It also sets you up for success with Cisco’s Cisco Certified
Network Associate (CCNA) certification training, Juniper’s
Juniper Networks Certified Associate – Junos (JNCA-Junos)
certification, and more. You will have to take an exam that will
have up to 90 questions and get a minimum score of 720 out of
on?
900. The certification exam must be completed in 90 minutes. It
will consist of a mix of performance-based (simulations) and
multiple-choice questions. The exam is challenging but not so
difficult that it can’t be attained by most people.
CompTIA A+
Certification jobs
•CompTIA Network+ is for professionals
with the recommended prerequisite of
Network administrator CompTIA Network+ certification and nine
months of networking experience looking
Network field technician develop their networking careers. CompTIA
Network+ prepares candidates for the
Junior network administrator following job roles:
IT consultant
Network field engineer
Computer technician
Help desk technician
System engineer
Network support specialist
Network analyst
Why • Better Future Ahead
this •
•
Great Opportunities
Demanding Skill
Course
• Network Admininstrator
• First Step to Security
• Medium Salary Packages
?
Best book to
self-study for
the Network+
exam?
2. What is Network
& Networking
What is Network ?
• A network consists of two or more computers
that are linked in order to share resources (such as
printers and CDs), exchange files, or allow
electronic communications.
• Cost-effective
• Wireless, versus cable
• Multidepartment network access
Metropolitan
Area Network
(MAN)
• A metropolitan area network (MAN) is a large computer network that
usually spans a city or a large campus.
• A MAN is optimized for a larger geographical area than a LAN,
ranging
• from several blocks of buildings to entire cities.
• A MAN might be owned and operated by a single organization, but it
usually will be used by many individuals and organizations.
• A MAN often acts as a high speed network to allow sharing of
regional
• resources.
• A MAN typically covers an area of between 5 and 50 km
diameter.
• Examples of MAN: Telephone company network that provides a
high
• speed DSL to customers and cable TV network.
Wide Area
Network
(WAN)
WAN covers a large geographic area such as country, continent or
even whole of the world.
A WAN is two or more LANs connected together. The LANs can
be many miles apart.
To cover great distances, WANs may transmit data over leased
high-speed phone lines or wireless links such as satellites.
Multiple LANs can be connected together using devices such as
bridges, routers, or gateways, which enable them to share data.
The world's most popular WAN is the Internet.
4. Types of
Topologies
in Network
Topology
• Topology refers to the layout of connected devices on a network.
• Here, some logical layout of topology.
• Mesh
• Star
• Ring
• Line
• Bus
• Tree
• Hybrid
Network Topology
• Here every device has a point to point link to
every other device.
Advantages:
• They use dedicated links so each
link can only carry its own data
Topology
• It is robust. If any one link get
damaged it cannot affect others.
Here one long cable act as a backbone to link all the devices
are connected to the backbone by drop lines and taps.
Drop line- is the connection b/w the devices and the cable.
1. NIC Card
2. Repeater
3. Hub
4. Bridge
5. Switch
6. Gateway
7. Router
8. Modem
•It stands for Network Interface
Controller. NIC used to connect the
NIC or ethernet cable (RJ-45 Connector)
with the PC. It is a Card which have
Network Mac Address written on it.
Card •Components of NIC :-
• Transmission media is a
pathway that carries the information
from sender to receiver.
• Data is transmitted
normally through
electrical or
• electromagnetic signals.
Description
• Transmission media are located below the physical layer
• For local area networks (LAN) • Easy to work with• Short range
Twisted Pair
Cables
Twisted Pair cables
Unshielded Shielded
Twisted Pair Twisted pair
(UTP) (STP)
Unshielded
Twiste • Pair of unshielded wires wound
around each other
• DSL lines
Crimping Tool
Advantages of UTP:
Affordable
Most compatible cabling
Major networking system
Disadvantages of UTP:
Disadvantages of
STP:
More expensive
than UTP
High attenuation
rate
What are RJ connectors?
RJ Connectors are a family of push-and-click connectors for twisted-pair wiring in telephone
and network wiring. RJ stands for Registered Jack. RJ types define both a jack or receptacle
(female) and a plug (male) type of connector.
The most common types of RJ connectors are as follows:
BNC terminator is used at the end of the cable to prevent the reflection
of the signal
Coaxial Cable
Applications
• Most versatile medium
• Television distribution
Easy to expand
DISADVANTAGE
Nature of light:
Straight-Tip (ST)
Connecter
Areas of
Applicati
Telecommunications on
Local Area Networks
Cable TV
CCTV
Advantage Disadvantage
Greater capacity Example: Data rates at
• Installation and maintenance are
100 Gbps
Expensive
Smaller size & light weight
• Only Unidirectional light propagation
Lower attenuation
7. Wireless, Wires
& Cables Standard
Wireless transmission waves
Unguided
Media
Unguided Media
– Radio Waves
Omnidirectional Antenna
Frequencies between 3
KHz and 1 GHz.
Used for
multicasts(multiple way)
communications, such as
radio and television, and
paging system.
Radio waves can penetrate
buildings easily, so that
widely use for indoors &
outdoors communication.
Microwaves
What is Wi-Fi
Short for “Wireless Fidelity”
A trademark of the Wi-Fi Alliance
The brand name for products using the IEEE 802.11 family of
standards
Commonly used for “wireless local area network” (WLAN)
Bluetooth
Wireless Personal Area Networks (WPAN)
Design goal
Cable replacement
Low cost
Low power
Small size
For mobile devices
Standard: IEEE 802.15.1
•Wireless
Standards
Cellular
Standard
s
IEEE
Wifi Standards
IEEE
Bluetooth Standards
Wire
Standard
s
8. Network
Vulnerabili
ties
Types of Viruses
• Macro Virus
• Executable Virus
• Backdoor Virus
Macro Viruses
• Most common type of virus on campus Affect Microsoft
Office documents Written in Visual Basic for Applications
• Generally harmless with a few destructive varients
Executable Viruses
• Second most common type of virus on campus
• Written in programming languages and compiled into executable files
Backdoor Programs
Allow anyone on the internet to remotely control the infected computer
– Send and receive files
– View the screen
– Monitor all keystrokes
•Data Security is a process
of protecting files, databases,
and accounts on a network by
adopting a set of controls,
Data applications, and techniques
that identify the relative
Protection importance of different
datasets, their sensitivity,
regulatory compliance
requirements and then
applying appropriate
protections to secure those ..
9. OSI Model
OSI
MODEL
Data, Protocol & Activities
OSI Layers TCP/IP Suit Activities
Transmission medium
One of the major function of the physical layer is to move data in the form of electromagnetic
signals across a transmission medium.
Its responsible for movements of individual bits from one hop (Node) to next.
Both data and the signals can be either analog or digital.
Transmission media work by conducting energy along a physical path which
can
be wired or wireless
Physical characteristics of interface and medium (Transmission medium)
Representation of bits (stream of bits (0s or 1s) with no interpretation and encoded into signals)
Data rate (duration of a bit, which is how long it last)
Synchronization of bits (sender and receivers clock must be
synchronized) Line configuration (Point-to-Point, Point-to-Multipoint)
Physical topology
Transmission mode (Simplex, half duplex, full duplex)
LAYER
From network layer To network layer
Data link layer is responsible for moving frames from one hop (Node) to the next.
Concerned:
Framing (stream of bits into manageable data units)
Physical addressing (MAC Address)
Flow Control (mechanism for overwhelming the receiver)
Error Control (trailer, retransmission)
Access Control (defining master device in the same link)
Network Layer
From transport layer To transport layer
The network layer is responsible for the delivery of individual packets from the source
host to the destination host.
Concerned:
Logical addressing (IP Address)
Routing (Source to destination transmission between networks)
TRANSPORT
LAYER
From session layer From session layer
Transport layer H4 Data H4 Data H4 Data H4 Data H4 Data H4 Data Transport layer
Segments Segments
Application layer
Application layer
H7 Data Message H7 Data Message
IP
ICMP
ARP
Transport Layer
•IP (Internet Protocol) – used to deliver packets from the source host to the destination host
based on the IP addresses.
•ICMP (Internet Control Message Protocol) – used to detects and reports network error
conditions. Used in ping.
•UDP (User Datagram Protocol) – a connectionless protocol for data transfer. Since a session is
not created before the data transfer, there is no guarantee of data delivery.
•FTP (File Transfer Protocol) – used for file transfers from one host to another.
•DNS (Domain Name System) – used for host names to the IP address resolution.
•HTTP (Hypertext Transfer Protocol) – used to transfer files (text, graphic images, sound,
video, and other multimedia files) on the World Wide Web.
11. TCP & UDP
with Protocols
& Ports
Let’s Explore Protocols & Ports of TCP & UDP
12. IP
Address
Fully
Explained
What is IP Address?
AN IP ADDRESS BASICALLY A 32-BIT INTRODUCED BY IANA (INTERNET 32 BIT IS DIVIDED INTO 4 EQUAL PARTS EACH 8 BIT GROUP IS KNOWN BY OCTET.
ADDRESS THAT UNIQUELY UNIVERSALLY ASSIGNED NUMBERS AUTHORITY). OF 8-8 BITS SEPARATED BY DOTTED
DEFINES CONNECTION OF HOST OR A DECIMAL NOTATION. IT IS IN THE RANGE
ROUTER TO THE INTERNET. IP ADDRESS IS OF MINIMUM 0.0.0.0 TO
UNIQUE. 255.255.255.255.
•IP has five different classes differentiated by
characteristics.
Variou
• Class-A ranges from 0 to 127
• Class-B ranges from 128 to 191
• Class-C ranges from 192 to 223
s IP
• Class-D ranges from 224 to 239
• Class-E ranges from 240 to 255
• First Octet is defining the class of particular
classes
IP e.g. -
128
8
4
2
1
64
32
16
128
8
4
2
1
64
32
16
128
8
4
2
1
128
8
4
2
1
64
32
16
64
32
16
IP Addressing
32 bits
Dotted
Decimal Network Host
128
8
4
2
1
64
32
16
128
8
4
2
1
64
32
16
128
8
4
2
1
128
8
4
2
1
64
32
16
64
32
16
Example
Decimal 172 16 122 204
Example 10101100 00010000 01111010 11001100
Binary
IP Address Classes
Class E:
Research
IP Address Classes
Bits: 1 8 9 16 17 24 25 32
NNNNN
NNNNN Host
Host Host
Host Host
Host
Class A:
Range (1-126)
Bits: 1 8 9 16 17 24 25 32
NNNNNN
NNNNNN Network
Network Host
Host Host
Host
Class B:
Range (128-191)
1 8 9 16 17 24 25 32
Bits:
NNNNNN
NNNNNN Network
Network Network
Network Host
Host
Class C:
Range (192-223)
1 8 9 16 17 24 25 32
Bits:
NNNNNN
NNNNNN Multicast
Multicast Group
Group Multicast
Multicast Group
Group Multicast
Multicast Group
Group
Class D:
Range (224-239)
Determining Available Host Addresses
Network Host
172 16 0 0
N
11
9
8
7
6
5
4
3
2
1
16
15
14
13
12
10
10101100 00010000 00000000 00000000 1
00000000 00000001 2
00000000 00000011 3
...
...
...
11111111 11111101 65534
11111111 11111110 65535
11111111 11111111 65536
-
2
2N-2 = 216-2 = 65534 65534
Subnet Mask
Network Host
IP
Address
172 16 0 0
Network Host
Default
Subnet
Mask
255 255 0 0
11111111 11111111 00000000 00000000
Also written as “/16” where 16 represents the number of
1s in the mask.
Network Subnet Host
8-bit
Subnet 255 255 255 0
Mask
Also written as “/24” where 24 represents the number of
1s in the mask.
Subnet Mask without Subnets
Network Host
Network 172 16 0 0
Number
Network
Number 172 16 2 0
addresses
Solutions for dynamic assignment of IP addresses
DHCP Request
00:a0:24:71:e4:44
Sent to 255.255.255.255
Argon
128.143.137.144
00:a0:24:71:e4:44 DHCP Server
DHCP Response:
IP address: 128.143.137.144
Default gateway: 128.143.137.1
Netmask: 255.255.0.0
• BOOTstrap Protocol (BOOTP)
• From 1985
• Host can configure its IP parameters at boot
time.
• 3 services.
• IP address assignment.
• Detection of the IP address for a serving
machine.
• The name of a file to be loaded and
Argon
128.143.137.144
00:a0:24:71:e4:44 (c) DHCP Server
128.143.137.100
•Automatic Private IP
Automatic Addressing (APIPA) is a feature
in operating systems (such as
Private IP Windows) that enables
computers to automatically self-
Addressin configure an IP address and
g (APIPA) subnet mask when their DHCP
server isn’t reachable. The IP
address range for APIPA
is 169.254.0.1-169.254.255.254,
with the subnet mask
of 255.255.0.0.
Domain name is a way to identify and locate computers connected to internet
Once a domain has been established subdomains can be created within the
domain
EXAMPLE: The domain for the large company could be “Vni.com” and within this
domain subdomains can be created for each of the company’s regional office.
Eg: Bombay.vni.com
Last name.
subdomain.
second-
level
domain.
top-level
domain
EXAMPLE:
vijay.Bomba
y.vni.com
Top level domains a r e classifi ed into 3 categories:
R e v e rs e domains
It consists of t h r ee character code which indicates the primary
function of the organization or their generic behavior
Most commonly used top level domains are:
.in India
.jp Japan
.us United S tates
.fr france
.it Italy
.cn China
.au Australia
Each domain name h a s a corresponding IP a d d re s s
DEFINITION:
DNS Lookups
• Forward DNS Lookups
• Reverse DNS Lookups
NAS (Network
Attached Storage)
•A NAS system is a storage device
connected to a network that
allows storage and retrieval of
data from a centralized location
for authorized network users and
heterogeneous
clients. NAS systems are flexible
and scale-out, meaning that as
you need additional storage, you
can add on to what you have.
SAN (Storage
Area Network)
•A Storage Area Network (SAN) is a
specialized, high-
speed network that provides block-
level network access to storage.
SANs are typically composed of
hosts, switches, storage elements,
and storage devices that are
interconnected using a variety of
technologies, topologies, and
protocols.
15.
Routing
Protocols
Explained
INTER- AND INTRA-DOMAIN ROUTING
Today, an internet can be so large that one An autonomous system (AS) is a group of
routing protocol cannot handle the task of networks and routers under the authority of a
updating the routing tables of all routers. single administration. Routing inside an
autonomous system is called intra-domain routing.
For this reason, an internet is divided into
Routing between autonomous systems is called
autonomous systems. inter-domain routing
Popular routing protocols
DISTANCE VECTOR ROUTING
An autonomous system
(AS) is a group of
Today, an internet can be so large networks and routers
under the authority of a
that one routing protocol cannot single administration.
handle the task of updating the Routing inside an
routing tables of all routers. For autonomous system is
called intra-domain
this reason, an internet is divided routing. Routing
into autonomous systems. between autonomous
systems is called inter-
domain routing
RIP
In link state routing, if each node in the domain has the entire topology of
the domain—the list of nodes and links, how they are connected
including the type, cost (metric), and the condition of the links (up or
down)—the node can use the algorithm to build a routing table.
Concept of Link state routing
OSPF
The Open Shortest Path First (OSPF) protocol is an intra-domain routing protocol based on
link state routing. Its domain is also an autonomous system.
Open Shortest Path First (OSPF) is a link-state routing protocol that is used to find the best
path between the source and the destination router using its own Shortest Path First).
Areas in an autonomous system
BGP
•A digital multimeter is a
test tool used to measure
two or more electrical
values—principally voltage
(volts), current (amps) and
resistance (ohms). It is a
standard diagnostic tool for
technicians in the
electrical/electronic
industries.
19. Network
Attacks
1. Malwares
2. Phishing
3. Man-In-the-Middle
Attack
4. DDoS Attack
5. Cross-Site Scripting
6. SQL Injection Attack
Firewall
•A firewall is a network security device, either hardware or software-based, which
monitors all incoming and outgoing traffic and based on a defined set of security rules it
accepts, rejects or drops that specific traffic.
• Deployment Models
• Service Models
Deployment
Models
Deployment models define the type of access to the cloud, i.e., how the cloud is located?
Cloud can have any of the four types of access: Public, Private, Hybrid and Community.
•PRIVATE CLOUD : The Private Cloud allows systems
and services to be accessible within an organization.
It offers increased security because of its private
nature.
PUBLIC CLOUD : The
Public Cloud allows •COMMUNITY CLOUD : The Community Cloud
systems and services allows systems and services to be accessible by
group of organizations.
to be easily
accessible to the •HYBRID CLOUD : The Hybrid Cloud is mixture of
general public. Public public and private cloud. However, the critical
activities are performed using private cloud while
cloud may be less the non-critical activities are performed using
public cloud.
secure because of its
openness, e.g., e-mail.
•Service Models are the reference
models on which the Cloud Computing
is based. These can be categorized into
Service three basic service models as listed
below:
Models
1.Infrastructure as a Service (IaaS)
Many definitions /
examples:
• WiFi
• Bluetooth
• Zigbee Wireless
• NFC
• WiFi direct
• Bluetooth Low Energy
Benefits of IoT
Applications
Web
Smartphone
Users
Future?
23.
Configuring
a Switch (All
Knowledge)
Let’s
Configure
in Packet
Tracer
24. VLAN
explained
VLAN
En > show vlan > vlan database > vlan 2 name v1 > int f0/1 > switchport access vlan 2
25. User
authentic
ation
•1. API
•2. Authorization
•3. Authentication
ping 127.0.0.1
ping localhost
Firewall:
Unplug the power cable to your router and cable modem or DSL modem.
Leave the power cables disconnected for 10-15 seconds, plug in your modem again, and then plug in your router again.
Finally, turn on your computer and see if you can ping your router.
If after following the above steps, the Internet is still not working, open the Windows command line and run the below
command.
ping google.com
Additional troubleshooting:
• Another method of determining network issues is to use the tracert
command if you are a Windows user or the traceroute command if
you are a Linux or Unix variant user. This command gives you an
overview of each of the devices (routers) a packet travels (hops)
over a network. It can also give you an idea of where a problem
exists in your network or outside of your network.
tracert google.com
traceroute google.com
•Question : A Network Cable Is Unplugged
•Answer : This message appears as a Windows
desktop balloon. Several different conditions can
SOME generate this error each with their own solution,
including bad cabling or issues with the device
PROBLEM drivers.
•If your connection is wired, you may lose access to
AND the network. If on wireless, your network will
probably function normally but this error message will
PART :
•Answer : If a computer is set up with a static
Question : IP IP address that's being used by some other
device on the network, the computer (and
Address possibly also the other device) will be unable
to use the network.