0% found this document useful (0 votes)
27 views35 pages

Configure Peripheral Services

Hshs

Uploaded by

assenmasud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views35 pages

Configure Peripheral Services

Hshs

Uploaded by

assenmasud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

CONFIGURE

PERIPHERAL SERVICES
Install required software to Configure/manage local
area network
Network Peripherals
◦ A network peripheral refers to equipment which typically enables
computers to communicate each others.

◦ A local peripherals is a peripheral that can be connected to the stand


alone computer.

◦ Examples of Network peripherals include: - routers, Switches, Access


points, Network interface cards and other hardware devices.
Hub
◦ A network hub is a node that broadcasts data to every computer or
Ethernet-based device connected to it.

◦ A hub is less sophisticated than a switch, the latter of which can


isolate data transmissions to specific devices.

◦ Network hubs are best suited for small, simple local area
network environments.
Switch
◦ The Switch is a network device that is used to segment the networks
into different subnetworks called subnets or LAN segments.

◦ It is responsible for filtering and forwarding the packets between LAN


segments based on MAC address.

◦ Switches have many ports, and when data arrives at any port, the
destination address is examined first and some checks are also done
and then it is processed to the devices.
Repeater

◦ A repeater amplifies the signal it receives on one port before it transmits


it on other ports.
◦ Because the repeater does not check on the contents of the data it
receives or retransmits, frames that are corrupted by noise and other
factors can also be repeated.
◦ The development of the hub replaced the repeater for all practical
purposes, because it performs the same functions, and can include
additional features.
Routers

◦ A router is a special computer which has the ability to perform such


tasks as routing and forwarding information with use of software and
hardware.

◦ A router is used to provide connectivity across wide area network


(WAN) links and route information between two LAN segments.
Gateways

◦ The term getaway is applied to any device, system, or software


application that can perform the function of translating data from one
format to another.
Modems

◦ Modems perform a simple function: They translate digital signals from a


computer into analog signals that can travel across conventional phone lines .

◦ A modem, which stands for "modulator-demodulator," is a device connecting


your home to your internet service provider (ISP) through a physical
connection.

◦ The modem translates the data from your ISP into a format that your home
network devices can use
Network Interface Cards (NICs)

◦ NICs are the mechanisms by which computers connect to a network.

◦ NICs come in all shapes and sizes, and they come in prices to suit all
budgets.

◦ Known as network card, network adapter, and LAN adapter, etc.


Firewall

◦ A hardware or software system that is used to separate one computer


or network from another one.

◦ The most common type is used to protect a computer or an entire


network from unauthorized access from the Internet.
Configuring security and access to make use
of peripherals.
Basics of Peer to peer Network
◦ In a peer-to-peer network k, computers on the network are equal, with
each workstation providing access to resources and data.
◦ This is a simple type of network where computers are able to
communicate with one another and share what is on or attached to
their computer with other users.
Configuring peripherals to access and use
security
User Privileges
◦ Windows 10 allows providing security to files and folders; this feature
is available because of the NTFS (New Technology File System).

◦ There are different levels of security, such as read, modify, full control
etc.
Cont.…
Full control permissions include:
◦ Read
◦ Write

◦ execute
◦ delete
◦ change permissions
Cont.…
Sharing Network resources
◦ Sharing allows an object to be accessed from network. By default in
windows 10, there are some hidden shares, these shares end with a $
symbol.
◦ To view these default shares open computer management (right click on
my computer and choose manage) and select shared folders and then
shares.
◦ Most devices support access control lists. Example: printers, sharing data
using folders, and manage devices, etc
IP Networking Basics

◦ IP address is A Unique string of characters that identifies each


computer using the Internet Protocol to communicate over a network.

◦ IP addresses are classified into two main types based on version: IPv4
(Internet Protocol version 4) and IPv6 (Internet Protocol version 6).
◦ These types differ in their format and the number of bits used to
represent addresses.
IPv4 (Internet Protocol version 4)
◦ Format: IPv4 addresses are 32-bit numerical labels, typically
represented in dotted-decimal format (e.g., 192.168.0.1).
◦ Address Space: Provides approximately 4.3 billion unique addresses.
◦ Notation: Consists of four octets separated by periods (e.g.,
192.168.0.1).
◦ Common Usage: Still widely used in most networks today.
◦ Example: 192.168.1.1
IPv6 (Internet Protocol version 6)
◦ Format: IPv6 addresses are 128-bit hexadecimal numbers, separated
by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

◦ Address Space: Offers an immensely larger address space than IPv4,


allowing for virtually unlimited unique addresses.

◦ Notation: Consists of eight groups of four hexadecimal digits,


separated by colons..

◦ Example: 2001:0db8::1
IP address class

◦ IP address classes are a way to categorize IP addresses based on their


initial bits, and they were a part of the original design of the Internet
Protocol (IPv4).

◦ IP addresses are divided into five different classes, designated as Class


A, Class B, Class C, Class D, and Class E. Each class has a specific
range of IP addresses that can be assigned to networks.
IP address class…..

Class A:
◦ Range: 1.0.0.0 to 126.0.0.0
◦ Network ID: The first octet represents the network ID, and the
remaining three octets are used for host addresses.
◦ Example: 10.0.0.1
IP address class…..

Class B:
◦ Range: 128.0.0.0 to 191.255.0.0
◦ Network ID: The first two octets represent the network ID, and the
remaining two octets are used for host addresses.
◦ Example: 172.16.0.1
IP address class…..

Class C:
◦ Range: 192.0.0.0 to 223.255.255.0
◦ Network ID: The first three octets represent the network ID, and
the last octet is used for host addresses.
◦ Example: 192.168.0.1
IP address class…..

Class D:
◦ Range: 224.0.0.0 to 239.255.255.255
◦ Purpose: Class D addresses are reserved for multicast groups, which
are used for one-to-many communication.
IP address class…..
Class E:
◦ Range: 240.0.0.0 to 255.255.255.254
◦ Purpose: Class E addresses are reserved for experimental or future
use and are not used in general networking.
Class Network Portion Hosts Allowed
A from 1.0 to 127.0 approx. 16 million

B from 128.0 to 191.255 65,536

C from 192.0 to 223.255.255 255

Table 5.1: IP Address Classes


Subnet Masks

◦ A subnet mask tells a router how much of an address it should treat


as the network portion. The masks for traditional Class A, B and C
networks.
Class Subnet Mask
A 255.0.0.0

B 255.255.0.0

C 255.255.255.0

Table 5.2: Standard IP Subnets


Thank You

You might also like