0% found this document useful (0 votes)
343 views263 pages

CompTIA Network+

The CompTIA Network+ course provides comprehensive training on networking concepts, devices, and security, preparing candidates for various IT roles. It covers topics such as network types, topologies, protocols, and troubleshooting, along with the necessary skills for obtaining the CompTIA Network+ certification. This certification validates the ability to manage and troubleshoot both wired and wireless networks, enhancing career opportunities in the IT field.

Uploaded by

XEOZ AMAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
343 views263 pages

CompTIA Network+

The CompTIA Network+ course provides comprehensive training on networking concepts, devices, and security, preparing candidates for various IT roles. It covers topics such as network types, topologies, protocols, and troubleshooting, along with the necessary skills for obtaining the CompTIA Network+ certification. This certification validates the ability to manage and troubleshoot both wired and wireless networks, enhancing career opportunities in the IT field.

Uploaded by

XEOZ AMAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 263

BEGINNER TO EXPERT GUARANTEED

CompTIA Network+ COURSE


ACCESS MORE COURSES PLAYLIST LINK IN DESCRIPTION

SUBSCRIBE!!!
CompTIA Network+
Syllabus
1. CompTIA N+ Scope, Salary & Certification 11. TCP & UDP with Protocols & Ports
2. What is Network & Networking 12. IP Address Fully Explained
3. Types of Networks Explained 13. Subnetting Fully Explained
4. Types of Topologies in Network 14. Networking Services (DNS, DHCP like)
5. Types of Networking Devices 15. Routing Protocols Explained
6. Types of Connectors, Ports & Wires 16. WAN Technology Fully Explained
7. Wireless, Wires & Cables Standard 17. Remote Protocols & Services
8. Threats & Shields of a Network 18. Networking Tools & Safety
9. OSI Model Fully Explained 19. Network Threats & Attacks
10. TCP/IP Model Fully Explained 20. All about Network Security
CompTIA Network+
Syllabus
21. All About Cloud Concepts
22. All About IoT Concepts
23. Configuring a Switch (All Knowledge)
24. VLAN explained
25. User authentication
26. Network Policies
27. Everything about Virtualization
28. Everything about SOHO
29. Networking Tools & Safety
30. Networking Issues & Troubleshooting
1. CompTIA N+ Scope, Salary & Certification
What Is CompTIA Network+ Certification?
CompTIA Network+ is the only industry certification that covers both wired and wireless networks.
CompTIA’s Network+ validates the knowledge and skills needed to troubleshoot, configure and
manage wired and wireless networks found in companies around the world. CompTIA Network+
certifies a professional-level understanding of emerging technologies, including cloud and
virtualization technologies.

The certifications offered by CompTIA, such as A+, Network+, and Security+, cover most aspects
of IT and prove to employers that you have the background to be considered for an IT job.

It also sets you up for success with Cisco’s Cisco Certified Network Associate (CCNA) certification
training, Juniper’s Juniper Networks Certified Associate – Junos (JNCA-Junos) certification, and
more. You will have to take an exam that will have up to 90 questions and get a minimum score of
720 out of 900. The certification exam must be completed in 90 minutes. It will consist of a mix of
performance-based (simulations) and multiple-choice questions. The exam is challenging but not
so difficult that it can’t be attained by most people.
CompTIA A+ Certification
jobsis for professionals with the recommended
CompTIA Network+
prerequisite of CompTIA Network+ certification and nine months of
networking experience looking develop their networking careers.
CompTIA Network+ prepares candidates for the following job roles:

Network administrator
Network field technician
Junior network administrator
IT consultant
Network field engineer
Computer technician
Help desk technician
System engineer
Network support specialist
Network analyst
Why this Course?
 Better Future Ahead
 Great Opportunities
 Demanding Skill
 Network Admininstrator
 First Step to Security
 Medium Salary Packages
Best book to self-study for the Network+ exam?
2. What is Network & Networking
What is
Network ?
 A network consists of two or more computers that
are linked in order to share resources (such as
printers and CDs), exchange files, or allow
electronic communications.

 The computers on a network may be linked


through cables, telephone lines, radio waves,
satellites, or infrared light beams.
What is Networking ?
Networking, also known as computer
networking, is the practice of
transporting and exchanging data
between nodes over a shared medium
in an information system. Networking
comprises not only the design,
construction and use of a network, but
also the management, maintenance
and operation of the network
infrastructure, software and policies.
Peer to Peer Model
Client-Server Model
3. Network with types
Basic Types of Networks

1. Local Area Network (LAN)


2. Personal Area Network (PAN)
3. Metropolitan Area Network (MAN)
4. Wide Area Network (WAN)
5. Campus Area Network (CAN)
Local Area Network (LAN)
 A LAN is a network that is used for communicating
among computer devices, usually within an office
building or home.
 LAN’s enable the sharing of resources such as
files or hardware devices that may be needed
by multiple users • • Is limited in size, typically
spanning a few hundred meters, and no more
than a mile
 Is fast, with speeds from 10 Mbps to 10 Gbps
 Requires little wiring, typically a single cable
connecting to each device
 Has lower cost compared to MAN’s or WAN’s
 LAN’s can be either wired or wireless. Twisted pair,
coax or fibre optic cable can be used in wired
LAN’s.
Personal Area Network
(PAN)
 A PAN is a network that is used for communicating
among computer devices, usually home.
 PAN’s enable the sharing of resources such as
files or hardware devices that may be needed
by multiple users • • Is limited in size, typically
spanning a few hundred meters
 Is fast, with speeds from 10 Mbps to 10 Gbps
 Requires little wiring, typically a single cable
connecting to each device
 Has lower cost compared to MAN’s or WAN’s
 LAN’s can be either wired or wireless. Twisted pair,
coax or fibre optic cable can be used in wired
LAN’s.
Campus Area Network
(CAN)
 A campus area network (CAN) is a network of multiple
interconnected local area networks (LAN) in a limited
geographical area. A CAN is smaller than a wide area network
(WAN) or metropolitan area network (MAN).

 A CAN is also known as a corporate area network (CAN).

 CAN benefits are as follows:

Cost-effective
Wireless, versus cable
Multidepartmental network access
Metropolitan Area Network

(MAN)
A metropolitan area network (MAN) is a large computer network
that usually spans a city or a large campus.
 A MAN is optimized for a larger geographical area than a LAN,
ranging
from several blocks of buildings to entire cities.
 A MAN might be owned and operated by a single organization,
but it usually will be used by many individuals and organizations.
 A MAN often acts as a high speed network to allow sharing of
regional
resources.
 A MAN typically covers an area of between 5 and 50 km
diameter.
 Examples of MAN: Telephone company network that provides a
high
speed DSL to customers and cable TV network.
Wide Area Network
(WAN)
 WAN covers a large geographic area such as country, continent or
even whole of the world.
 A WAN is two or more LANs connected together. The LANs can
be many miles apart.
 To cover great distances, WANs may transmit data over leased
high-speed phone lines or wireless links such as satellites.
 Multiple LANs can be connected together using devices such
as bridges, routers, or gateways, which enable them to share
data.
 The world's most popular WAN is the Internet.
4. Types of Topologies in Network
Topology
• Topology refers to the layout of connected devices on a network.
• Here, some logical layout of topology.

• Mesh
• Star
• Ring
• Line
• Bus
• Tree
• Hybrid
Network Topology
Mesh Topology
• Here every device has a point to point link to every other
device.
Advantages:
• They use dedicated links so each link can only carry its own data load. So
traffic problem can be avoided.

• It is robust. If any one link get damaged it cannot affect others.

 It gives privacy and security.

• Fault identification and fault isolation are easy.


Mesh Topology
Star Topology
• Here each device has a dedicated point-to-point link to the
central controller called “Hub”(Act as a Exchange).
• There is no direct traffic between devices.
• The transmission are occurred only through the central
“hub”.
• When device 1 wants to send data to device 2; First sends the
data to hub. Which then relays the data to the other connected
device.
Star Topology
Bus Topology
• A bus topology is multipoint.
• Here one long cable act as a backbone to link all the devices are
connected to the backbone by drop lines and taps.
• Drop line- is the connection b/w the devices and the cable.
• Tap- is the splitter that cut the main link.
• This allows only one device to transmit at a time.
Bus Topology
Ring Topology
• Here each device has a dedicated connection with two devices on either
side.
• The signal is passed in one direction from device to device until it
reaches the destination and each device have repeater.
• When one device received signals instead of intended another device, its
repeater then regenerates the data and passes them along.
• To add or delete a device requires changing only two connections.
Ring Topology
Tree Topology
• Alternatively referred to as a star bus topology.

• Tree topology is one of the most common network setups that is


similar to a bus topology and a star topology.

• A tree topology connects multiple star networks to other star


networks. Below is a visual example of a simple computer setup on
a network using the star topology.
Tree Topology
Hybrid Topology
• A network which contain all type of physical structure and
connected under a single backbone channel.
Considerations for choosing topology
• Money- Bus n/w may be the least expensive way to install a n/w.

• Length- of cable needed- the linear bus n/w uses shorter lengths of
cable.

• Future growth- with star topology, expending is easily done by adding another

• Cable type- most common used cable in commercial organization is twisted


pair. Which often used with star topologies.
5. Types of Networking Devices
Introducti
on
• To connect LANs, connecting devices are
needed and various connecting devices are
such as bridge, switch, router, hub, repeater.
• Types of
1. Networking
NIC Card Devices :-
2. Repeater
3. Hub
4. Bridge
5. Switch
6. Gateway
7. Router
8. Modem
Network
Card
It stands for Network Interface Controller. NIC used to connect
the ethernet cable (RJ-45 Connector) with the PC. It is a Card
which have Mac Address written on it.

Components of NIC :-

1. Metal Expansion Card


2. Boot ROM Chip
3. 32 bit PCI Controller
4. Activity LED
5. RJ-45 LAN Port
A NIC connecting a LAN
Repe
aters
Repeater used to regenerate or replicate a signal. It removes the unwanted noise in an incoming signal, it
works on Layer 1 of OSI Model

It is used in some scaled area and it refine the signals and


manage the proper speed of the network
Repeater connecting two segments of a
LAN
HUB
It is a Networking Device which simply receive data from one port and transfer
on all the other ports. HUBs are commonly used to connect segments of LAN.
Hub Works on Physical layer of OSI Moodel

It used in where you have to


create multiple ethernet with
the help of a nnetworking
device. It comes with
different port segment like
6,12 & 24
A HUB connecting LAN
Brid
ge
Bridge Devices inspect incoming network traffic and determine whether to forward or discard it
according to its intended destination it operates on data link layer

A bridge is a type of computer


network device that provides
interconnection with
other bridge networks that use the
same protocol.
A bridge connecting two LANs

A bridge does not change the physical (MAC) addresses in a frame.


Function of
Bridge
Swit
ch
A Switch can recieve input or signal from any of one port and transmit it on all the ports. Ethernet LAN is
used to connect to a switch that correct system. It works on Data link layer of OSI Model

It is a small device that transfers


data packets between multiple
network devices such as
computers, routers, servers or
other switches
A switch connecting a LAN
Gate
way
Gateway Connects two networks together with the help of gateway devices like firewire & router. It is a
node between the public network and private network which makes some security with the help of
identification

A gateway is a networking device


that connects two networks using
different protocols together. it also
acts as a “gate” between two
networks.
A Gateway connecting a LAN
Route
r
Router is a networking device which is used to provide interaction between two different networks.
Router are also used for provide the routes to the data and devices that are connected in network.
Router are used to establish internetwork communication

A router inspects a given data


packet's destination Internet
Protocol address (IP address), and
provide connection to the nodes
with the main network. It gives you
wired and wireless both
connectivities.
A Router connecting a LAN
MODEM
”Modulator-Demodulator” A modem or broadband modem is a hardware device that connects a
computer or router to a broadband network. It converts or "modulates" an analog signal from a
telephone or cable wire to digital data (1s and 0s) that a computer can recognize.

The main difference between the


two devices is that a modem lets
you connect to the internet, while
a router distributes that
connection to different devices.
A modem is your gateway to the
web, while a router is a central hub
for your devices.
A Modem connecting a LAN
6. Types of Connectors, Ports & Wires
What is Tranmission
Media ?
In data communication,

• Transmission media is a pathway that carries the


information from sender to receiver.

• We use different types of cables or waves to


transmit data.

• Data is transmitted normally through electrical or


electromagnetic signals.
Description
• Transmission media are located below the physical layer

• Computers use signals to represent data.

• Signals are transmitted in form of electromagnetic energy.


Classification of Transmission media
Twisted-pair
cable
 A twisted pair consists of two conductors

 Basically copper based

 With its own plastic insulation, twisted


together.
Twisted Pair Description
• One wire use to carry signals to the receiver

• Second wire used as a ground reference

• Very common medium

• Can be use in telephone network


Advantages: Disadvantages:
• Connection Within the buildings
• Cheap • Low data rate

• For local area networks (LAN) • Easy to work with• Short range
Twisted Pair Cables

Twisted Pair cables

Unshielded Shielded
Twisted Pair Twisted pair
(UTP) (STP)
Unshielded Twisted Pair
(UTP):
• Pair of unshielded wires wound
around each other

• Easiest to install

• Telephone subscribers connect to


the central telephone office

• DSL lines

• LAN – 10Mbps or 100Mbps


UTP Cable Types
UTP connector and
Tools

RJ45 (RJ stands for registered jack) is a keyed


connector, it
means that it can be inserted in only one way

Crimping Tool
Advantages of UTP:
 Affordable
 Most compatible cabling
 Major networking system

Disadvantages of UTP:

• Suffers from external Electromagnetic interference


Shielded Twisted Pair (STP)
• Pair of wires wound around each
other placed inside a protective foil
wrap

• Metal braid or sheath foil that reduces


interference

• Harder to handle (thick, heavy)

• STP is used in IBM token ring


networks.

• Higher transmission rates over


Advantages of
STP:
 Shielded
 Faster than UTP

Disadvantages of STP:

 More expensive than UTP


 High attenuation rate
What are RJ connectors?
RJ Connectors are a family of push-and-click connectors for twisted-pair wiring in
telephone and network wiring. RJ stands for Registered Jack. RJ types define both a
jack or receptacle (female) and a plug (male) type of connector.

The most common types of RJ connectors are as follows:

RJ-11 connector: A 4-wire or 6-wire telephone-type connector

RJ-45 connector: An 8-wire telephone-type connector

RJ-48 connector: An 8-wire telephone-type connector TP


Co-axial Cable
Co-axial cable carries signal of higher frequency ranges than twisted
pair cable

• Inner conductor is a solid wire

• Outer conductor serves as a shield against noise and a


second conductor
Categories of coaxial cables

Coaxial cables are categorized by Radio Government


(RG) ratings, RG is De Jure standards
Coaxial Cable
Connectors
BNC Connectors – Bayone Neil Concelman
To connect coaxial cable to devices we need coaxial connectors

 BNC Connector is used at the end of the cable to a device


Example: TV set conenction

 BNC T connector used to Ethernet networks to branch out connection


to computer or other devices

 BNC terminator is used at the end of the cable to prevent the reflection
of the signal
Coaxial Cable Applications
• Most versatile medium

• Television distribution

• Long distance telephone transmission


ADVANTAGES
• Can carry 10,000 voice calls simultaneously
 Easy to wire

• Short distance computer systems links  Easy to expand

• Local area networks DISADVANTAGE

 Single cable failure can take


down an entire network
Fiber-Optic Cable
A fiber optic cable is made of glass or plastic and transmit
signals in the form of light.

Nature of light:

 Light travels in a straight line

 If light goes from one substance to another then the ray of light
changes direction

 Ray of light changes direction when goes from more dense to a less
dence substance
Fiber – Optic cable Connectors

Subscriber Channel (SC)


Connecter

Straight-Tip (ST)
Connecter
Areas of Application
 Telecommunications

 Local Area Networks

 Cable TV

 CCTV

Advantage Disadvantage
 Greater capacity Example: Data rates at
• Installation and maintenance are
100 Gbps
Expensive
 Smaller size & light weight
• Only Unidirectional light propagation
 Lower attenuation
7. Wireless, Wires & Cables Standard
Unguided
Mediatransmission
Wireless
waves
Unguided Media – Radio
Waves
 Omnidirectional Antenna
 Frequencies between 3
KHz and 1 GHz.
 Used for
multicasts(multiple way)
communications, such as
radio and television, and
paging system.
 Radio waves can penetrate
buildings easily, so that
widely use for indoors &
outdoors communication.
Microwaves
Microwaves are ideal when large areas need to be covered
and there are no obstacles in the path
Micro waves

Transmission
Microwaves are unidirectional

• Micro waves electromagnetic waves having frequency between 1 GHZ


and 300 GHZ.

• There are two types of micro waves data communication system


: terrestrial and satellite

• Micro waves are widely used for one to one communication


between sender and receiver,
example: satellite, GPS

Infrared
Frequencies between 3.00 GHz to 400 THz.
 Used for short-range communication
 Example: Night Vision Camera,Remote control, File sharing
between two phones, Communication between a PC and
peripheral device
Wi-Fi & Bluetooth
Wi-
Fi
 What is Wi-Fi
 Short for “Wireless Fidelity”
 A trademark of the Wi-Fi Alliance
 The brand name for products using the IEEE 802.11 family of
standards
 Commonly used for “wireless local area network” (WLAN)
Bluetooth
 Wireless Personal Area Networks (WPAN)
 Design goal
 Cable replacement
 Low cost
 Low power
 Small size
 For mobile devices
 Standard: IEEE 802.15.1
Wireless Standards
Cellular Standards
IEEE
Wifi Standards
IEEE
Bluetooth Standards
Wire Standards
8. Network Vulnerabilities
Types of Viruses
• Macro Virus
• Executable Virus
• Backdoor Virus
Macro Viruses
• Most common type of virus on campus Affect Microsoft
Office documents Written in Visual Basic for Applications
• Generally harmless with a few destructive varients

Executable Viruses
• Second most common type of virus on campus
• Written in programming languages and compiled into executable files

Backdoor Programs
Allow anyone on the internet to remotely control the infected computer
– Send and receive files
– View the screen
– Monitor all keystrokes
Data Protection
Data Security is a process
of protecting files, databases, and
accounts on a network by adopting a set
of controls, applications, and techniques
that identify the relative importance of
different datasets, their sensitivity,
regulatory compliance requirements and
then applying appropriate protections to
secure those ..
9. OSI Model
OSI MODEL
Data, Protocol & Activities
OSI Layers TCP/IP Suit Activities

Application Application To allow access to network resources


Telnet, FTP, SMTP, HTTP, DNS, SNMP, Specific address etc…

To Translate, encrypt, and compress


Presentation Presentation data

Session To establish, manage, and terminate


Session session

Transport To Provide reliable process-to-process


Transport SCTP, TCP, UDP, Sockets and Ports address Message delivery and error recovery

Network To move packets from source to


Network IP, ARP/RARP, ICMP, IGMP, Logical address destination; to provide internetworking

Data Link To organize bits into frames; to provide


Data Link IEEE 802 Standards, FDDI, PPP, Physical address Hop-to-hop delivery

Physical To Transmit bits over a medium; to provide


Physical Medium, Coax, Fiber, 10base, Wireless Mechanical and electrical specifications
Physical
Layer From data link layer To data link layer

110 10101000000010111 110 10101000000010111 Physical layer


Physical layer

Transmission medium

 One of the major function of the physical layer is to move data in the form of electromagnetic
signals across a transmission medium.

Its responsible for movements of individual bits from one hop (Node) to next.

Both data and the signals can be either analog or digital.


Transmission media work by conducting energy along a physical path which
can
 be wired or wireless
Physical characteristics of interface and medium (Transmission medium)

Representation of bits (stream of bits (0s or 1s) with no interpretation and encoded into signals)

Data rate (duration of a bit, which is how long it last)

Synchronization of bits (sender and receivers clock must be

synchronized) Line configuration (Point-to-Point, Point-to-Multipoint)

Physical topology

Transmission mode (Simplex, half duplex, full duplex)
LAYER
From network layer To network layer

Data link layer H2 Data T2 H2 Data T2 Data link layer

To physical layer From physical layer

 Data link layer is responsible for moving frames from one hop (Node) to the next.
 Concerned:
 Framing (stream of bits into manageable data units)
 Physical addressing (MAC Address)
 Flow Control (mechanism for overwhelming the receiver)
 Error Control (trailer, retransmission)
 Access Control (defining master device in the same link)
Network Layer
From transport layer To transport layer

Network layer H3 Data Packet H3 Data Packet Network layer

To data link layer From data link layer

 The network layer is responsible for the delivery of individual packets from the source
host to the destination host.
 Concerned:
 Logical addressing (IP Address)
 Routing (Source to destination transmission between networks)
TRANSPORT
LAYER
From session layer From session layer

Transport layer H4 Data H4 Data H4 Data H4 Data H4 Data H4 Data Transport layer

Segments Segments

To network layer From network layer


 The transport layer is responsible for the delivery of a message from one process to
another
 Concerned:
 Service-point addressing (Port address)
 Segmentation and reassembly (Sequence
 number)
 Connection control (Connectionless or connection
 oriented) Flow control (end to end)
Error Control (Process to Process)
SESSION
Layer From Presentation layer To Presentation layer

H5 Data Data Data H5 Data Data Data Session layer


Session layer
Syn Syn Syn Syn Syn Syn

To transport layer From transport layer

 The session layer is responsible for dialog control and synchronization


 Concerned:
 Dialog Control (Half Duplex/Full duplex)
 Synchronization (Synchronization points, process inline within same
page)
PRESENTATION
Layer
From application layer To application layer

presentation layer H6 Data H6 Data presentation layer

To session layer From session layer

 The presentation layer is responsible for translation, compression and encryption


 Concerned:
 Translation (interoperability between different encoding system)
 Encryption (Privacy schemes)
 Compression (data compression)
LAYER
USER USER
(Human or Program)
(Human or Program)

X.500 FTAM X.400 X.500 FTAM X.400

Application layer
Application layer
H7 Data Message H7 Data Message

To presentation layer From presentation layer

 The application layer is responsible for providing services to the user.


 Concerned:
 Network virtual terminal (Software)
 File transfer, access and management
 Mail services
 Directory services (access to distributed database sources for global information about various
objects and services)
10. TCP/IP Model
TCP/IP model
• The TCP/IP model was developed prior to the OSI model.

• The TCP/IP model is not exactly similar to the OSI model.

• The TCP/IP model consists of five layers: the application layer, transport layer,
network layer, data link layer and physical layer.

• The first four layers provide physical standards, network interface, internetworking,
and transport functions that correspond to the first four layers of the OSI model
and these four layers are represented in TCP/IP model by a single layer called the
application layer.

• TCP/IP is a hierarchical protocol made up of interactive modules, and each of


them provides specific functionality.
Model
Network Interface Layer
This layer corresponds to the combination of Data Link Layer and
Physical Layer of the OSI model. It looks out for hardware addressing
and the protocols present in this layer allows for the physical
transmission of data.
We just talked about ARP being a protocol of Internet layer, but there
is a conflict about declaring it as a protocol of Internet Layer or
Network access layer. It is described as residing in layer 3, being
encapsulated by layer 2 protocols.
Network Layer
This layer parallels the functions of OSI’s Network layer. It
defines the protocols which are responsible for logical
transmission of data over the entire network. The main
protocols residing at this layer are :

IP
ICMP
ARP
Transport Layer

This layer is analogous to the transport layer of the OSI model. It is


responsible for end-to-end communication and error-free delivery
of data. It shields the upper-layer applications from the
complexities of data. The two main protocols present in this layer
are :

1.Transmission Control Protocol (TCP)


2.User Datagram Protocol (UDP)
Application Layer
This layer performs the functions of top three layers of the OSI model:
Application, Presentation and Session Layer. It is responsible for node-
to-node communication and controls user-interface specifications.
Some of the protocols present in this layer are: HTTP, HTTPS, FTP,
TFTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD.
Have a look at Protocols in Application Layer for some information
about these protocols.

HTTP and HTTPS


SSH
NTP
•ARP (Address Resolution Protocol) – used to associate an IP address with a MAC address.

•IP (Internet Protocol) – used to deliver packets from the source host to the destination host
based on the IP addresses.

•ICMP (Internet Control Message Protocol) – used to detects and reports network error
conditions. Used in ping.

•TCP (Transmission Control Protocol) – a connection-oriented protocol that enables reliable


data transfer between two computers.

•UDP (User Datagram Protocol) – a connectionless protocol for data transfer. Since a session is
not created before the data transfer, there is no guarantee of data delivery.

•FTP (File Transfer Protocol) – used for file transfers from one host to another.

•Telnet (Telecommunications Network) – used to connect and issue commands on a remote


computer.

•DNS (Domain Name System) – used for host names to the IP address resolution.

•HTTP (Hypertext Transfer Protocol) – used to transfer files (text, graphic images, sound,
video, and other multimedia files) on the World Wide Web.
11. TCP & UDP with Protocols & Ports
Let’s Explore Protocols & Ports of TCP & UDP
12. IP Address Fully Explained
What is IP Address?

An Internet Protocol address is a


numerical label assigned to each
device connected to a computer
network that uses the Internet
Protocol for communication. An IP
address serves two main functions:
host or network interface identification
and location addressing.
IP Addressing IPv4
• An IP address basically a 32-bit address that uniquely
universally defines connection of host or a router to the
Internet. IP address is unique.
• Introduced by IANA (Internet Assigned Numbers Authority).

• 32 bit is divided into 4 equal parts of 8-8 bits separated by dotted


decimal notation. It is in the range of minimum 0.0.0.0 to
255.255.255.255.
• Each 8 bit group is known by OCTET.
Various IP
classes
IP has five different classes differentiated by characteristics.
◦ Class-A ranges from 0 to 127
◦ Class-B ranges from 128 to 191
◦ Class-C ranges from 192 to 223
◦ Class-D ranges from 224 to 239
◦ Class-E ranges from 240 to 255
First Octet is defines the class of particular IP e.g. -
128.11.3.31 is follow in class –B
127.0.0.0 to 127.255.255.255 is a range of look back IP.
Classes of IP addresses
Class-A
This IP ranges from 0 to 126 Decimal value in first octet. And 1st octet
defines
network part and remaining three octet defines the Host part. It
patterns
like this NHHH (N-Network; H- Host).

First 8bits defines network and remaining 24 bits

231.which
defines host parts. It has a highest nos. of address

is about 16,277,216.

Lie between 10.1.1.1 to 126.255.255.255


Class B
This IP ranges from 128 to 191 Decimal value in first octet. And 1st two bit
defines network part and remaining two octet defines the Host part. It patterns
like this NNHH (N-Network; H-Host).

First 16 bits defines network and remaining 16 bits defines


host parts. It has a highest nos. of address 230.which is about
65,536.

IP ranges from 128.16.0.0 to 172.31.255.255.


Class C
This IP ranges from 192 to 223 Decimal value in first octet. And 1st three
bit defines network part and remaining one octet defines the Host part.
It patterns like this NNNH (N-Network; H-Host).

First 24 bits defines network and remaining 8 bits


defines host parts. It has a highest nos. of address
229.which is about 53,68,70,912
IP ranges from 192.168.0.0 to 223.255.255.0.
Class-D
This IP ranges from 224 to 239 Decimal value in first octet.
It is not usually use in general applications.
It is use in Special purpose applications known as Multicast.
Class-E
This IP ranges from 240 to 255 Decimal value in first
octet. It is not usually use in general applications.
It is reserved range of IP by R & D (Research and Development)
department. Usually, Class-A to C is supported by PC and Class-D and E
is not supported.
IP Addressing IPv6
• An IP address basically a 128-bit address that uniquely
universally defines connection of host or a router to the
Internet. IP address is unique.
• Introduced by IANA (Internet Assigned Numbers Authority).
• total of 4,294,967,296 unique IP addresses can be assigned to hosts.
• IP is like 2001:db8:1234::f350:2256:f3dd/64
• It supports Unicast. Telecast & Multicast.
• It doesn’t have Classes like ipv4
13. Subnetting Fully Explained
What Is Subnet Mask?
A subnet mask is a 32- or 128-bit number that segments an existing IP address
in a TCP/IP network. It is used by the TCP/IP protocol to determine whether a
host is on the local subnet or on a remote network. Subnet mask divides the IP
address into a network address and host address, hence to identify which part of
IP address is reserved for the network and which part is available for host use.
IP ADDRESSING
32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


IP ADDRESSING
32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


1 8 9 16 17 24 25 32

Binary 11111111 11111111 11111111 11111111

128

8
4
2
1
64
32
16
128

8
4
2
1
64
32
16
128

8
4
2
1
128

8
4
2
1
64
32
16

64
32
16
IP ADDRESSING
32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


1 8 9 16 17 24 25 32

Binary 11111111 11111111 11111111 11111111

128

8
4
2
1
64
32
16
128

8
4
2
1
64
32
16
128

8
4
2
1
128

8
4
2
1
64
32
16

64
32
16
Example
Decimal 172 16 122 204
Example 10101100 00010000 01111010 11001100
Binary
IP ADDRESS CLASSES

8 bits 8 bits 8 bits 8 bits


 Class A: Network Host Host Host

 Class B: Network Network Host Host

 Class C: Network Network Network Host

 Class D: Multicast

 Class E: Research
IP ADDRESS CLASSES

Bits: 1 8 9 16 17 24 25 32
NNNNN Host Host Host
Class A:
Range (1-126)

Bits: 1 8 9 16 17 24 25 32
NNNNNN Network Host Host
Class B:
Range (128-191)
1 8 9 16 17 24 25 32
Bits:
NNNNNN Network Network Host
Class C:
Range (192-223)
1 8 9 16 17 24 25 32
Bits:
NNNNNN Multicast
Multicast Group
Group Multicast
Multicast Group
Group Multicast
Multicast Group
Group
Class D:
Range (224-239)
DETERMINING AVAILABLE HOST ADDRESSES
Network Host
172 16 0 0
N

11
9
8
7
6
5
4
3
2
1
16
15
14
13
12
10
10101100 00010000 00000000 00000000 1
00000000 00000001 2
00000000 00000011 3

...

...

...
11111111 11111101 65534
11111111 11111110 65535
11111111 11111111 65536
-
2
2N-2 = 216-2 = 65534 65534
SUBNET MASK
Network Host

IP
Address
172 16 0 0
Network Host
Default
Subnet
Mask
255 255 0 0
11111111 11111111 00000000 00000000
Also written as “/16” where 16 represents the number of
1s in the mask.
Network Subnet Host
8-bit
Subnet 255 255 255 0
Mask
Also written as “/24” where 24 represents the number of
1s in the mask.
SUBNET MASK WITHOUT SUBNETS

Network Host

172.16.2.160 10101100 00010000 00000010 10100000

255.255.0.0 11111111 11111111 00000000 00000000

10101100 00010000 00000000 00000000

Network 172 16 0 0
Number

 Subnets not in use—the default


SUBNET MASK WITH SUBNETS

Network Subnet Host

172.16.2.160 10101100 00010000 00000010 10100000

255.255.255.0 11111111 11111111 11111111 00000000

10101100 00010000 00000010 00000000

Network
Number 172 16 2 0

 Network number extended by eight


bits
14. Networking Services (DNS, DHCP like)
DHCP
✖ Dynamic Host Configuration Protocol (DHCP)
○ From 1993
○ An extension of BOOTP, very similar to DHCP
○ Same port numbers as BOOTP
○ Extensions:
■ Supports temporary allocation (“leases”) of IP
addresses
■ DHCP client can acquire all IP configuration
parameters needed to operate
○ DHCP is the preferred mechanism for dynamic
assignment of IP addresses
○ DHCP can interoperate with BOOTP clients.
Dynamic Assignment of IP addresses
✖ Dynamic assignment of IP addresses is
desirable for several reasons:
○ IP addresses are assigned on-demand
○ Avoid manual IP configuration
○ Easy to Configure
Solutions for dynamic assignment of IP addresses

✖ Reverse Address Resolution Protocol (RARP)


○ Works similar to ARP
○ Broadcast a request for the IP address associated with a
given MAC address
○ RARP server responds with an IP address
○ Only assigns IP address (not the default router and
subnetmask)

ARP Ethernet MAC


IP address
address
(32 bit)
(48 bit)
RARP
DHCP Interaction
Argon
00:a0:24:71:e4:44 DHCP Server

DHCP Request
00:a0:24:71:e4:44
Sent to 255.255.255.255

Argon
128.143.137.144
00:a0:24:71:e4:44 DHCP Server
DHCP Response:
IP address: 128.143.137.144
Default gateway: 128.143.137.1
Netmask: 255.255.0.0
BOOTP
✖ BOOTstrap Protocol (BOOTP)
■ From 1985
■ Host can configure its IP parameters at boot time.
■ 3 services.
● IP address assignment.
● Detection of the IP address for a serving machine.
● The name of a file to be loaded and executed by the client
machine (boot file name)

○ Not only assign IP address, but also default router, network


mask, etc.
○ Sent as UDP messages (UDP Port 67 (server) and 68 (host))
○ Use limited broadcast address (255.255.255.255):
■ These addresses are never forwarded
BOOTP Interaction
(b)
Argon Argon
00:a0:24:71:e4:44 (a) BOOTP Server 128.143.137.144
00:a0:24:71:e4:44 DHCP Server
BOOTP Request BOOTP Response:
00:a0:24:71:e4:44
IP address: 128.143.137.144
Sent to 255.255.255.255
Server IP address: 128.143.137.100
Boot file name: filename

Argon
128.143.137.144
00:a0:24:71:e4:44 (c) DHCP Server

✖ BOOTP can be used for


TFTP
“filename” downloading memory image for
diskless workstations
✖ Assignment of IP addresses to
hosts is static
128.143.137.100
Automatic Private IP Addressing (APIPA)

Automatic Private IP Addressing (APIPA) is a feature in operating systems (such


as Windows) that enables computers to automatically self-configure an IP address
and subnet mask when their DHCP server isn’t reachable. The IP address range
for APIPA is 169.254.0.1-169.254.255.254, with the subnet mask of 255.255.0.0.
 Domain name is a way to identify and locate computers connected to internet

 No two organizations can have same domain name

 A domain name always consists of two or more components separated by


periods called dots (.)
EXAMPLE: www.yahoo.co.in, www.facebook.com etc.

 Once a domain has been established subdomains can be created within the
domain
EXAMPLE: The domain for the large company could be “Vni.com” and within this
domain subdomains can be created for each of the company’s regional office.
Eg: Bombay.vni.com
 Last
name. subdomain. s eco n d - l e v e l domain. top-level domain
EXAMPLE: vijay.Bombay.vni.com
Top level domains a r e classifi ed into 3 categories:

 Organizational or generic domains

 Geographical or country domains

 Rev ers e domains


 It consists of t h r ee character code which indicates the primary
function of the organization or their generic behavior
 Most commonly used top level domains are:

 .com for commercial organization eg www.y


 .net for networking organizations ahoo.com e g
 .gov for government organizations ewww.zedge.net
g
 .edu for educational organizations www.newjersey.gov
 .org for non-commercial organizations e g www.uducause.edu
eg www.eklav
 .mil for military organizations ya.org e g www.dod.mil
 .int for international organizations eg www.itu.int
 It consists of two c h a r a c te r s which r e p r e s e n t s different
countries/regions all around the world
 T h e s e c o d e s have b e e n standardized by International Standard
Organizational (ISO)
EXAMPLE:
 .in India
 .jp Japan
 .us United S tates
 .fr france
 .it Italy
 .cn China
 .au Australia
 Each domain name h a s a corresponding IP a d d re s s

 When t h e u s e r t y p e s t h e domain name in th e a d d re s s bar,


t h e corresponding IP a d d re s s is supplied. Such a
translation is possible with t h e help of s y s t e m called DNS
(DOMAIN NAME SYSTEM)

 DEFINITION:

“DOMAIN NAME SYSTEM is a collection of th e d a t a b a s e s


that contain information about domain n a m e s and their
corresponding IP ad d re ss.”
How DNS Lookup
Works
DNS is the resolution of a
domain name to an IP address.
Moreover, for those of you who
are not aware of how it works
read on to learn the basics.

DNS Lookups
• Forward DNS Lookups
• Reverse DNS Lookups
NAS (Network Attached Storage)
A NAS system is a storage device connected to a network that allows storage and retrieval of
data from a centralized location for authorized network users and heterogeneous
clients. NAS systems are flexible and scale-out, meaning that as you need additional storage, you
can add on to what you have.
SAN (Storage Area Network)
A Storage Area Network (SAN) is a specialized, high-speed network that provides block-
level network access to storage. SANs are typically composed of hosts,
switches, storage elements, and storage devices that are interconnected using a variety of
technologies, topologies, and protocols.
15. Routing Protocols Explained
INTER- AND INTRA-DOMAIN ROUTING

Today, an internet can be so large that one routing protocol


cannot handle the task of updating the routing tables of all
routers. For this reason, an internet is divided into
autonomous systems.

An autonomous system (AS) is a group of networks and


routers under the authority of a single administration. Routing
inside an autonomous system is called intra-domain routing.
Routing between autonomous systems is called inter-domain
routing
Popular routing protocols
DISTANCE VECTOR ROUTING

Today, an internet can be so large that one routing protocol


cannot handle the task of updating the routing tables of all
routers. For this reason, an internet is divided into
autonomous systems.

An autonomous system (AS) is a group of networks and


routers under the authority of a single administration.
Routing inside an autonomous system is called intra-domain
routing. Routing between autonomous systems is called inter-
domain routing
RIP
The Routing Information Protocol (RIP) is an intra- domain
(interior) routing protocol used inside an autonomous
system.

It is a very simple protocol based on distance vector routing.


RIP implements distance vector routing directly with some
considerations.
Example of a domain using RIP
LINK STATE ROUTING

Link state routing has a different philosophy from that of


distance vector routing.

In link state routing, if each node in the domain has the


entire topology of the domain—the list of nodes and links,
how they are connected including the type, cost (metric),
and the condition of the links (up or down)—the node can use
the algorithm to build a routing table.
Concept of Link state routing
OSPF

The Open Shortest Path First (OSPF) protocol is an intra-


domain routing protocol based on link state routing. Its
domain is also an autonomous system.

Open Shortest Path First (OSPF) is a link-state routing protocol


that is used to find the best path between the source and the
destination router using its own Shortest Path First).
Areas in an autonomous system
BGP

Border Gateway Protocol (BGP) is an interdomain routing protocol using path


vector routing. It first appeared in 1989 and has gone through four
versions.

BGP (Border Gateway Protocol) is the protocol underlying the


global routing system of the internet. It manages how packets get
routed from network to network through the exchange of routing and
reachability information among edge routers.
Internal and external BGP sessions
16. WAN Technology Fully Explained
Let’s Understand What is Internet or WAN Network
Internet = WAN
17. Remote Protocols & Services
Remote Access Protocols
In addition to an IP address, you need a remote access protocol to connect to the
Internet. A remote access protocol is a communications standard that allows your
computer to talk to the remote network. If you ever intend to work from home, you
will appreciate this service. After all, it enables telecommuting. There are three
common remote access protocols used today: PPP, PPTP, and SLIP.
Serial Line Internet Protocol (SLIP)
SLIP operates at both the Physical and Data Link layers of the OSI model. Today,
SLIP is found in many network operating systems in addition to UNIX. It is being
used less frequently with each passing year, though, because it lacks features
when compared with other protocols. Although a low overhead is associated with
using SLIP and you can use it to transport TCP/IP over serial connections, it does
no error checking or packet addressing and can be used only on serial
connections. SLIP is used today primarily to connect a workstation to the Internet
or to another network running TCP/IP.
Point-to-Point Protocol (PPP)
PPP uses the Link Control Protocol (LCP) to communicate between PPP client
and host. LCP tests the link between client and PPP host and specifies PPP client
configuration. Through LCP, PPP also supports authentication negotiation, as well
as negotiation of encryption and compression between client and server, using
compression control protocols (CCPs) and encryption control protocols (ECPs).
Point-to-Point Tunneling Protocol (PPTP)
To use PPTP, you set up a PPP session between the client and server, typically
over the Internet. Once the session is established, you create a second dial-up
session that dials through the existing PPP session using PPTP. The PPTP
session tunnels through the existing PPP connection, creating a secure session. In
this way, you can use the Internet to create a secure session between the client
and the server. Also called a virtual private network (VPN), this type of connection
is very inexpensive when compared with a direct connection.
Windows Remote Access Services (RAS)
RAS is used in smaller networks where a dedicated dial-up router is not practical
or possible. In a RAS setup, you can basically connect a modem to a Windows NT
or Windows 2000 server and, by way of the RAS, configure that modem as dial-out
only, dial-up only, or a combination.
Remote Desktop Protocol (RDP)
The Remote Desktop Protocol (RDP) is very similar to the Independent Computing
Architecture (ICA) protocol used by Citrix products. As a matter of fact, RDP is
used to access Windows Terminal Services, a close relative of the Citrix WinFrame
product line. RDP performs the same basic functions as ICA, but it does it with a
lot less functionality.
18. Networking Tools & Safety
Crimping Tool
A crimping tool is a device used to conjoin two pieces of metal by deforming one or
both of them to hold each other. The result of the tool's work is called a crimp. An
example of crimping is affixing a connector to the end of a cable. For instance,
network cables and phone cables are created using a crimping tool (shown below) to
join RJ-45 and RJ-11 connectors to both ends of phone or Cat 5 cable
Network Cable Tester
One of the problems with wired networks is that when they cease to work,
troubleshooting may be a little more difficult as compared to wireless networks. This is
where a network cable tester can help you. A network cable tester is a useful device
that allows you to check the continuity of the cable to figure out if the signal is strong
enough to get through to the network. This helps to eliminate cable connectivity
issues while troubleshooting the problems.
Coaxial Compression Tool
The coaxial cable is the cable that includes the outer metal that does the conducting.
A central conducting core ensures that the metal is insulated. High frequency signals
are transmitted through this coaxial cable line. A coaxial compression tool is a useful
device that uses connectors to properly compress the coaxial cable. The side of the
cable wire will enable you to know which type of cable it is.
Multimeter Tool
A digital multimeter is a test tool used to measure two or more electrical values—
principally voltage (volts), current (amps) and resistance (ohms). It is a standard
diagnostic tool for technicians in the electrical/electronic industries.
19. Network Attacks
1. Malwares
2. Phishing
3. Man-In-the-Middle Attack
4. DDoS Attack
5. Cross-Site Scripting
6. SQL Injection Attack
Firewall
A firewall is a network security device, either hardware or software-based, which
monitors all incoming and outgoing traffic and based on a defined set of security
rules it accepts, rejects or drops that specific traffic.

Accept : allow the traffic


Reject : block the traffic but reply with an “unreachable error”
Drop : block the traffic with no reply

A firewall establishes a barrier between secured internal networks and outside


untrusted network, such as the Internet.
20. All about Network Security
Let’s Talk Briefly
21. All About Cloud Concepts
What is Cloud?

The term Cloud refers to a Network or Internet.


In other words, we can say that Cloud is
something, which is present at remote location.
Cloud can provide services over network, i.e.,
on public networks or on private networks,
i.e., WAN, LAN or VPN.
Applications such as e-mail, web
conferencing, customer relationship
management (CRM), all run in cloud.
What is Cloud
Computing?

Cloud Computing refers to manipulating,


configuring, and accessing the
applications online.
It offers online data storage, infrastructure
and application.

Cloud Computing is both a combination of


software and hardware based computing
resources delivered as a network service.
Cloud Computing
Architecture
Basic Concepts

There are certain services and models working behind the


scene making the cloud computing feasible and accessible to
end users. Following are the working models for cloud
computing:

1. Deployment Models

2. Service Models
Deployment Models

Deployment models define the type of access to the cloud, i.e., how the cloud is located?
Cloud can have any of the four types of access: Public, Private, Hybrid and Community.
PUBLIC CLOUD : The Public Cloud allows systems and services to be easily
accessible to the general public. Public cloud may be less secure because of its openness,
e.g., e-mail.

PRIVATE CLOUD : The Private Cloud allows systems and services to be accessible
within an organization. It offers increased security because of its private nature.

COMMUNITY CLOUD : The Community Cloud allows systems and services to be


accessible by group of organizations.

HYBRID CLOUD : The Hybrid Cloud is mixture of public and private cloud.
However, the critical activities are performed using private cloud while the non-critical
activities are performed using public cloud.
Service Models
Service Models are the reference models on which the Cloud Computing is based.
These can be categorized into three basic service models as listed below:

1.Infrastructure as a Service (IaaS)

2. Platform as a Service (PaaS)

3. Software as a Service (SaaS)


Infrastructure as a Service
(IaaS)
IaaS is the delivery of technology infrastructure as an on demand scalable service.
IaaS provides access to fundamental resources such as physical machines, virtual
machines, virtual storage, etc.

•Usually billed based on usage


•Usually multi tenant virtualized environment
•Can be coupled with Managed Services for OS and application support
Platform as a Service
(PaaS)
PaaS provides the runtime environment for applications, development &
deployment tools, etc.

PaaS provides all of the facilities required to support the complete life cycle
of building and delivering web applications and services entirely from the
Internet.

Typically applications must be developed with a particular platform in mind

•Multi tenant environments


•Highly scalable multi tier architecture
Software as a Service
(SaaS)
SaaS model allows to use software applications as a service to end users.

SaaS is a software delivery methodology that provides licensed multi-tenant access


to software and its functions remotely as a Web-based service.

• Usually billed based on usage


• Usually multi tenant environment
• Highly scalable architecture
22. All About IoT Concepts
What is IoT?
 Uniquely Identifiable objects or things( Things refer
to anything living or non living things with an
unique identity) communicate or transfer data
over a network without requiring human-to-human
or human-to- computer interaction.
WHAT IS THE IOT ?

 Many definitions /
examples:

Collect Visuali Smart


Devices /
Objects
Service Informati ze
on Data Contr
s ol
The most used communication
channels to communicate objects to
internet in the IoT
 WiFi
 Bluetooth
 Zigbee Wireless
 NFC
 WiFi direct
 Bluetooth Low Energy
BENEFITS OF IOT

 Tracking behaviour for real-time


 Enhanced situational awareness
 Sensor-driven decision analytics
 Process optimization
 Optimized resource consumption
 Instantaneous control and response in
complex autonomous systems
IOT BASICS

 What does an IoT project need?

 Device(s) that can communicate

 Applications

 Web

 Smartphone

 Users
Future?
23. Configuring a Switch (All Knowledge)
Let’s Configure in Packet Tracer
24. VLAN explained
VLAN

En > show vlan > vlan database > vlan 2 name v1 > int f0/1 > switchport access vlan 2
25. User authentication
1. API
2. Authorization
3. Authentication

1. PAP (Password Authentication Protocol) - Simple


2. CHAP (Challenge Handshake Protocol) – Handshake File
3. EAP (Extensible Authentication Protocol) – Smart Card
26. Network Policies
Network Security Policy
A network security policy is a formal document that outlines the principles, procedures
and guidelines to enforce, manage, monitor and maintain security on a computer
network. It is designed to ensure that the computer network is protected from any act or
process that can breach its security.
•Rules and legal procedures to access the network and to modify its
characteristics.
•Governance and management over Web/Internet access
•Implementation of security procedures (access control) on network nodes and
devices
•Role/Privilege based policies, such as identifying authorized and unauthorized
services/processes any user can perform on the network
27. Everything about Virtualization
Virtualization
28. Everything about SOHO
What is SOHO network
SOHO networks are small LANs (Local Area Networks). Typically, SOHO networks
consists of less than 10 computers. Network service servers like DNS server, email
server, web server etc., are typically configured outside SOHO network.
A SOHO network can be a small wired Ethernet LAN or made of both wired and
wireless computers.
What is SOHO Routers
A SOHO router is a broadband router built and marketed for small offices
and home offices. Since the workload for these types of businesses is
primarily on the internet, they require a local area network (LAN), which
means their network hardware is structured specifically for that purpose.
A SOHO network can be a mixed network of wired and wireless
computers. Since these types of networks are meant for businesses,
they may also include printers and sometimes ​voice over IP (VoIP) and
fax over IP technology.
29. Networking Commands
UTILITIES

1. PING
2. TRACERT
3. NSLOOKUP
4. NETSH INTERFACE IPV4 SET ADDRESS NAME=“” STATIC
5. NETSH WLAN
30. Networking Issues & Troubleshooting
What is Network Troubleshooting ?

• Network troubleshooting is the collective measures and processes


used to identify, diagnose and resolve problems and issues within a
computer network.
• It is a systematic process that aims to resolve problems and restore
normal network operations within the network.
Basic network troubleshooting
Adapter Resources :

Verify that the network


adapter is properly
installed and detected
by the computer with no
conflicts. If conflicts
exist or the network
adapter is being
detected as an "Other
device", the network
card has likely not been
properly installed in the
computer.
Verify connections
If this is a wired network, verify that the network cable is properly
connected and make sure the LEDs next to the network jack are
properly illuminated. , a network card with a solid green LED or
light usually indicates that the card is either connected or receiving
a signal. If the green light is flashing, this is an indication of data
being sent or received. The picture to the right is an example of a
LAN port with two LED indicators next to the RJ-45 port. If there are
no lights or the lights are orange or red, the card may be bad, not
connected properly
Wireless Network :
If you're using a laptop with a wireless network, look for the
laptop's Wi-Fi button and make sure it is turned on. Many
laptops have a Wi-Fi button that allows the wireless network
to be turned on and off. The Wi-Fi button is often located
just above the keyboard or on the front edge of the laptop,
but it also may be integrated with a F key as well.

If the button is turned on, make sure you're using the


correct Wi-Fi hotspot by right-clicking on the Network icon
in the Windows Notification Area and clicking "Connect to a
network". Usually, the network with the strongest
connection (the most bars) will be your wireless router.
Adapter functionality:

• Verify that the network card is capable of pinging itself by using


the ping command. Windows users can ping the computer from
a Windows command line. Unix and Linux users can ping from
the shell.

ping 127.0.0.1

ping localhost
Firewall:
If your computer network utilizes
a firewall, make sure all
required ports are open, especially port
80, which is the HTTP port. If possible,
disable the firewall software or
disconnect the computer from the
firewall to make sure it is not causing
the network problems.
The Internet is not working
1. Turn off the power to the computer and leave it off.
2. Unplug the power cable to your router and cable
modem or DSL modem.
3. Leave the power cables disconnected for 10-15 seconds,
plug in your modem again, and then plug in your router
again.
4. Finally, turn on your computer and see if you can ping your
router.
5. If after following the above steps, the Internet is still not
working, open the Windows command line and run the
ping google.com
below command.
Additional troubleshooting:
• Another method of determining network issues is to use the tracert
command if you are a Windows user or the traceroute command if
you are a Linux or Unix variant user. This command gives you an
overview of each of the devices (routers) a packet travels (hops)
over a network. It can also give you an idea of where a problem
exists in your network or outside of your network.

tracert google.com

traceroute google.com
SOME PROBLEM AND SOLUTION PART :

Question : A Network Cable Is Unplugged


Answer : This message appears as a Windows desktop balloon. Several
different conditions can generate this error each with their own
solution, including bad cabling or issues with the device drivers.
If your connection is wired, you may lose access to the network. If
on wireless, your network will probably function normally but this error
message will become an annoyance since it pops up repeatedly until the
issue is addressed.
Question : IP Address Conflict (Address Already in
Use)

Answer : If a computer is set up with a static IP address that's being


used by some other device on the network, the computer (and
possibly also the other device) will be unable to use the network.
An example is two or more devices using the IP
address 192.168.1.115.
In some cases, this problem can even occur
with DHCP addressing.
Question : The Network Path Cannot Be Found

✖ Answer : Updating the TCP/IP configuration can


resolve this issue when trying to access another
device on the network.
✖ You might see it when using the incorrect name for the
network resource if the share doesn't exist, if the times
on the two devices are different or if you don't have the
right permissions to access the resource.
Question : Connected with Limited
Access

Answer : A technical glitch in Windows can cause this error message


to appear when making certain types of wireless connections, which
is why Microsoft provided a fix for it in a service pack update for
Windows Vista systems.
You might still find this error in other versions of Windows too,
though. It can also occur on a home network for other reasons that
might require you to reset your router or connect and then
disconnect from the wireless connection.
Hope Guys You got the point of the Video

You might also like