1 / 32

FUNDAMENTALS OF NETWORKING

METHOD OF INSTRUCTION. FUNDAMENTALS OF NETWORKING. Presented by ASI/RM S K SATAPATHY. PREVIEW. Introduction Architecture Network connectivity Type Of Network Types of Topology. Network Procedure (Hardware / Software) Checking Procedure & Sum Up. PHASE-I. INTRODUCTION.

svein
Download Presentation

FUNDAMENTALS OF NETWORKING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. METHOD OF INSTRUCTION FUNDAMENTALS OF NETWORKING Presented by ASI/RM S K SATAPATHY

  2. PREVIEW • Introduction • Architecture • Network connectivity • Type Of Network • Types of Topology. • Network Procedure (Hardware / Software) • Checking Procedure & Sum Up

  3. PHASE-I INTRODUCTION • In networking two or more personal computers are connected together for transferring data or information with each other. A network allows scanner CD writer, hard disk, printer etc. By using Networking one can :- • Share the information • Share the peripherals • Share the applications • Share of Software Network is built with Hardware as well as software

  4. PHASE-II NETWORK ARCHITECTURE • Peer To Peer Architecture Any computer / user can act as both server and a client. Simple and relatively inexpensive way to share access to expansive peripherals & does not need a centralized administrative staff. It has some limitations: i) It is difficult to administrate ring a decentralization network too complicated if the no of user increases. ii) Maintenance will be also become complicated and security may not be centralized. However it is a great solution for small offices and home offices.

  5. PEER TO PEER NETWORK

  6. NETWORK ARCHITECTURE b)Client-server Architecture: • One centralized server manages to shared resources and security for other network user. • Server is dedicated to network services. For preventing casual access server are locked in server room. • Essential to invest time and money on training to create and maintain the central server and to develop a qualified administrative staff. Advantages: • Can support many more users than peer to peer network (users may be thousand or even million) • Can centralize the resources on optimizing the server. • Storing data centrally make it easier to secure, monitor and back up. • Centralize security makes security more consistent and protect the network better

  7. CLIENT SERVER ARCHITECTURE

  8. PHASE-III Network connectivity • A)HUB Passive HUB : It is a connecting unit that add nothing to the data passing through them Active HUB : A connecting unit that regenerates the data bits in order to maintain a strong signal

  9. Network connectivity • BRIDGE:Electronic devices that controls flow of information between LAN or networks even if they are different types of network using different communication protocol. • Router:A device that determines the best path for a data pocket to be sent from one network to another and forward the massage along that path. • Gateways: it connects the WAN to abroad the country. • Firewall:A method of keeping network secure.

  10. NETWORK MEDIA • Most commonly used Ethernet network interface cards. Currently Ethernet technology are 10 Base-2 , which transmission ratio is 10 MBPS & uses twisted pair copper wire. 100Base-T Having speed of 100 MBPS &Twisted pair copper wire. Another Gigabyte Ethernet is an extension to the highly successful 10 MBPS & 100 MBPS Ethernet standards its speed extended up to 1000 MBPS.

  11. NETWORK INTERFACE CARD

  12. PHASE-IV TYPE OF NETWORK • Many types of topologies are used in world but mainly three types of networking can categorized as several different ways: • LAN (Local Area Network) • MAN (Metropolitan Area Network) • WAN (Wide area Network)

  13. TYPE OF NETWORK LOCAL AREA NETWORK: Local Area Network is a type of network typically reaches in single home, office, and building and can say our campus of this school. Can say it is a network device over relatively short distances. A single person can be owned or controlled or manage it.

  14. LOCAL AREA NETWORK

  15. TYPE OF NETWORK • METROPOLITAN AREA NETWORK: MAN connects an area more than local area network and less than wide area network i.e. our city with dedicated highly performance network. • WIDE AREA NETWORK: WAN reaches across the city, states, country as well as across the world wide (World Wide Web).

  16. Wide Area Network (PSTN Based) PSTN Exchange Modem Modem Remote Office Remote Office

  17. PHASE-V Type of Topology Mainly four types of topologies were commonly comes in existence • Bus Topology • Ring Topology • Star Topology • Mesh Topology • Hybrid Topology

  18. Bus Topology

  19. RING

  20. STAR

  21. MESH

  22. HYBRID

  23. PHASE -VI NETWORK PROCEDURE • Installation Of Ethernet Card: • Switch off the Computer &Attach in expansion slot (ISA, EISA or PCI) • Properties • Secure its mounting • Turn on computer • MY Computer • Insert Driver CD in CD ROM • OK • Click on Device Manager • Close all dialogue box

  24. CONNECTIVITY • Cable Connection( CAT 5 OR CAT 6 White Of Orange(1) Orange (2) White Of green (3) Blue (4) White of blue (5) Green (6) White of Brown (7) Brown (8)

  25. CONNECTIVITY • When Connected PC at the more distance than pair will change as per given: • 1 • 2 • 3 • 4 • 5 • 6 • 7 • 8

  26. CONNECTIVITY When 2 PCs are connected than pair will change as per criss-cross as per given: 1 5 2 6 3 1 4 4 5 3 6 2 7 7 8 8

  27. PROTOCOL Set of rules and regulations, which are adopted, by any network to exchange the data from one terminal to another terminal through network efficiently and correctly. Rules are either affected by hardware or software. • Two types of network protocol are used • NET BEUI • TCP /IP

  28. IP ADDRESS • Made up by 4 bytes or 32 bits each of 4 byte is written in its decimal equivalent and separated by periods. • In form of192.168.0.10. • Because of popularity of internet this scheme is running out of possible add. (New scheme is IPng ( Next generation) using 16 bytes instead of 4 bytes.)

  29. IP ADDRESS • Installation of TCP/IP protocol and assigning IP Address: • Network neighborhoodProperties • Select protocol & Add • SelectMicrosoftSelectTCP/IP • Save your Change • Restart PC & • SelectTCP/IP protocolAndProperties • Select specify Address as below: • IP ADDRESS 192.168. 0 . 10 • Subnet Mask 255.255.255. 0 • Default Gateway 192.168. 0 . 18

  30. PHASE -VII Checking Procedure • Query: For query about network status • Click on StartProgramMs DOS Prompt • a) C:\windows>Type IP Config Shows the 0wn IP Address & subnet mask • b) C:\windows>Type PING 192.168.0.99 Shows connectivity of own LAN Card if own IP address is 192.168.0.99) • c) C:\windows>Type PING 192.168.0.07 Show connectivity of Another PC Or client which IP address is 192.168.0.07 connected with LAN)

  31. SUM UP Today we have discussed about fundamentals of networking.Tomorrow we will discuss about OSI model. If anybody have any question……………. • PHASE-I • PHASE-II • PHASE-III • PHASE-IV • PHASE-V • PHASE-VI • PHASE-VII

  32. THANKING "U"

More Related