SlideShare a Scribd company logo
NETWORKING BASICS LOKESH KUMAR N
UNICAST Unicast is One to One communication
MULTICAST  Multicast is One to Group Communication
BROADCAST Broadcast is One to All Communication
TOPOLOGY A topology is a description of any kind of locality in terms of its layout. In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines  The physical topology   of a network describes the layout of the cables and workstations and the location of all network components Common Topology: Bus,  Ring, Star and  Mesh
BUS TOPOLOGY In a bus topology, all computers are attached to a single continuous cable that is terminated at both ends, which is the simplest way to create a physical network Terminator
STAR TOPOLOGY Unlike those in a bus topology, each computer in a star topology   is connected to a central point by a separate cable. The central point is a device known as a hub Although this setup uses more cable than a bus, a star topology is much more fault tolerant than a bus topology. This means that if a failure occurs along one of the cables connecting to the hub, only that portion of the network is affected, not the entire network. It also means that you can add new stations just by running a single new cable
RING TOPOLOGY In the ring topology, each computer is connected directly to two other computers in the network. Data moves down a one-way path from one computer to another i.e. clock wise Laying out cable in a ring is that the cable design is simple. The bad news is that, as with bus topology, any break, such as adding or removing a computer, disrupts the entire network. Also, because you have to “break” the ring in order to add another station, it is very difficult to reconfigure without bringing down the whole network
RING TOPOLOGY Note:  Even though all computers are connected through a single cable, if there is a break all the computer connected to the ring topology will not work  Example:  If Machine A Wants to talk to Machine D The data can travel only Clock Wise If there is a break in the loop the data cannot be transferred  A B C D
MESH TOPOLOGY In a mesh topology, a path exists from each station to every other station in the network. While not usually seen in LANs, a variation on this type of topology—the hybrid mesh—is used on the Internet and other WANs in a limited fashion.  Hybrid mesh topology networks can have multiple connections between some locations, but this is done only for redundancy.  Also, it is not a true mesh because there is not a connection between each and every node, just a few for backup purposes
COAXIAL CABLE Coaxial cable consists of a central copper core surrounded by an insulator, a braided metal shielding, called braiding, and an outer cover, called the sheath or jacket EG : Cable TV network and Cable Modem use the coaxial cable
COAXIAL CABLE CONNECTOR
THICKNET (10BASE5)  Thicknet cabling, also called thick wire Ethernet, is a rigid coaxial cable approximately 1-cm thick used for the original Ethernet networks.Thicknet is also called “yellow Ethernet” or “yellow garden hose.” IEEE designates Thicknet as 10Base5 Ethernet.The “10” represents its throughput of 10 Mbps, the “Base” stands for baseband transmission, and the “5” represents the maximum segment length of a Thicknet cable, which is 500 m. You may find this on older networks . Coaxial Cable Thicknet
THINNET (10BASE2) Thinnet, also known as thin Ethernet, was the most popular medium for Ethernet LANs in the 1980s. Thinnet is rarely used on modern networks, although you may encounter it on networks installed in the 1980s or on newer small office or home office LANs IEEE has designated Thinnet as 10Base2 Ethernet, with the “10” representing its data transmission rate of 10 Mbps, the “Base” representing the fact that it uses baseband transmission, and the “2” representing its maximum segment length of 185 (or roughly 200) m. Coaxial Cable Thinnet
TWISTED PAIR (TP)   Twisted-pair (TP) cable is similar to telephone wiring and consists of color-coded pairs of insulated copper wires. The more twists per inch in a pair of wires, the more resistant the pair will be to all forms of noise. Higher-quality, more expensive twisted-pair cable contains more twists per foot. The number of twists per meter or foot is known as the twist ratio.
TWISTED PAIR (TP) Twisted-pair cable is the most common form of cabling found on LANs today. It’s inexpensive, flexible, and easy to install, and it can span a significant distance before requiring a repeater (though not as far as coax). Twisted-pair cable easily accommodates several different topologies, although it is most often implemented in star or star-hybrid topologies One drawback to twisted-pair is that, because of its flexibility, it is more prone to physical damage than coaxial cable. All twisted-pair cable falls into one of two categories: shielded twisted-pair (STP) or unshielded twisted-pair (UTP).
SHIELDED TWISTED-PAIR (STP)   As the name implies, shielded twisted-pair (STP) cable consists of twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil. Some STP use a braided metal shielding. The shielding acts as a barrier to external electromagnetic forces, thus preventing them from affecting the signals traveling over the wire inside the shielding. The shielding may be grounded to enhance its protective effect.
UNSHIELDED TWISTED-PAIR (UTP)   Unshielded twisted-pair (UTP) cabling consists of one or more insulated wire pairs encased in a plastic sheath. As its name implies, UTP does not contain additional shielding for the twisted pairs. As a result, UTP is both less expensive and less resistant to noise than STP
UTP TYPES UTP CAT 1/2/3/4/5/6 Cat 1 Data Rate upto 1 Mbps – Telephone Line Cat 2 Date Rage upto 4 Mbps – Token Ring Cat 3 Data Rate upto 10 Mbps – Token Ring & 10 Base – T Cat 4 Data Rate upto 16 Mbps – Token Ring Cat 5 Date Rate up to 100 Mbps Ethernet – 16 for Token Ring Cat 5e Data Rage upto 1000 Mbps Ethernet Cat 6 Data Rate upto 1000 Mbps Ethernet
FIBER OPTIC  A fiber-optic system is similar to the copper wire system that fiber-optics is replacing. The difference is that fiber-optics use light pulses to transmit information down fiber lines instead of using electronic pulses to transmit information down copper lines.
FIBER OPTIC Bandwidth Up to 100s of Gbps Distance (100 +KM) Three Types Single Mode Multi Mode Plastic Optical Fiber Mode
STRAIGHT THROUGH CABLE Pin Number  Wire color Wire  Becomes Pin number  Wire color  Pin 1  Orange / White   Pin 2  Orange   Pin 3  Green / White Pin 4  Blue   Pin 5  Blue/White   Pin 6  Green   Pin 7  Brown/White Pin 8  Brown   1  1 2  2 3  3 6  6 Pin 1  Orange / White   Pin 2  Orange   Pin 3  Green / White Pin 4  Blue   Pin 5  Blue/White   Pin 6  Green   Pin 7  Brown/White Pin 8  Brown
STRAIGHT THROUGH CABLE  In a UTP implementation of a straight-through cable, the wires on both cable ends are in the same order You can determine that the wiring is a straight-through cable by holding both ends of the UTP cable side by side and seeing that the order of the wires on both ends is identical You can use a straight-through cable for  dissimilar devices   Connecting a router to a hub or switch    Connecting a server to a hub or switch    Connecting workstations to a hub or switch
CROSS OVER CABLE   Pin Number  Wire color Wire  Becomes Pin number  Wire color  Pin 1  Orange/White   Pin 2  Orange   Pin 3  Green / White Pin 4  Blue   Pin 5  Blue/White   Pin 6  Green   Pin 7  Brown/White Pin 8  Brown   1  3 2  6 3  1 6  2 Pin 1  Green/White   Pin 2  Green   Pin 3  Orange/White Pin 4  Blue   Pin 5  Blue/White   Pin 6  Orange   Pin 7  Brown/White Pin 8  Brown
STRAIGHT THROUGH / X- OVER CABLE   The Transmit and Receive pins are shown above
CROSS OVER CABLE In the implementation of a crossover, the wires on each end of the cable are crossed  Transmit to Receive and Receive to Transmit on each side, for both tip and ring Notice that pin 1 on one side connects to pin 3 on the other side, and pin 2 connects to pin 6 on the opposite end You can use a crossover cable for  similar devices Connecting uplinks between switches  Connecting hubs to switches  Connecting a hub to another hub.
WHERE TO USE STRAIGHT THROUGH AND CROSS OVER CABLE Similar Devices Cross Over Cable Dissimilar Devices Straight through Cable Hub / Switch PC PC PC
REGISTERED JACK (RJ) RJ-11 – Defined for telephone connectors RJ-45 – Defined for UTP connectors RJ 45 RJ 11
LOCAL AREA NETWORK (LAN) A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings
WIDE AREA NETWORK (WAN) A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs)
INTRANET
INTERNET
OPEN SYSTEM INTERNETCONNECT (OSI)  The OSI model was designed to promote interoperability by creating a guideline for network data transmission between computers that have different hardware vendors, software, operating systems, and protocols
OSI  The OSI reference model illustrates the networking process as being divided into seven layers. This theoretical construct makes it easier to learn and understand the concepts involved. At the top of the model is the application that requires access to a resource on the network, and at the bottom is the network medium itself As data moves down through the layers of the model, the various protocols operating there prepare and package it for transmission over the network. Once the data arrives at its destination, it moves up through the layers on the receiving system, where the same protocols perform the same process in reverse
OSI  OSI developed by International Organization for Standardization (ISO) in 1974 It consists of Seven Layers Each layer has specific processing function
OPEN SYSTEM INTERCONNECT
DATA COMMUNICATION WITH OSI How data travels through the layers of the OSI model Peer  Communication  Information flow Network Medium
OSI In Physical Layer data will be converted into Binary (0’s & 1’&) It transmits raw bit stream over physical cable  The Physical layer defines all the electrical and physical specifications for devices  Physical Layer defines techniques to transfer bit stream to cable   Hub and Repeater works in Physical Layer
OSI Data Link Layer handles data frames between the Network and Physical layers  It Receives end packages raw data from the Physical layer into data frames for delivery to the Network layer as packets Error detection is happening in this layer Data link Layer is divided in to two layers:     LLC (Logical Link Control) and MAC ( Media Access Control) Switch, Bridge and Network Interface card works in Data Link Layer
OSI Network Layer is responsible for providing best path for data to reach the destination Logical addressing is happening in this layer Network Layer translates logical network address and names to their physical address (e.g. computer name = MAC address) Router works in Network Layer
OSI Transport Layer is responsible for reliable delivery of data. It is also known as the heart of OSI layers Provides error-checking to guarantee error-free data delivery, with on losses or duplications  Provides acknowledgment of successful transmissions; requests retransmission if some packets don’t arrive error-free  The major function of the Transport Layer is Error Correction  Identifying Service,  Multiplexing & De-multiplexing and Segmentation are happening in this layer  Brouter and Gateway works in Transport Layer
BREAKING DATA IN TO SEGMENTS Data
OSI Session Layer is responsible for establishing, maintaining and terminating session  Responsible for name recognition (identification) so only the designated parties can participate in the session  Manages who can transmit data at a certain time and for how long Provides synchronization services by planning check points in the data stream if session fails, only data after the most recent checkpoint need be transmitted  Gateway works in Session Layer
OSI Presentation layer is responsible for presenting the data in a standard format and data translation (formatting) The Presentation layer relieves the Application layer of concern regarding syntactical differences in a message's data representation within the end-user systems  Following tasks are performed in Presentation Layer:  Encoding – Decoding Encryption – Decryption  Compression – Decompression  Gateway Works in Presentation Layer
OSI Application Layer provides the operating system  with  direct access to network services  Application layer provides an interface so that processes such as Excel or Word that are running on the local machine can get access to network services (E.G., retrieving a file from a network server)  Handles network access, flow control and error recovery  It serves as the interface between the user and the network It’s a user specific layer    Gateway works in Application layer
OSI  Data Flow in OSI HUB Switch Router Gateway
OSI
OSI  OSI Layers TCP/IP Layers
IP ADDRESSING Internet Protocol Address is given to the computer as an identifier to a computer in a TCP/IP Network  IP Address is also known as Logical Address IP Address works in Layer 3 (Network) Two versions of IP Addressing  IP Version 4 - 32 bit address (Currently we are using)  IP Version 6 - 128 bit address
IP ADDRESSING  IP Address is divided in to Network Portion and Host Portion  Class A is written as N. H.H.H Class B is written as N.N. H.H Class C is written as N.N.N. H
IP ADDRESSING
IP ADDRESS  Class A 1 - 126 Class B 128 - 191 Class C 192 - 223 Class D 224 - 239 Class E 240 - 254 Class Range Widely Used Multicast Research & Development
IP ADDRESSING Private IP Address Range  Class Network Address A 10.0.0.0 through 10.255.255.255 B 172.16.0.0 through 172.31.255.255 C 192.168.0.0 through 192.168.255.255 Class First Bits First Byte Values Network ID Bits Host ID Bits Number of Networks Number of Hosts A B C 0 10 110 1 - 126 128 -191 192 - 223 8 16 24 24 16 8 126 16,384 2,097,152 16,77,214 65,534 254
IP ADDRESSING Loop Back Address:  The IP address 127.0.0.1 is used as the loop back address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing
IP ADDRESSING   Loop Back address is also known as semi broad cast address Range of Loop back address : 127.0.0.1 to 127.255.255.254 Any IP address starts with 127 is known as loop back address  Click Start   Run    Type cmd    Ping 127.56.26.36
SUBNET MASK Class   Default Subnet Mask Class A is written as 255. 0.0.0  N. H.H.H Class B is written as 255.255. 0.0  N.N. H.H Class C is written as 255.255.255. 0  N.N.N. H Subnet Mask is to differentiate the  Network ID  and  Host ID Two numbers reserved for Subnet Mask i.e.   0   &  255 0   Denotes  Host  and  255  Denotes  Network
SUBNET MASK IP Address :  10.20.50.26   Subnet Mask :  255. 0.0.0   For this IP Address : Network ID is  :  10. 0.0.0 First Valid IP Address :  10. 0.0.1   Last Valid IP Address :  10. 255.255.254 Broad Cast Address  :  10. 255.255.255 Number of hosts =   ( 256x256x256 ) -2
SUBNET MASK IP Address :  10.20.50.26  Subnet Mask :  255.255. 0.0   For this IP Address : Network ID is  :  10.20. 0.0 First Valid IP Address :  10.20. 0.1 Last Valid IP Address :  10.20. 255.254 Broad Cast Address  :  10.20. 255.255 Number of hosts =  ( 256x256 )   – 2
SUBNET MASK IP Address :  10.20.50.26  Subnet Mask :  255.255.255 .0   For this IP Address : Network ID is  :  10.20.50. 0 First Valid IP Address :  10.20.50. 1 Last Valid IP Address :  10.20.50. 254 Broad Cast Address  :  10.20.50. 255  Number of hosts =  ( 256 )   – 2
SUBNET MASK  IP Address  172.26.28.36  Subnet Mask :  255 .0.0.0 For this IP Address: Network ID is :  172. 0.0.0 First Valid IP Address :  172. 0.0.1 Last Valid IP Address :   172. 255.255.254 Broad Cast Address :  172. 255.255.255 Number of hosts =   ( 256x256x256 ) -2
SUBNET MASK IP Address  172.26.28.36  Subnet Mask :  255.255. 0.0 For this IP Address: Network ID is :  172.26. 0.0 First Valid IP Address :  172.26. 0.1 Last Valid IP Address :  172.26. 255.254 Broad Cast Address :  172.26. 255.255 Number of hosts =  ( 256x256 )   – 2
SUBNET MASK IP Address  172.26.28.36  Subnet Mask  255.255.255. 0 For this IP Address: Network ID is :  172.26.28. 0 First Valid IP Address :  172.26.28. 1 Last Valid IP Address :  172.26.28. 254 Broad Cast Address :  172.26.28. 255 Number of hosts =  ( 256 )   – 2
SUBNET MASK IP Address  192.168.0.152   Subnet Mask  255. 0.0.0 For this IP Address: Network ID is :  192. 0.0.0 First Valid IP Address :  192. 0.0.1 Last Valid IP Address :  192. 255.255.254 Broad Cast Address :  192. 255.255.255 Number of hosts =   ( 256x256x256 ) -2
SUBNET MASK IP Address  192.168.0.152   Subnet Mask  255.255. 0.0 For this IP Address: Network ID is :  192.168. 0.0 First Valid IP Address :  192.168. 0.1 Last Valid IP Address :  192.168. 255.254 Broad Cast Address :  192.168. 255.255 Number of hosts =  ( 256x256 )   – 2
SUBNET MASK For this IP Address: Network ID is :  192.168.0. 0 First Valid IP Address :  192.168.0. 1 Last Valid IP Address :  192.168.0. 254 Broad Cast Address :  192.168.0. 255 Number of hosts =  ( 256 )   – 2   IP Address  192.168.0.152   Subnet Mask  255.255.255. 0
BROADCAST ADDRESS  Messages that are intended for all computers on a network are sent as broadcasts These messages always use the IP address 255.255.255.255  Any IP Address with last Octet as 255 is known as broadcast address for that particular network E.g.: 10.255.255.255  The IP address of  0.0.0.0  is used for the default network
HOW TO ASSIGN STATIC IP ADDRESS AND SUBNET MASK High light Local Area Connection    Right Click    Select Properties Select Internet Protocol (TCP/IP) and select “Properties”
HOW TO ASSIGN STATIC IP ADDRESS AND SUBNET MASK When ever you assign a Static IP Address it’s Mandatory to assign static DNS For Windows 2000 and above Subnet Mask will be automatically assigned by the computer with the help of Network ID
MAC ADDRESS The Media Access Control address (MAC) can be equated to the serial number of the NIC. Every IP packet is sent out of your NIC wrapped inside an Ethernet frame which uses MAC addresses to direct traffic on your locally attached network MAC addresses therefore only have significance on the locally attached network. As the packet hops across the Internet, its source/destination IP address stays the same, but the MAC addresses are reassigned by each router on the way using a process called ARP
MAC ADDRESS  MAC addresses are usually written in one of the  following two formats: 00:13:21:0F:83:DF  00-13-21-0F-83-DF Mac address is a 48 bit address Mac address are 12 digit Hexadecimal {0-9} {A- F} Address
MAC ADDRESS  The First Octet of the MAC Address is known as Group Unique  00  : 13 : 21 : 0F : 83 : DF The Second and Third Octet of the MAC Address is known as Organization Unique Identifier (OUI) 00 :  13 : 21  : 0F : 83 : DF
MAC ADDRESS  Any Mac address starts with  00  is known as Unicast address  00  : 13 : 21 : 0F : 83 : DF Any Mac address starts with  01  is known as Multicast  01  : 13 : 21 : 0F : 83 : DF Any Mac address starts with  FF  is known as Broadcast  FF  : 13 : 21 : 0F : 83 : DF
MAC ADDRESS
REQUEST TIMED OUT The ping command timed out because there was no reply from the host. The source and the destination computer are in the same network When Ping command is initiated from one system to the other in a network if the firewall is enabled on the Destination System Request Timed Out error will Pop up
DESTINATION HOST UNREACHABLE The host that you are trying to ping is in a different network. Destination and the source belong to the different network
Difference between Request timed out and Destination Host Unreachable IP : 192.168.1.53 Mask : 255.255.255.0 D.G : 192.168.1.1 IP : 192.168.0.8 Mask : 255.255.255.0 D.G : 192.168.0.1 IP : 192.168.2.56 Mask : 255.255.255.0 IP : 192.168.1.36 Mask : 255.255.255.0 Hub/Switch Hub/Switch
DIFFERENCE BETWEEN DESTINATION HOST UNREACHABLE AND DESTINATION HOST NET UNREACHABLE   Cable/DSL Modem WAN Side LAN Side Note:  Since the Router is not able to pass the  WAN interface  it is giving the reply from  LAN interface IP : 192.168.2.168 Mask : 255.255.255.0 IP : 192.168.1.192 Mask : 255.255.255.0 Hub/Switch Router Internet
DESTINATION NET UNREACHABLE Destination Net Unreachable   message is one which a user would usually get from the Default Gateway when it doesn't know how to get to a particular net work
UNKNOWN HOST If the DNS resolution is not happening the computer will display as “Unknown host” Global DNS has to be assigned to fix this issue
COMMAND PROMPT ERROR If the static IP Address is assigned to the computer and if we tried to renew the IP Address it will display as “Operation failed as no adapter is in the state permissible for this operation
ERROR CODE 28 (COMMAND PROMPT Direct Firewall or PIX or Norton Internet Security Installed (NIS)
ERROR CODE 65 (COMMAND PROMPT Anti Spy Ware or Zone Alarm in the Computer
SOCKET ERROR
DIGITAL SIGNATURE Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes. To be effective, digital signatures must be unforgeable
DIGITAL SIGNATURE A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real
NIC CARD INSTALLATION  Physically install the network adapter, and then restart the PC.
NIC CARD INSTALLATION If the Operating System is Windows 2000 and above the screen will display as New Hardware Found and select “Next” Select the “Hardware Type”
NIC CARD INSTALLATION SMC 1211 TX Select “Display a List” Select the “Manufacturer” and Click “Have Disk”
NIC CARD INSTALLATION Select “Browse” Select the Location as CD-Rom  Select “Browse”
NIC CARD INSTALLATION Select the “Drivers” Select the “File” and Click “OK”
NIC CARD INSTALLATION Click “OK”
NIC CARD INSTALLATION Click “Yes” to restart the computer Check the Device Manager for Device Status

More Related Content

PPTX
PPTX
Ccna PPT
PDF
2 Basic Principal Of Utp Installation
PPTX
Types of computer networks
PDF
1 Introduction To Premises Cabling System
PPT
Cabling
PPTX
2019 types of network cables
PDF
Estructura de una red
Ccna PPT
2 Basic Principal Of Utp Installation
Types of computer networks
1 Introduction To Premises Cabling System
Cabling
2019 types of network cables
Estructura de una red

What's hot (20)

PPTX
Troubleshooting Network and Network Utilities
PDF
Basic Campus Network Design - Network Cabling System
PPTX
T2 meios de transmissao metalicos
PPT
network Switch
PDF
3 Basic Principal Of Fo Installation
PPTX
CCNA ppt Day 1
PPTX
Computer network
PPTX
Network address translation
PPTX
Network and types of network
PPT
Ccn unit-2- data link layer by prof.suresha v
PPT
Ccna Presentation
PDF
CCNAv5 - S2: Chapter 8 single area ospf
PPTX
ccna networking ppt
PPTX
Understanding TCP/IP
PPTX
Meios de transmissão metálicos
 
PPTX
Cablagem
PDF
Wireless Local Area Networks
PPTX
IPv6 address
PPTX
Networking devices
PPTX
Cabos coaxiais
Troubleshooting Network and Network Utilities
Basic Campus Network Design - Network Cabling System
T2 meios de transmissao metalicos
network Switch
3 Basic Principal Of Fo Installation
CCNA ppt Day 1
Computer network
Network address translation
Network and types of network
Ccn unit-2- data link layer by prof.suresha v
Ccna Presentation
CCNAv5 - S2: Chapter 8 single area ospf
ccna networking ppt
Understanding TCP/IP
Meios de transmissão metálicos
 
Cablagem
Wireless Local Area Networks
IPv6 address
Networking devices
Cabos coaxiais
Ad

Viewers also liked (12)

PPTX
CCNA IP Address Presentation(Part 1)
PDF
Networking Basics - Sales Account Manager Training
PPTX
Information Security for Enterprise
PDF
Networking Basics
PPTX
CCNA IP Address,Subnet mask (part 2)
PPT
Internetworking fundamentals(networking)
PDF
Information Security Business Middle East 2011
PPTX
Straight&Cross-over cable connection
PPTX
Network cable
PDF
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
PPT
Basic concepts of computer Networking
PPTX
Lan, man and wan ppt final
CCNA IP Address Presentation(Part 1)
Networking Basics - Sales Account Manager Training
Information Security for Enterprise
Networking Basics
CCNA IP Address,Subnet mask (part 2)
Internetworking fundamentals(networking)
Information Security Business Middle East 2011
Straight&Cross-over cable connection
Network cable
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Basic concepts of computer Networking
Lan, man and wan ppt final
Ad

Similar to Networking Basics (20)

PPT
Networking Basics
PPT
Chapter 3 Networking
PPTX
Open Elective MSE.pptx
PPTX
Mba i-ifm-u-4-data communication and network
PPTX
Mba i-ifm-u-4-data communication and network
PDF
Computer Network Manual
PPTX
Network adpater,cabel,cards ,types, network devices
PDF
C n practical file
PPT
5 intro to networking
PPT
5 intro to networking
PPT
5 intro to networking
PPTX
Network and its concepts
PPT
Arvind Singh
PPT
basic networking
PPT
What Is A Network made by Ms. Archika Bhatia
PPTX
NFPhysical Layer.pptx
PPT
01 network topologies
PPT
1414407496.309801 network topologies
PPT
1414407496.309801 network topologies (1)
PPT
1414407496.309801 network topologies
Networking Basics
Chapter 3 Networking
Open Elective MSE.pptx
Mba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and network
Computer Network Manual
Network adpater,cabel,cards ,types, network devices
C n practical file
5 intro to networking
5 intro to networking
5 intro to networking
Network and its concepts
Arvind Singh
basic networking
What Is A Network made by Ms. Archika Bhatia
NFPhysical Layer.pptx
01 network topologies
1414407496.309801 network topologies
1414407496.309801 network topologies (1)
1414407496.309801 network topologies

More from Lokesh Kumar N (7)

PPT
Linux Intro
DOC
Lotus Notes 7.0.3
PPT
Virus, Worms And Antivirus
PPT
Mother Board
DOC
Basic Things About Motherboard
PPT
Atx Motherboard Knowledge
Linux Intro
Lotus Notes 7.0.3
Virus, Worms And Antivirus
Mother Board
Basic Things About Motherboard
Atx Motherboard Knowledge

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Cloud computing and distributed systems.
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
Cloud computing and distributed systems.
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Networking Basics

  • 2. UNICAST Unicast is One to One communication
  • 3. MULTICAST Multicast is One to Group Communication
  • 4. BROADCAST Broadcast is One to All Communication
  • 5. TOPOLOGY A topology is a description of any kind of locality in terms of its layout. In communication networks, a topology is a usually schematic description of the arrangement of a network, including its nodes and connecting lines The physical topology of a network describes the layout of the cables and workstations and the location of all network components Common Topology: Bus, Ring, Star and Mesh
  • 6. BUS TOPOLOGY In a bus topology, all computers are attached to a single continuous cable that is terminated at both ends, which is the simplest way to create a physical network Terminator
  • 7. STAR TOPOLOGY Unlike those in a bus topology, each computer in a star topology is connected to a central point by a separate cable. The central point is a device known as a hub Although this setup uses more cable than a bus, a star topology is much more fault tolerant than a bus topology. This means that if a failure occurs along one of the cables connecting to the hub, only that portion of the network is affected, not the entire network. It also means that you can add new stations just by running a single new cable
  • 8. RING TOPOLOGY In the ring topology, each computer is connected directly to two other computers in the network. Data moves down a one-way path from one computer to another i.e. clock wise Laying out cable in a ring is that the cable design is simple. The bad news is that, as with bus topology, any break, such as adding or removing a computer, disrupts the entire network. Also, because you have to “break” the ring in order to add another station, it is very difficult to reconfigure without bringing down the whole network
  • 9. RING TOPOLOGY Note: Even though all computers are connected through a single cable, if there is a break all the computer connected to the ring topology will not work Example: If Machine A Wants to talk to Machine D The data can travel only Clock Wise If there is a break in the loop the data cannot be transferred A B C D
  • 10. MESH TOPOLOGY In a mesh topology, a path exists from each station to every other station in the network. While not usually seen in LANs, a variation on this type of topology—the hybrid mesh—is used on the Internet and other WANs in a limited fashion. Hybrid mesh topology networks can have multiple connections between some locations, but this is done only for redundancy. Also, it is not a true mesh because there is not a connection between each and every node, just a few for backup purposes
  • 11. COAXIAL CABLE Coaxial cable consists of a central copper core surrounded by an insulator, a braided metal shielding, called braiding, and an outer cover, called the sheath or jacket EG : Cable TV network and Cable Modem use the coaxial cable
  • 13. THICKNET (10BASE5) Thicknet cabling, also called thick wire Ethernet, is a rigid coaxial cable approximately 1-cm thick used for the original Ethernet networks.Thicknet is also called “yellow Ethernet” or “yellow garden hose.” IEEE designates Thicknet as 10Base5 Ethernet.The “10” represents its throughput of 10 Mbps, the “Base” stands for baseband transmission, and the “5” represents the maximum segment length of a Thicknet cable, which is 500 m. You may find this on older networks . Coaxial Cable Thicknet
  • 14. THINNET (10BASE2) Thinnet, also known as thin Ethernet, was the most popular medium for Ethernet LANs in the 1980s. Thinnet is rarely used on modern networks, although you may encounter it on networks installed in the 1980s or on newer small office or home office LANs IEEE has designated Thinnet as 10Base2 Ethernet, with the “10” representing its data transmission rate of 10 Mbps, the “Base” representing the fact that it uses baseband transmission, and the “2” representing its maximum segment length of 185 (or roughly 200) m. Coaxial Cable Thinnet
  • 15. TWISTED PAIR (TP) Twisted-pair (TP) cable is similar to telephone wiring and consists of color-coded pairs of insulated copper wires. The more twists per inch in a pair of wires, the more resistant the pair will be to all forms of noise. Higher-quality, more expensive twisted-pair cable contains more twists per foot. The number of twists per meter or foot is known as the twist ratio.
  • 16. TWISTED PAIR (TP) Twisted-pair cable is the most common form of cabling found on LANs today. It’s inexpensive, flexible, and easy to install, and it can span a significant distance before requiring a repeater (though not as far as coax). Twisted-pair cable easily accommodates several different topologies, although it is most often implemented in star or star-hybrid topologies One drawback to twisted-pair is that, because of its flexibility, it is more prone to physical damage than coaxial cable. All twisted-pair cable falls into one of two categories: shielded twisted-pair (STP) or unshielded twisted-pair (UTP).
  • 17. SHIELDED TWISTED-PAIR (STP) As the name implies, shielded twisted-pair (STP) cable consists of twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil. Some STP use a braided metal shielding. The shielding acts as a barrier to external electromagnetic forces, thus preventing them from affecting the signals traveling over the wire inside the shielding. The shielding may be grounded to enhance its protective effect.
  • 18. UNSHIELDED TWISTED-PAIR (UTP) Unshielded twisted-pair (UTP) cabling consists of one or more insulated wire pairs encased in a plastic sheath. As its name implies, UTP does not contain additional shielding for the twisted pairs. As a result, UTP is both less expensive and less resistant to noise than STP
  • 19. UTP TYPES UTP CAT 1/2/3/4/5/6 Cat 1 Data Rate upto 1 Mbps – Telephone Line Cat 2 Date Rage upto 4 Mbps – Token Ring Cat 3 Data Rate upto 10 Mbps – Token Ring & 10 Base – T Cat 4 Data Rate upto 16 Mbps – Token Ring Cat 5 Date Rate up to 100 Mbps Ethernet – 16 for Token Ring Cat 5e Data Rage upto 1000 Mbps Ethernet Cat 6 Data Rate upto 1000 Mbps Ethernet
  • 20. FIBER OPTIC A fiber-optic system is similar to the copper wire system that fiber-optics is replacing. The difference is that fiber-optics use light pulses to transmit information down fiber lines instead of using electronic pulses to transmit information down copper lines.
  • 21. FIBER OPTIC Bandwidth Up to 100s of Gbps Distance (100 +KM) Three Types Single Mode Multi Mode Plastic Optical Fiber Mode
  • 22. STRAIGHT THROUGH CABLE Pin Number Wire color Wire Becomes Pin number Wire color Pin 1 Orange / White Pin 2 Orange Pin 3 Green / White Pin 4 Blue Pin 5 Blue/White Pin 6 Green Pin 7 Brown/White Pin 8 Brown 1 1 2 2 3 3 6 6 Pin 1 Orange / White Pin 2 Orange Pin 3 Green / White Pin 4 Blue Pin 5 Blue/White Pin 6 Green Pin 7 Brown/White Pin 8 Brown
  • 23. STRAIGHT THROUGH CABLE In a UTP implementation of a straight-through cable, the wires on both cable ends are in the same order You can determine that the wiring is a straight-through cable by holding both ends of the UTP cable side by side and seeing that the order of the wires on both ends is identical You can use a straight-through cable for dissimilar devices Connecting a router to a hub or switch Connecting a server to a hub or switch Connecting workstations to a hub or switch
  • 24. CROSS OVER CABLE Pin Number Wire color Wire Becomes Pin number Wire color Pin 1 Orange/White Pin 2 Orange Pin 3 Green / White Pin 4 Blue Pin 5 Blue/White Pin 6 Green Pin 7 Brown/White Pin 8 Brown 1 3 2 6 3 1 6 2 Pin 1 Green/White Pin 2 Green Pin 3 Orange/White Pin 4 Blue Pin 5 Blue/White Pin 6 Orange Pin 7 Brown/White Pin 8 Brown
  • 25. STRAIGHT THROUGH / X- OVER CABLE The Transmit and Receive pins are shown above
  • 26. CROSS OVER CABLE In the implementation of a crossover, the wires on each end of the cable are crossed Transmit to Receive and Receive to Transmit on each side, for both tip and ring Notice that pin 1 on one side connects to pin 3 on the other side, and pin 2 connects to pin 6 on the opposite end You can use a crossover cable for similar devices Connecting uplinks between switches Connecting hubs to switches Connecting a hub to another hub.
  • 27. WHERE TO USE STRAIGHT THROUGH AND CROSS OVER CABLE Similar Devices Cross Over Cable Dissimilar Devices Straight through Cable Hub / Switch PC PC PC
  • 28. REGISTERED JACK (RJ) RJ-11 – Defined for telephone connectors RJ-45 – Defined for UTP connectors RJ 45 RJ 11
  • 29. LOCAL AREA NETWORK (LAN) A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings
  • 30. WIDE AREA NETWORK (WAN) A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs)
  • 33. OPEN SYSTEM INTERNETCONNECT (OSI) The OSI model was designed to promote interoperability by creating a guideline for network data transmission between computers that have different hardware vendors, software, operating systems, and protocols
  • 34. OSI The OSI reference model illustrates the networking process as being divided into seven layers. This theoretical construct makes it easier to learn and understand the concepts involved. At the top of the model is the application that requires access to a resource on the network, and at the bottom is the network medium itself As data moves down through the layers of the model, the various protocols operating there prepare and package it for transmission over the network. Once the data arrives at its destination, it moves up through the layers on the receiving system, where the same protocols perform the same process in reverse
  • 35. OSI OSI developed by International Organization for Standardization (ISO) in 1974 It consists of Seven Layers Each layer has specific processing function
  • 37. DATA COMMUNICATION WITH OSI How data travels through the layers of the OSI model Peer Communication Information flow Network Medium
  • 38. OSI In Physical Layer data will be converted into Binary (0’s & 1’&) It transmits raw bit stream over physical cable The Physical layer defines all the electrical and physical specifications for devices Physical Layer defines techniques to transfer bit stream to cable Hub and Repeater works in Physical Layer
  • 39. OSI Data Link Layer handles data frames between the Network and Physical layers It Receives end packages raw data from the Physical layer into data frames for delivery to the Network layer as packets Error detection is happening in this layer Data link Layer is divided in to two layers: LLC (Logical Link Control) and MAC ( Media Access Control) Switch, Bridge and Network Interface card works in Data Link Layer
  • 40. OSI Network Layer is responsible for providing best path for data to reach the destination Logical addressing is happening in this layer Network Layer translates logical network address and names to their physical address (e.g. computer name = MAC address) Router works in Network Layer
  • 41. OSI Transport Layer is responsible for reliable delivery of data. It is also known as the heart of OSI layers Provides error-checking to guarantee error-free data delivery, with on losses or duplications Provides acknowledgment of successful transmissions; requests retransmission if some packets don’t arrive error-free The major function of the Transport Layer is Error Correction Identifying Service, Multiplexing & De-multiplexing and Segmentation are happening in this layer Brouter and Gateway works in Transport Layer
  • 42. BREAKING DATA IN TO SEGMENTS Data
  • 43. OSI Session Layer is responsible for establishing, maintaining and terminating session Responsible for name recognition (identification) so only the designated parties can participate in the session Manages who can transmit data at a certain time and for how long Provides synchronization services by planning check points in the data stream if session fails, only data after the most recent checkpoint need be transmitted Gateway works in Session Layer
  • 44. OSI Presentation layer is responsible for presenting the data in a standard format and data translation (formatting) The Presentation layer relieves the Application layer of concern regarding syntactical differences in a message's data representation within the end-user systems Following tasks are performed in Presentation Layer: Encoding – Decoding Encryption – Decryption Compression – Decompression Gateway Works in Presentation Layer
  • 45. OSI Application Layer provides the operating system with direct access to network services Application layer provides an interface so that processes such as Excel or Word that are running on the local machine can get access to network services (E.G., retrieving a file from a network server) Handles network access, flow control and error recovery It serves as the interface between the user and the network It’s a user specific layer Gateway works in Application layer
  • 46. OSI Data Flow in OSI HUB Switch Router Gateway
  • 47. OSI
  • 48. OSI OSI Layers TCP/IP Layers
  • 49. IP ADDRESSING Internet Protocol Address is given to the computer as an identifier to a computer in a TCP/IP Network IP Address is also known as Logical Address IP Address works in Layer 3 (Network) Two versions of IP Addressing IP Version 4 - 32 bit address (Currently we are using) IP Version 6 - 128 bit address
  • 50. IP ADDRESSING IP Address is divided in to Network Portion and Host Portion Class A is written as N. H.H.H Class B is written as N.N. H.H Class C is written as N.N.N. H
  • 52. IP ADDRESS Class A 1 - 126 Class B 128 - 191 Class C 192 - 223 Class D 224 - 239 Class E 240 - 254 Class Range Widely Used Multicast Research & Development
  • 53. IP ADDRESSING Private IP Address Range Class Network Address A 10.0.0.0 through 10.255.255.255 B 172.16.0.0 through 172.31.255.255 C 192.168.0.0 through 192.168.255.255 Class First Bits First Byte Values Network ID Bits Host ID Bits Number of Networks Number of Hosts A B C 0 10 110 1 - 126 128 -191 192 - 223 8 16 24 24 16 8 126 16,384 2,097,152 16,77,214 65,534 254
  • 54. IP ADDRESSING Loop Back Address: The IP address 127.0.0.1 is used as the loop back address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing
  • 55. IP ADDRESSING Loop Back address is also known as semi broad cast address Range of Loop back address : 127.0.0.1 to 127.255.255.254 Any IP address starts with 127 is known as loop back address Click Start  Run  Type cmd  Ping 127.56.26.36
  • 56. SUBNET MASK Class Default Subnet Mask Class A is written as 255. 0.0.0 N. H.H.H Class B is written as 255.255. 0.0 N.N. H.H Class C is written as 255.255.255. 0 N.N.N. H Subnet Mask is to differentiate the Network ID and Host ID Two numbers reserved for Subnet Mask i.e. 0 & 255 0 Denotes Host and 255 Denotes Network
  • 57. SUBNET MASK IP Address : 10.20.50.26 Subnet Mask : 255. 0.0.0 For this IP Address : Network ID is : 10. 0.0.0 First Valid IP Address : 10. 0.0.1 Last Valid IP Address : 10. 255.255.254 Broad Cast Address : 10. 255.255.255 Number of hosts = ( 256x256x256 ) -2
  • 58. SUBNET MASK IP Address : 10.20.50.26 Subnet Mask : 255.255. 0.0 For this IP Address : Network ID is : 10.20. 0.0 First Valid IP Address : 10.20. 0.1 Last Valid IP Address : 10.20. 255.254 Broad Cast Address : 10.20. 255.255 Number of hosts = ( 256x256 ) – 2
  • 59. SUBNET MASK IP Address : 10.20.50.26 Subnet Mask : 255.255.255 .0 For this IP Address : Network ID is : 10.20.50. 0 First Valid IP Address : 10.20.50. 1 Last Valid IP Address : 10.20.50. 254 Broad Cast Address : 10.20.50. 255 Number of hosts = ( 256 ) – 2
  • 60. SUBNET MASK IP Address 172.26.28.36 Subnet Mask : 255 .0.0.0 For this IP Address: Network ID is : 172. 0.0.0 First Valid IP Address : 172. 0.0.1 Last Valid IP Address : 172. 255.255.254 Broad Cast Address : 172. 255.255.255 Number of hosts = ( 256x256x256 ) -2
  • 61. SUBNET MASK IP Address 172.26.28.36 Subnet Mask : 255.255. 0.0 For this IP Address: Network ID is : 172.26. 0.0 First Valid IP Address : 172.26. 0.1 Last Valid IP Address : 172.26. 255.254 Broad Cast Address : 172.26. 255.255 Number of hosts = ( 256x256 ) – 2
  • 62. SUBNET MASK IP Address 172.26.28.36 Subnet Mask 255.255.255. 0 For this IP Address: Network ID is : 172.26.28. 0 First Valid IP Address : 172.26.28. 1 Last Valid IP Address : 172.26.28. 254 Broad Cast Address : 172.26.28. 255 Number of hosts = ( 256 ) – 2
  • 63. SUBNET MASK IP Address 192.168.0.152 Subnet Mask 255. 0.0.0 For this IP Address: Network ID is : 192. 0.0.0 First Valid IP Address : 192. 0.0.1 Last Valid IP Address : 192. 255.255.254 Broad Cast Address : 192. 255.255.255 Number of hosts = ( 256x256x256 ) -2
  • 64. SUBNET MASK IP Address 192.168.0.152 Subnet Mask 255.255. 0.0 For this IP Address: Network ID is : 192.168. 0.0 First Valid IP Address : 192.168. 0.1 Last Valid IP Address : 192.168. 255.254 Broad Cast Address : 192.168. 255.255 Number of hosts = ( 256x256 ) – 2
  • 65. SUBNET MASK For this IP Address: Network ID is : 192.168.0. 0 First Valid IP Address : 192.168.0. 1 Last Valid IP Address : 192.168.0. 254 Broad Cast Address : 192.168.0. 255 Number of hosts = ( 256 ) – 2 IP Address 192.168.0.152 Subnet Mask 255.255.255. 0
  • 66. BROADCAST ADDRESS Messages that are intended for all computers on a network are sent as broadcasts These messages always use the IP address 255.255.255.255 Any IP Address with last Octet as 255 is known as broadcast address for that particular network E.g.: 10.255.255.255 The IP address of 0.0.0.0 is used for the default network
  • 67. HOW TO ASSIGN STATIC IP ADDRESS AND SUBNET MASK High light Local Area Connection  Right Click  Select Properties Select Internet Protocol (TCP/IP) and select “Properties”
  • 68. HOW TO ASSIGN STATIC IP ADDRESS AND SUBNET MASK When ever you assign a Static IP Address it’s Mandatory to assign static DNS For Windows 2000 and above Subnet Mask will be automatically assigned by the computer with the help of Network ID
  • 69. MAC ADDRESS The Media Access Control address (MAC) can be equated to the serial number of the NIC. Every IP packet is sent out of your NIC wrapped inside an Ethernet frame which uses MAC addresses to direct traffic on your locally attached network MAC addresses therefore only have significance on the locally attached network. As the packet hops across the Internet, its source/destination IP address stays the same, but the MAC addresses are reassigned by each router on the way using a process called ARP
  • 70. MAC ADDRESS MAC addresses are usually written in one of the following two formats: 00:13:21:0F:83:DF 00-13-21-0F-83-DF Mac address is a 48 bit address Mac address are 12 digit Hexadecimal {0-9} {A- F} Address
  • 71. MAC ADDRESS The First Octet of the MAC Address is known as Group Unique 00 : 13 : 21 : 0F : 83 : DF The Second and Third Octet of the MAC Address is known as Organization Unique Identifier (OUI) 00 : 13 : 21 : 0F : 83 : DF
  • 72. MAC ADDRESS Any Mac address starts with 00 is known as Unicast address 00 : 13 : 21 : 0F : 83 : DF Any Mac address starts with 01 is known as Multicast 01 : 13 : 21 : 0F : 83 : DF Any Mac address starts with FF is known as Broadcast FF : 13 : 21 : 0F : 83 : DF
  • 74. REQUEST TIMED OUT The ping command timed out because there was no reply from the host. The source and the destination computer are in the same network When Ping command is initiated from one system to the other in a network if the firewall is enabled on the Destination System Request Timed Out error will Pop up
  • 75. DESTINATION HOST UNREACHABLE The host that you are trying to ping is in a different network. Destination and the source belong to the different network
  • 76. Difference between Request timed out and Destination Host Unreachable IP : 192.168.1.53 Mask : 255.255.255.0 D.G : 192.168.1.1 IP : 192.168.0.8 Mask : 255.255.255.0 D.G : 192.168.0.1 IP : 192.168.2.56 Mask : 255.255.255.0 IP : 192.168.1.36 Mask : 255.255.255.0 Hub/Switch Hub/Switch
  • 77. DIFFERENCE BETWEEN DESTINATION HOST UNREACHABLE AND DESTINATION HOST NET UNREACHABLE Cable/DSL Modem WAN Side LAN Side Note: Since the Router is not able to pass the WAN interface it is giving the reply from LAN interface IP : 192.168.2.168 Mask : 255.255.255.0 IP : 192.168.1.192 Mask : 255.255.255.0 Hub/Switch Router Internet
  • 78. DESTINATION NET UNREACHABLE Destination Net Unreachable message is one which a user would usually get from the Default Gateway when it doesn't know how to get to a particular net work
  • 79. UNKNOWN HOST If the DNS resolution is not happening the computer will display as “Unknown host” Global DNS has to be assigned to fix this issue
  • 80. COMMAND PROMPT ERROR If the static IP Address is assigned to the computer and if we tried to renew the IP Address it will display as “Operation failed as no adapter is in the state permissible for this operation
  • 81. ERROR CODE 28 (COMMAND PROMPT Direct Firewall or PIX or Norton Internet Security Installed (NIS)
  • 82. ERROR CODE 65 (COMMAND PROMPT Anti Spy Ware or Zone Alarm in the Computer
  • 84. DIGITAL SIGNATURE Digital signatures are especially important for electronic commerce and are a key component of most authentication schemes. To be effective, digital signatures must be unforgeable
  • 85. DIGITAL SIGNATURE A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real
  • 86. NIC CARD INSTALLATION Physically install the network adapter, and then restart the PC.
  • 87. NIC CARD INSTALLATION If the Operating System is Windows 2000 and above the screen will display as New Hardware Found and select “Next” Select the “Hardware Type”
  • 88. NIC CARD INSTALLATION SMC 1211 TX Select “Display a List” Select the “Manufacturer” and Click “Have Disk”
  • 89. NIC CARD INSTALLATION Select “Browse” Select the Location as CD-Rom Select “Browse”
  • 90. NIC CARD INSTALLATION Select the “Drivers” Select the “File” and Click “OK”
  • 91. NIC CARD INSTALLATION Click “OK”
  • 92. NIC CARD INSTALLATION Click “Yes” to restart the computer Check the Device Manager for Device Status