What is Network ,Tyes , Network Devices ?
purpose of communicating and sharing information:
Networking: Networking is process of Communication between the interconnected device
basically to share the Network resources.
Benefits of Networking.
1. Share Resources
(i) Data
(ii) Hardware
2. Share Software
3. Sharing of License
Types of Network:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3.WAN ( Wide Area Network)
Network Devices:
1: Hub. Hub is a centralized device which provide the communication among system
when we have two or more computers we need a device for connectivity is called a Hub.
2.Switch. Switch is an advance version over a Hub.
The main benefits of Switch is Unicast. Data packets send to target computer instead of
all. Switch maintain MIT table ( Mac Information Table) .
3. Router: Router is a device connects two different networks.
Routing is a process of communication between two different Networks. Class A to Class C
Network Topologies.
called topology.
1. Bus Topology: Bus topology is a type of network setup which Each computer is
computer and Network Devices are connected to a single cable or back bone.
![]() |
2. Star Topology: It is advance version over a bus topology. Where it is uses either a Switch
or Hub. In Star topology each device or computer connects with centralized device called a Switch.
3. Ring Topology: Ring topology not mostly used now a days. In Ring topology
each Network computer or device connected to each other in a circle .

Mesh Topology: A network setup where each computer and network device is interconnected
with one another, allowing for most transmissions to be distributed. Even if one the connections
go down. This topology is not commonly used for most computer networks as it is difficult and
expensive to have redundant connection to every.
RJ-45 Connector Cable color coding
1: Straight through :
use for different Devices , like PC to Switch, (568 B) in this you have same color in Jack A or Jack B.
Jack A Jack B
1. White Orange 1. White Orange
2. Orange 2. Orange
3. White Green 3. White Green
4. Blue 4. Blue
5. White Blue 5. White Blue
6. Green 6. Green
7. White Brown 7.White Brown
8. Brown 8.Brown
2. Cross Over:
use for same devices, like PC to PC, Switch to Switch, (568 A).
Jack A Jack B
1. White Orange 1. White Green
2. Orange 2. Green
3. White Green 3. White Orange
4. Blue 4. Blue
5. White Blue 5. White Blue
6. Green 6. Orange
7. White Brown 7.White Brown
8. Brown 8. Brown
IP Address: IP address is a protocol which use for communication between the computers.
Through IP protocol computer can talk each other on the Network. IP address is a 32 Bits
size and consist of
4 Octet. Each Octet is separate by .Dot.
IP Address, Classes
IP Address in Four classes.
Classes Subnet
Class A: 1.0.0.0 to 126.255.255.255 255.0.0.0
Class B: 128.0.0.0 to 191.255.255.255 255.255.0.0
Class C: 192.0.0.0 to 223.255.255.255 255.255.255.0
Class D: 224.0.0.0 to 239.255.255.255 Multicast
Class E: 240.0.0.0 to 255.255.255.255 Experimental
127.0.0.1 use for Loop back address:
Private IP Addresses (use for our Local Network)
Class A: 10.0.0.0 to 10.255.255.255
Class B: 172.16.0.0 to 172.31.255.255
Class C: 192.168.0.0 to 192.168.255.255
Rules of IP Addressing.
All 0s represent the Network ID.
255 in last octet represent the Broadcast IP address.
OSI Layer Model ( Open System Interconnection)
7. Application Layer:
This application layer servers as the window for users and application process to access network
services.
6.Presentation Layer:
The presentation layer formats the data to be presented to the application layer. It can be viewed as
the translator for the Network.
5. Session Layer:
This layer establishes,manages and terminates connections between applications.The session
layer sets up, coordinates, and terminates conversations, exchange, and dialogues between the
application at each end. It deals with session and connection coordination.
4. Transport Layer:
This layer provides transparent transfer of data between end systems, or hosts, and is responsible
for the end-to-end error recovery and flow control. It ensure complete data transfer. Transport Layer
use the Protocol TCP or UDP.
3. Network Layer:
This layer provides Switching and Routing technologies, creating logical paths, know as virtual circuits,
for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as
addressing and packet sequencing. This layer use the IP protocol.
2. Data Link Layer:
The data link layer provides error-free transfer of data frames from one node to another over the
physical layer, allowing layers above it to assume virtually error-free transmission over the link.
this layer work on Mac address and device use normally switches.
1. Physical Layer:
This layer coneys the bit stream - electrical impulse, light or radio signal through the network at
electrical and mechanical lever. It provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects.
This application layer servers as the window for users and application process to access network
services.
6.Presentation Layer:
The presentation layer formats the data to be presented to the application layer. It can be viewed as
the translator for the Network.
5. Session Layer:
This layer establishes,manages and terminates connections between applications.The session
layer sets up, coordinates, and terminates conversations, exchange, and dialogues between the
application at each end. It deals with session and connection coordination.
4. Transport Layer:
This layer provides transparent transfer of data between end systems, or hosts, and is responsible
for the end-to-end error recovery and flow control. It ensure complete data transfer. Transport Layer
use the Protocol TCP or UDP.
3. Network Layer:
This layer provides Switching and Routing technologies, creating logical paths, know as virtual circuits,
for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as
addressing and packet sequencing. This layer use the IP protocol.
2. Data Link Layer:
The data link layer provides error-free transfer of data frames from one node to another over the
physical layer, allowing layers above it to assume virtually error-free transmission over the link.
this layer work on Mac address and device use normally switches.
1. Physical Layer:
This layer coneys the bit stream - electrical impulse, light or radio signal through the network at
electrical and mechanical lever. It provides the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical aspects.
Workgroup : Peer To Peer Networks

A work-group is a collection of computers that are logically grouped together for a common purpose. In any organization, logical work-groups exist, like sales, marketing, accounts, salaries and support. By allowing like people to share their files and resources, it assists the way in which people work and leads to increased productivity. In peer networks, each computer is considered a server, and holds its own accounts database. Each computer can share resources that it owns, like files, CD-ROM drives, printers, modems and fax machines
The advantages of peer-to-peer networks are,
• all workstations can make available their resources
• no centralized server is required
• security is the responsibility of each workstation
• each computer has its own accounts database that secures the resources it provides to others
• it is cheap and easy to set up for small groups
Domain: Server / Client
.jpg)
A server is a computer program that provides services to other computer programs (and their
users) in the same or other computers.
It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.
Many types of servers exist, including web servers, mail servers, and file servers. Microsoft Servers Versions are, Windows Server 2000, Windows Server 2003, Windows Server 2008, and Windows Server 2012.
Advantage of Server / client.
Flexibility
• As new clients join the system, the old clients and servers remain unaffected.
Security
• Many times, servers have higher security standards than clients. Servers also can control and protect data and information by allowing only clients with the proper permissions to access the resources.
Updates
• Updates to data are easy to implement since all the data is stored on the server.
Scalability
• Each computer -- client or server -- can be replaced when needed.
Make USB Bootable and Install Windows 7 through Bootable USB Drive.
CREATING BOOTABLE USB USING DISKPART COMMAND.
First of all you attach a USB drive with computer and then go to the
CMD (Command prompt )
In CMD type these commands:
diskpart
enter
list disk
enter
Select disk 1
enter
clean
enter
create partition primary
enter
format fs=ntfs quick
enter
active
enter
And then copy the all windows 7 files in USB Drive.
Now your Bootable USB for Windows 7 is ready.
Note: When you make USB bootable then your computer must have Windows 7 operating system
and then follow up these steps. When you want to install windows 7 then you must boot from USB drive.


.jpg)

No comments:
Post a Comment