0% found this document useful (0 votes)
18 views216 pages

Network

The document outlines a comprehensive course on networking, covering topics from basic networking concepts to advanced network devices and security. It includes various types of networks, topologies, and essential networking commands. The course aims to take learners from beginner to expert level in networking skills.

Uploaded by

therohitpatwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views216 pages

Network

The document outlines a comprehensive course on networking, covering topics from basic networking concepts to advanced network devices and security. It includes various types of networks, topologies, and essential networking commands. The course aims to take learners from beginner to expert level in networking skills.

Uploaded by

therohitpatwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Geeky Hub

PRESENTS

Network Professional
ACCESS MORE COURSES PLAYLIST LINK IN DESCRIPTION
BEGINNER TO EXPERT GUARANTEED
1. Networking Basics
2. Network Types
3. Network Topologies
4. Network Devices
5. Transmission Modes
6. Digital Transmission
7. Transmission Media
8. How Internet Works
Geeky Hub 9. IP Addressing IPv4 & IPv6
10. Subnet Mask, MAC, DHCP & DNS
Topics going to Cover 11. WLAN & WPAN Networks
12. OSI Model
13. TCP/IP Model
14. TCP & UDP
15. ARP & RARP
16. CSMA/CA & CSMA/CD
17. Proxy & VPN
18. Server & Datacenter

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
19. Network Security
20. NAS & NAT
21. RAID (Redundant Array of Independent Disk)
22. Sharing Folder in Network
23. TELNET in Network
24. Remote Desktop Connection
25. Windows Remote Assistance
Geeky Hub 26. FTP in Network
27. Configuring Network
Topics going to Cover 28. Configuring Router
29. Protocols You need to know
30. Networking Commands you must know

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

1.
Networking Basics

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Network?
A network consists of two or more computers that are linked in order to
share resources, exchange files or communication.The computers on
a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Networking?
Networking, also known as computer networking, is the practice of
transporting and exchanging data or information & having
communication between connected nodes over a shared medium.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Internet?
Collection of Networks is Internet. The first workable prototype of the Internet
came in the late 1960s with the creation of ARPANET, or the Advanced
Research Projects Agency Network. Which was designed for US
defence. Later Sir Tim berners lee introduced WWW cocept and starts web.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Message or Token?
When one of the systems on the network has the "token," it can send
information to the other computers. Since there is only one token for each
token-ring network, only one computer can send data at a time. It verify that
the target reciever is present or not before sending the data from sender.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Architecture

Peer to Peer Model

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Architecture
Client-Server Model

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Peer to Peer VS Client-Server Model

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

2.
Network Types

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Basic Types of Networks

1. Personal Area Network (PAN)


2. Local Area Network (LAN)
3. Wide Area Network (WAN)
4. Wireless Local Area Network (WLAN)
5. Campus Area Network (CAN)
6. Metropolitan Area Network (MAN)
7. Storage Area Network (SAN)
8. Enterprise Private Network (EPN)
9. Virtual Private Network (VPN)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
1. Personal Area Network (PAN)
PAN is the most basic type of computer network. This network
is restrained to a single person, PAN offers a network range of
10 meters from a person to the device providing
communication.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
2. Local Area Network (LAN)
LAN is the most frequently used network. A LAN is a
computer network that connects computers together
through a common communication path, contained within a
limited area, A LAN encompasses two or more computers
connected over a server. The two important technologies
involved in this network are Ethernet and Wi-fi.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
3. Wide Area Network (WAN)
WAN is a type of computer network that connects
computers over a large geographical distance through a
shared communication path. It is not restrained to a single WAN
location but extends over many locations. WAN can also
be defined as a group of local area networks that
communicate with each other.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
4. Wireless Local Area Network (WLAN)
WLAN is a type of computer network that acts as a local
area network but makes use of wireless network
technology like Wi-Fi. This network doesn’t allow devices
communicating over physical cables like in LAN, but
allows devices to communicate wirelessly.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
5. Campus Area Network (CAN)
CAN is bigger than a LAN but smaller than a MAN. This is
a type of computer network which is usually used in places
like a school or college. This network covers a limited
geographical area that is, it spreads across several
buildings within the campus.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
6. Metropolitan Area Network (MAN)
A MAN is larger than a LAN but smaller than a WAN. This is
the type of computer network that connects computers over
a geographical distance through a shared communication
path over a city, town or metropolitan area.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
7. Storage Area Network (SAN)
SAN is an abbreviation of the Storage Area Network.
Storage Area Network is a dedicated, specialized, and high-
speed network which provides block-level data storage. It
delivers the shared pool of storage devices to more than
one server.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
8. Enterprises Private Network (EPN)
EPN is a type of computer network mostly used by
businesses that want a secure connection over various
locations to share computer resources.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
9. Virtual Private Network (VPN)
A virtual private network extends a private network across a
public network and enables users to send and receive data
across shared or public networks as if their computing
devices were directly connected to the private network.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

3.
Network Topologies

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Basic Types of Network Topologies

1. Bus Topology
2. Star Topology
3. Ring Topology
4. Tree Topology
5. Mesh Topology
6. Hybrid Topology
7. Daisy Chain Topology

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
1. Bus Topology
The bus topology is designed in such a way that all the
stations are connected through a single cable known as a
backbone cable. The backbone cable is considered as
a "single lane" through which the message is broadcast
to all the stations.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
2. Star Topology
Star topology is an arrangement of the network in which
every node is connected to the central hub, switch or a
central computer. The central computer is known as
a server, and the peripheral devices attached to the
server are known as clients.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
3. Ring Topology
Ring topology is like a bus topology, but with connected
ends. The node that receives the message from the
previous computer will retransmit to the next node.
The data flows in a single loop continuously known as an
endless loop. The most common access method of the
ring topology is token passing.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
4. Tree Topology
Tree topology combines the characteristics of bus topology
and star topology. A tree topology is a type of structure in
which all the computers are connected with each other in
hierarchical fashion. If the central hub gets fails the entire
system fails.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
5. Mesh Topology
In this type of topology, a host is connected to one or
multiple hosts.This topology has hosts in point-to-point
connection with every other host or may also have hosts
which are in point-to-point connection to few hosts only.
Two types Full Mesh Topology & Partially Mesh.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
6. Hybrid Topology
The combination of various different topologies is known
as Hybrid topology. When two or more different topologies
are combined together is termed as Hybrid topology and if
similar topologies are connected with each other will not
result in Hybrid topology.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
7. Daisy Chain Topology
This topology connects all the hosts in a linear fashion.
Similar to Ring topology, all hosts are connected to two
hosts only, except the end hosts.Means, if the end hosts in
daisy chain are connected then it represents Ring topology.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

4.
Network Devices

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Basic Types of Network Devices

1. NIC Card
2. Hub
3. Switch
4. Router
5. Repeater
6. Modem
7. Bridge
8. Gateway
9. Access Point
10. Server

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
1. NIC Card
NIC or network interface card is a network adapter that is
used to connect the computer to the network.bIt has a
unique id that is written on the chip, and it has a connector
to connect the cable to it. The cable acts as an interface
between the computer and router.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
NIC Card

Wireless NIC Wired NIC

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
2. Hub
A hub is basically a multiport repeater. A hub connects
multiple wires coming from different branches, for example,
the connector in star topology which connects different
stations. Hubs cannot filter data, so data packets are sent
to all connected devices. they do not have the intelligence
to find out the best path for data packets which leads to
inefficiencies and wastage.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Hub

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
3. Switch
A switch is a hardware device that connects multiple devices
on a computer network. A Switch contains more advanced
features than Hub. A Switch does not broadcast the message
to the entire network like Hub. It determines the device to
whom the message is to be transmitted. Therefore, we can
say that switch provides a direct connection between the
source and destination. It increases the speed of the network.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Switch

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
4. Router
A router is a device like a switch that routes data packets
based on their IP addresses. It is used to receive, analyze
and forward the incoming packets to another network. A
router forwards the packet based on the information available
in the routing table.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Router

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
5. Repeater
Its job is to regenerate the signal over the same network
before the signal becomes too weak or corrupted so as to
extend the length to which the signal can be transmitted over
the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the
signal becomes weak, they copy the signal bit by bit and
regenerate it at the original strength.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Repeater

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
6. Modem
It stands for Modulator/Demodulator. It converts the digital
data into an analog signal over the telephone lines. It allows
the computer to connect to the internet over the existing
telephone line.
•Standard PC modem or Dial-up modem
•Cellular Modem
•Cable modem

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Modem

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
7. Bridge
A bridge is a repeater, with add on the functionality of filtering
content by reading the MAC addresses of source and
destination. It is also used for interconnecting two LANs
working on the same protocol. It has a single input and single
output port.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Bridge

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Types of Bridges

❖ Transparent Bridge :- These are the bridge in which the stations are completely unaware of the bridge’s
existence

❖ Translational Bridge :- A type of bridge that interconnects two different types of LAN protocols, such as
Ethernet and Token Ring.

❖ Source Routing Bridge :- A type of bridge that interconnects 2 different types of LAN protocols, such as
Ethernet and Token Ring.

❖ Remote type Bridge :- A device that connects two LAN segments together that are in geographically
dispersed locations. It connects LANs via a WAN.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
8. Gateway
A gateway is a network node that forms a passage between two
networks operating with different transmission protocols.
The gateway converts information, data or other communications
from one protocol or format to another. A router may perform
some of the functions of a gateway.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Gateway

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
9. Access Point
An access point is a device that creates a wireless local area
network, or WLAN, usually in an office or large building. An
access point connects to a wired router, switch, or hub via an
Ethernet cable and device that allows other Wi-Fi devices to
connect to a wired network.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Access Point

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
10. Server
A server is a computer or system that provides resources, data,
services, or programs to other computers, known as clients, over a
network. In theory, whenever computers share resources with client
machines they are considered servers. Typical servers are database
servers, file servers, mail servers, print servers, web servers, game
servers, and application servers.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Server

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

5.
Transmission Modes

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Transmission Mode?
The way in which data is transmitted from one device to another device is known as transmission
mode. Each communication channel has a direction associated with it, and transmission media provide
the direction. Therefore, the transmission mode is also known as a directional mode.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Simplex-mode Transmission

In Simplex mode, the data flows in one direction. This transmission mode is not very popular as mainly
communications require the two-way exchange of data. Keyboard and Monitor are the examples of the
simplex mode as a keyboard can only accept the data from the user and monitor can only be used to
display the data on the screen. The main advantage of the simplex mode is that the full capacity of the
communication channel can be utilized during transmission.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Half-Duplex Transmission

In a Half-duplex channel the station can transmit and receive the data as well. Messages flow in both
the directions, but not at the same time. A Walkie-talkie is an example of the Half-duplex mode. In
Walkie-talkie, one party speaks, and another party listens. After a pause, the other speaks and first
party listens. The entire bandwidth of the communication channel is utilized in one direction at a time.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Full-Duplex Transmission

In Full duplex mode, the data flow in both the directions. Both the stations can send and receive the
message simultaneously. The Full-duplex mode is the fastest mode of communication between
devices. The most common example of the full-duplex mode is a telephone network. When two people
are communicating with each other by a telephone line, both can talk and listen at the same time.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

6.
Digital Transmission

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Digital Transmission ?
Data can be represented either in analog or digital form. The computers used the digital form to store the
information. Therefore, the data needs to be converted in digital form so that it can be used by a computer.

Digital to Digital Conversion ?


Digital-to-digital encoding is the representation of digital information by a digital signal. When binary 1s and
0s generated by the computer are translated into a sequence of voltage pulses that can be propagated
over a wire, this process is known as digital-to-digital encoding.
three categories

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Unipolar
Digital transmission system sends the voltage pulses over the medium link such as wire or cable. The polarity of
each pulse determines whether it is positive or negative. In Unipolar Encoding, '1' is considered as a
high voltage and '0' is considered as a zero voltage.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Polar
Polar encoding is an encoding scheme that uses two voltage levels: one is positive, and another is
negative. By using two voltage levels, an average voltage level is reduced, and the DC component
problem of unipolar encoding scheme is alleviated.

•Polar NRZ
•Polar RZ
Polar NRZ Polar RZ

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Bipolar
If the first 1 bit is represented by positive amplitude, then the second 1 bit is represented by negative
voltage, third 1 bit is represented by the positive amplitude and so on. This alternation can also occur
even when the 1bits are not consecutive.

AMI (Alternate Mark Inversion) The Binary 0 gets


represented by a neutral voltage. On the other hand,
alternating negative and positive voltages represent the
Binary 1s.

Pseudoternary Here, we encode the bit 1 as a zero


voltage, while we encode the bit 0 as alternating
negative and positive voltages. It means that this one is
exactly the opposite of the AMI scheme. For example,
Data = 010010.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

7.
Transmission Media

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Transmission Media?
Transmission media is a communication channel that carries the information from the sender to the
receiver. Data is transmitted through the electromagnetic signals.

Bandwidth :- The greater the bandwidth of a medium, the higher the data transmission rate of a signal.

Transmission impairment :- When the received signal is not identical to the transmitted one due to the
transmission impairment. quality of the signals will get destroyed due to transmission impairment.

Interference :- An interference is defined as the process of disrupting a signal when it travels over a
communication medium on the addition of some unwanted signal.

Attenuation means the loss of energy, strength of the signal decreases with
increasing the distance
Distortion occurs when there is a change in the shape of signal. This type of
distortion is examined from different signals having diff frequencies.
Noise is When data is travelled over a transmission medium, some unwanted
signal is added to it

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Classification of Transmission Media?

(Guided Media) (Unguided Media)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Guided Media
It is defined as the physical medium in which the signals are transmitted. also known as Bounded media.

Twisted pair Co-axial Fibre Optic

STP UTP

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
What is a Cable?
An electrical cable is an assembly of one or more wires running side
by side or bundled, which is used to carry electric current. A cable
assembly is the composition of one or more electrical cables and
their corresponding connectors.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
1. Twisted Pair Cable

Twisted-pair cable is a type of cabling that is used for telephone communications and most modern Ethernet
networks. A pair of wires forms a circuit that can transmit data. The pairs are twisted to provide protection
against crosstalk, the noise generated by adjacent pairs having RJ-11 & RJ-45 Jacks.

Two Types :-
1. STP (Shielded Twisted Pair Cable)
2. UTP (Unshielded Twisted Pair Cable)

Ethernet Port
• Connects to a network and high speed Internet upto 100baseT.

• Known as RJ-45 Port which use RJ-45 Jack as Interface

• This port resides on an Ethernet Card.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
What are RJ connectors?

RJ Connectors are a family of push-and-click connectors for twisted-pair wiring in telephone and network wiring. RJ stands for
Registered Jack. RJ types define both a jack or receptacle (female) and a plug (male) type of connector.

The most common types of RJ connectors are as follows:

RJ-11 connector: A 4-wire or 6-wire telephone-type connector

RJ-45 connector: An 8-wire telephone-type connector

RJ-48 connector: An 8-wire telephone-type connector

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
2. Patch Cables

Patch cable is often called a straight through cable. In other words, patch cable does not change or swap along its way. Both ends
use the same wiring standard: T-568A or T-568B.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Straight Tip vs Crosstalk

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Patch Cables vs. Crossover Cable: When to Use?

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Scenario 1: PC to PC

Scenario 2: PC to Switch to PC

Scenario 3: PC to Switch to Switch to PC

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
3. Coaxial Cable

Coaxial cable is commonly used by cable operators, telephone companies, and


internet providers around the world to convey data, video, and voice communications
to customers. It has also been used extensively within homes.

BNC Connector
Bayonet Neill–Concelman BNC connector is a series of connectors
used for connecting thinnet coaxial cabling to various networking
components.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
4. Optic Fibre Cable

Fibre optics is a modern technology used mostly in the telecommunication industry


to transmit information digitally as pulses of light through strands of fibre made of
glass.Also known as Optical fibres, these strands are about the diameter of a
human hair follicle. When bundled into an optical fibre cable, they can transmit
data in volumes faster than other mediums over really long distances.

Subscriber Connector SC
This Connector is for structural cabling it is used for high speed
And for single mode fibre cabling

Straight Tip ST
This Connector is for structural cabling it is used for high speed
And for Multi mode fibre cabling

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Unguided Media
They transmits the electromagnetic waves without using physical medium.it is also known as wireless transmission.

Radio Waves Micro Waves Infrared Waves

Terrestrial Satellite

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Radio Waves

Radio waves at lower frequencies can travel through walls


whereas higher RF can travel in straight line and bounce back.The
power of low frequency waves decreases sharply as they cover
long distance. High frequency radio waves have more power. The
range in frequencies of radio waves is from 20kHz 300Hz.

Applications
• television and FM and AM radio broadcasts
• military communications
• Radio Control Car

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Microwaves

• Microwaves travel in straight lines, and so the transmitter and receiver stations should be accurately aligned to each other.
Microwaves are unidirectional

• Micro waves electromagnetic waves having frequency in the range from 1GHz to 1000 GHz.

•Applications
• Cellular phones
• 3G, 4G or 5G Network
• Satellites
• Wireless LAN
• Wireless PAN

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Infrared

Infrared waves are those between the frequencies 300GHz and 400THz in the electromagnetic spectrum. Their wavelengths are
shorter than microwaves but longer than visible light. Infrared propagation is line of sight. Range lies bwtween 300 GHz to 400 THz.

Applications
•Remote controls for television, stereos and other appliances.
•Wireless modem, keyboard, mouse, printer etc
•Night vision systems
•Motion detectors
•MRI

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

8.
How Internet Works

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
1. Satellite

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
2. Submarine Cables

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

9.
IP Addressing IPv4 & IPv6

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
What is IP Address?
An Internet Protocol address is a numerical label assigned to each
device connected to a computer network that uses the Internet
Protocol for communication. An IP address serves two main functions:
host or network interface identification and location addressing.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
IP Addressing IPv4
• An IP address basically a 32-bit address that uniquely universally defines connection of host or a router to the
Internet. IP address is unique.

• Introduced by IANA (Internet Assigned Numbers Authority).


• 32 bit is divided into 4 equal parts of 8-8 bits separated by dotted decimalnotation. It is in the range of minimum 0.0.0.0 to
255.255.255.255.

• Each 8 bit group is known by OCTET.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Various IP classes
IP has five different classes differentiated by characteristics.
◦ Class-A ranges from 0 to 127
◦ Class-B ranges from 128 to 191
◦ Class-C ranges from 192 to 223
◦ Class-D ranges from 224 to 239
◦ Class-E ranges from 240 to 255
First Octet is defines the class of particular IP e.g. - 128.11.3.31 is follow in class –B
127.0.0.0 to 127.255.255.255 is a range of look back IP.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Class-A
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is reserved for loopback IP
addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing can have 126 networks
(27-2) and 16777214 hosts (224-2).

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Class B
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Class C
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is
255.255.255.x. Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Class-D
Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting. In multicasting data
is not destined for a particular host, that is why there is no need to extract host address from the IP address, and Class D
does not have any subnet mask.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Class-E
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class ranges from 240.0.0.0
to 255.255.255.254. Like Class D, this class too is not equipped with any subnet mask.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
IP Addressing

32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
IP Addressing

32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


1 8 9 16 17 24 25 32

Binary 11111111 11111111 11111111 11111111

128
64
32
16
8
4
2
1
128
64
32
16
8
4
2
1
2
128
64
32
16
8
4
2
1
128
64
32
16
8
4
1
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
IP Addressing
32 bits
Dotted
Decimal Network Host

Maximum 255 255 255 255


1 8 9 16 17 24 25 32

Binary 11111111 11111111 11111111 11111111

128
64
32
16
8
4
2
1
128
64
32
16
8
4
2
1
1
128
64
32
16
8
4
2

128
64
32
16
8
4
2
1
Example
Decimal
172 16 122 204
Example 10101100 00010000 01111010 11001100
Binary
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
IP Address Classes

8 bits 8 bits 8 bits 8 bits

Network Host Host Host


● Class A:
Network Network Host Host
● Class B:
Network Network Network Host
● Class C:
● Class D: Multicast
● Class E: Research

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
IP Address Classes

Bits: 1 8 9 16 17 24 25 32
NNNNN Host Host Host
Class A:
Range (1-126)

Bits: 1 8 9 16 17 24 25 32
NNNNNN Network Host Host
Class B:
Range (128-191)
1 8 9 16 17 24 25 32
Bits:
NNNNNN Network Network Host
Class C:
Range (192-223)
1 8 9 16 17 24 25 32
Bits:
NNNNNN Multicast Group Multicast Group Multicast Group
Class D:
Range (224-239)
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Determining Available Host Addresses

Network Host
172 16 0 0
N

2
9
8
7
6
5
4
3
1
16
15
14
13
12
11
10
10101100 00010000 00000000 00000000 1
00000000 00000001 2
00000000 00000011 3

...

...

...
11111111 11111101 65534
11111111 11111110 65535
11111111 11111111 65536
-
2
2N-2 = 216-2 = 65534 65534
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Subnet Mask
Network Host

IP
Address
172 16 0 0
Network Host
Default
Subnet
Mask
255 255 0 0
11111111 11111111 00000000 00000000
Also written as “/16” where 16 represents the number of 1s in the mask.

Network Subnet Host


8-bit
Subnet 255 255 255 0
Mask
Also written as “/24” where 24 represents the number of 1s in the mask.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Subnet Mask without Subnets

Network Host

172.16.2.160 10101100 00010000 00000010 10100000

255.255.0.0 11111111 11111111 00000000 00000000

10101100 00010000 00000000 00000000

Network 172 16 0 0
Number

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Subnet Mask with Subnets

Network Subnet Host

172.16.2.160 10101100 00010000 00000010 10100000

255.255.255.0 11111111 11111111 11111111 00000000

10101100 00010000 00000010 00000000

Network
Number 172 16 2 0

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
IP Addressing IPv6

• An IP address basically a 128-bit address that uniquely universally defines connection of host or a router to the
Internet. IP address is unique.

• Introduced by IANA (Internet Assigned Numbers Authority).


• total of 4,294,967,296 unique IP addresses can be assigned to hosts.
• IP is like 2001:db8:1234::f350:2256:f3dd/64
• It supports Unicast. Telecast & Multicast.
• It doesn’t have Classes like ipv4

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

10.
Subnet Mask, MAC, DHCP & DNS

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
What is Subnet Mask?
A subnet mask is a 32-bit number that segments an existing IP address in a TCP/IP network. It is used by the
TCP/IP protocol to determine whether a host is on the local subnet or on a remote network. Subnet mask divides
the IP address into a network address and host address, hence to identify which part of IP address is reserved for
the network and which part is available for host use.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
MAC Address
The Media Access Control (MAC) address is just as important as the IP address. The MAC address is a unique value associated with
the network adapter (NIC). MAC addresses are known as the hardware addresses or physical addresses. They uniquely identify the
adapter on the LAN.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
MAC Address

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
DHCP
● Dynamic Host Configuration Protocol (DHCP)
○ From 1993
○ An extension of BOOTP, very similar to DHCP
○ Same port numbers as BOOTP
○ Extensions:
■ Supports temporary allocation (“leases”) of IP addresses
■ DHCP client can acquire all IP configuration parameters needed to operate
○ DHCP is the preferred mechanism for dynamic assignment of IP addresses
○ DHCP can interoperate with BOOTP clients.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
DHCP Interaction
Argon
00:a0:24:71:e4:44 DHCP Server

DHCP Request
00:a0:24:71:e4:44
Sent to 255.255.255.255

Argon
128.143.137.144
00:a0:24:71:e4:44 DHCP Server
DHCP Response:
IP address: 128.143.137.144
Default gateway: 128.143.137.1
Netmask: 255.255.0.0

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
APIPA
APIPA stands for Automatic Private IP Addressing (APIPA). It is a feature or characteristic in operating systems (eg.
Windows) which enables computers to self-configure an IP address and subnet mask automatically when their
DHCP(Dynamic Host Configuration Protocol) server isn't reachable

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
DNS
DNS stands for Domain Name System. DNS is a service that translates the domain name into IP addresses. This allows the
users of networks to utilize user-friendly names when looking for other hosts instead of remembering the IP addresses.

(The inverse domain is used (It defines the registered (The format of country domain is
for mapping an address to a hosts according to their same as a generic domain)
name.) generic behavior.)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Importance of DNS

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

11.
WLAN & WPAN Networks

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
WLAN
A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area
network within a limited area such as a home, school, computer laboratory, campus, or office building.

Wi-Fi

What is Wi-Fi
Short for “Wireless Fidelity”
A trademark of the Wi-Fi Alliance
The brand name for products using the IEEE 802.11 family of standards
Commonly used for “wireless local area network” (WLAN)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
WPAN
A personal area network is a computer network for interconnecting electronic devices within an individual person's workspace. A
WPAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants.

Bluetooth
Wireless Personal Area Networks (WPAN)
Design goal
Cable replacement
Low cost
Low power
Small size
For mobile devices

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

12.
OSI Model

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
INTRODUCTION
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions
of a networking system. The OSI model characterizes computing functions into a universal set of rules and
requirements in order to support interoperability between different products and software.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
OSI MODEL

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Data, Protocol & Activities

OSI Layers TCP/IP Suit Activities

Application Application To Accessing or transfering the data.


Telnet, FTP, SMTP, HTTP, DNS, SNMP, Specific address etc…

Presentation To Translate, encrypt, and compress


Presentation data
SSL, TLS, NDR

Session To establish, manage, and terminate


Session session
API,PPTP, PAP, ASP, L2F, L2TP, SMPP

Transport To Provide reliable process-to-process


Transport SCTP, TCP, UDP, Sockets and Ports address Message delivery and error recovery

Network To move packets from source to


Network IP, ARP/RARP, ICMP, IGMP destination; to provide internetworking

Data Link To organize bits into frames; to provide


Data Link IEEE 802 Standards, PPP, Physical address Hop-to-hop delivery

Physical To Transmit bits over a medium; to provide


Physical Medium, Coax, Fiber, 10base, Wireless Mechanical and electrical specifications

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
PHYSICAL LAYER

From data link layer To data link layer

Physical layer
110 10101000000010111 110 10101000000010111 Physical layer

Transmission medium

Physical characteristics of interface and medium (Transmission medium)


Representation of bits (stream of bits (0s or 1s) with no interpretation and encoded into signals)
Line configuration (Point-to-Point, Point-to-Multipoint)
Physical topology
Transmission mode (Simplex, half duplex, full duplex)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
DATALINK LAYER

From network layer To network layer

Data link layer H2 Data T2 H2 Data T2 Data link layer

To physical layer From physical layer

Data link layer is responsible for moving frames from one hop (Node) to the next.
Concerned:
Framing (stream of bits into manageable data units)
Physical addressing (MAC Address)
Flow Control (mechanism for overwhelming the receiver)
Error Control (trailer, retransmission)
Access Control (defining master device in the same link)
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
NETWORK LAYER

From transport layer To transport layer

Network layer H3 Data Packet H3 Data Packet Network layer

To data link layer From data link layer

The network layer is responsible for the delivery of individual packets from the source
host to the destination host.
Concerned:
Logical addressing (IP Address)
Routing (Source to destination transmission between networks)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
TRANSPORT LAYER
From session layer From session layer

Transport layer H4 Data H4 Data H4 Data H4 Data H4 Data H4 Data Transport layer

Segments Segments

To network layer From network layer


The transport layer is responsible for the delivery of a message from one process to another

Concerned:
Service-point addressing (Port address)
Sequence Number (data reassembly)
Segmentation and reassembly (Sequence number)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
SESSION LAYER
From Presentation layer To Presentation layer

H5 Data Data Data H5 Data Data Data Session layer


Session layer
Syn Syn Syn Syn Syn Syn

To transport layer From transport layer

The session layer is responsible for authentication & authorization.


Concerned:
Session establishment (Starts & terminates sessions)
Dialog Control (allows to communicate 2 systems in Half Duplex/Full duplex)
Synchronization (checks error in fixed time interval to avoid errors)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
PRESENTATION LAYER

From application layer To application layer

presentation layer H6 Data H6 Data presentation layer

To session layer From session layer

The presentation layer is responsible for translation, compression and encryption


Concerned:
Translation (interoperability between different encoding system)
Encryption (Privacy schemes)
Compression (data compression)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
APPLICATION LAYER
USER USER
(Human or Program)
(Human or Program)

X.500 FTAM X.400 X.500 FTAM X.400

Application layer
Application layer
H7 Data Message H7 Data Message

To presentation layer From presentation layer

The application layer is responsible for providing services to the user.


Concerned:
Web surfing protocols
File transfer, access and management
Mail services

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

13.
TCP/IP Model

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Model

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Network Access Layer

•A network layer is the lowest layer of the TCP/IP model.

•A network layer is the combination of the Physical layer and Data Link layer defined in the OSI reference model.

•It defines how the data should be sent physically through the network.

•This layer is mainly responsible for the transmission of the data between two devices on the same network.

•The functions carried out by this layer are encapsulating the IP datagram into frames transmitted by the network and mapping of IP
addresses into physical addresses.

•The protocols used by this layer are ethernet & token ring

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Internet or Network Layer
• An internet layer is the second layer of the TCP/IP model.

• An internet layer is also known as the network layer.

• The main responsibility of the internet layer is to send the packets from any network, and they arrive at the destination
irrespective of the route they take.

1. IP Addressing
2. Host-to-host communication
3. Data Encapsulation and Formatting
4. Fragmentation and Reassembly
5. Routing
6. ARP Protocol

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Transport Layer

• The transport layer is responsible for the reliability, flow control, and correction of data which is being sent over the
network.

• The two protocols used in the transport layer are User Datagram protocol and Transmission control protocol.

TCP & UDP

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Application Layer
• An application layer is the topmost layer in the TCP/IP model.

• It is responsible for handling high-level protocols, issues of representation.

• This layer allows the user to interact with the application.

• When one application layer protocol wants to communicate with another application layer, it forwards its data to the
transport layer.

1. HTTP
2. SNMP
3. SMTP
4. HTTPS
5. DNS
6. TELNET
7. FTP

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

14.
TCP UDP

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
TCP vs UDP

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
TCP UDP Port Numbers of
Internet Protocols Suite

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

15.
ARP & RARP

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Why We Use ARP?
Used to convert an IP address into a physical address such as an Ethernet address.A host wishing to obtain a physical
address broadcasting ARP request onto the TCP/IP network.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Why We Use RARP
The Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a client
computer to request its Internet Protocol (IPv4) address from a computer network.

Reverse Address Resolution Protocol (RARP)is a network layer protocol used to resolve an IP address from a given
hardware address (such as an Ethernet address).

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Geeky Hub

16.
CSMA/CA & CSMA/CD

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Carrier Sense Multiple Access (CSMA)

This method was developed to decrease the chances of collisions when two or more stations start sending their signals over
the datalink layer. Carrier Sense multiple access requires that each station first check the state of the medium before sending.

CSMA/CD CSMA/CA

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access/with Collision Avoidance (CSMA/CA) is a network contention protocol used for carrier
transmission in networks using the 802.11 standard. In contrast to the Carrier Sense Multiple Access/Collision Detect
(CSMA/CD) protocol, which handles transmissions only after a collision has taken place, CSMA/CA works to avoid collisions
prior to their occurrence.

CSMA/CA increases network traffic as it requires sending out a signal to the network even before transmitting any real data.
This is to listen for any collision scenarios in the network and to inform other devices not to transmit.

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a network protocol for carrier transmission that operates
in the Medium Access Control (MAC) layer. It senses or listens whether the shared channel for transmission is busy or not, and
defers transmissions until the channel is free. The collision detection technology detects collisions by sensing transmissions
from other stations. On detection of a collision, the station stops transmitting, sends a jam signal, and then waits for a random
time interval before retransmission
Geeky Hub

17.
PROXY & VPN

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
PROXY
If you are wanting to surf the web anonymously then proxies can provide you with a means to hide your home IP address from the rest
of the world. By connecting to the internet through proxies, the home IP address of your machine will not be shown but rather the IP of
the proxy server will be shown.

PROXY SERVER
A proxy server is a server application that acts as an
intermediary between a client requesting a resource
and the server providing that resource.
What is a VPN ?
A VPN is a service that both encrypts your data and hides your IP address by bouncing your network activity through a secure
chain to another server miles away. This obscures your online identity, even on public Wi-Fi networks, so you can browse the internet
safely, securely and anonymously.
1. 2.
Remote Access VPN :- A remote access virtual private network Intranet VPNs - If a company has one or more remote
(VPN) enables users who are working remotely to securely locations that they wish to join in a single private network,
access and use applications and data that reside in the they can create an intranet VPN to connect LAN to LAN.
corporate data center and headquarters, encrypting all traffic the
users send and receive.
3.
Extranet VPNs – An extranet VPN links outside customers, suppliers, partners, or communities of interest to an enterprise
customer's network over a shared infrastructure using dedicated connections
Geeky Hub

18.
Server & Datacenter

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
What is a Server?
A server is a computer or system that provides
resources, data, services, or programs to other
computers, known as clients, over a network. In
theory, whenever computers share resources with
client machines they are considered servers. ... This
means that a device could be both a server and a
client at the same time.
WHAT IS A SERVER?

A COMPUTER A PROGRAM
(HARDWARE)? (SOFTWARE)?

OR
WHAT IS A SERVER?

A COMPUTER A PROGRAM
(HARDWARE)? (SOFTWARE)?

OR
WHAT IS A SERVER?

A typical PC (Desktop or Laptop)


+
Apache HTTP Server (Software)

=
Web Server
How Server Works?

REQUEST REQUEST

REQUEST
How Server Works?

SERVICE SERVICE

SERVICE
Server Types?

Type Provide… Examples

Database Server Database Services • Microsoft SQL Server


• Oracle Database
• MySQL

Web Server Web Sites Hosting • Apache HTTP Server


• Microsoft IIS
(Part of
Microsoft
Windows)
File Server File Services • Microsoft Windows
(Storing Storage Server (Built on
Shared the Microsoft Windows
Files) Server)
Server Types?

Type Provide… Examples


Mail Server E-mail Services • Microsoft Exchange Server
• IBM Lotus Domino

Application Server An • Oracle WebLogic Server


Environment • Oracle Application Server
To Run • Oracle GlassFish Server
Certain • Zend Server
Applications

DNS Server Translation of • Microsoft Windows Server


Domain Names • BIND
Into IP
Addresses
Server Types?

Type Provide… Examples


Proxy Server Filtering • Microsoft Forefront
And Threat Management
Caching Gateway (ISA Server)
• Apache HTTP Server
• Apache Traffic Server
Print Server Printer Services • Microsoft Windows
Storage Server (Built on
the Microsoft Windows
Server)

OTHER TYPES OF SERVERS:

FTP Server, Chat Server, Fax Server, Game Server, Audio/Video Server
Exchange Server
Microsoft Exchange Server is Microsoft's email, calendaring, contact, scheduling and collaboration platform. It is
deployed on the Windows Server operating system (OS) for business use. Microsoft designed Exchange Server to give
users access to the messaging platform from mobile devices, desktops and web-based systems. Telephony capabilities
in Exchange Server support voice messages.

Backup Server
A backup server is a type of server that facilitates data, file, application, and/or database backup. It has both hardware
and software capabilities so you can manage and recover your backups – it can be locally-based or a remote backup
server. ... When it comes to cloud deployment, a remote backup server is used.
WHAT IS A DATACENTER

Data centers are designed to house information systems


and related components such as:
Servers
Routers
Storage
Uninterruptable power
supplies (UPS)
Cooling Units

Data centers have unique and typically large power


requirements

They are often raised floor designs to accommodate the


large amount of cables required.

178
DATA CENTER COMPONENTS:
COOLING
Approximately half of the power consumed in the data center is used in cooling
Cooling Options
Computer Room Air Conditioning (CRAC)
Liquid Cooling
Air Side Economizers

DATA CENTER COMPONENTS: UPS


Uninterruptable Power Supply (UPS)
Conditions power
Provides power to avoid outages during power failure lasting seconds or minutes
Provides time to shutdown, failover, or initiate backup power for longer outages
Geeky Hub

19.
Network Security

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Computer Network Security
Computer network security consists of measures taken by business or some organizations to monitor and prevent unauthorized access
from the outside attackers.

Privacy :- The transmitted message should be sent only to the intended receiver while the message should be opaque for others.

Message Integrity :- Data integrity means that the data must arrive at the receiver exactly as it was sent. There must be no changes in the
data content during transmission
Authentication :- Authentication means that the receiver is sure of the senders identity, i.e., no imposter has sent the message.

Non Repudiation :- Non-Repudiation means that the receiver must be able to prove that the received message has come from a specific
sender.
Encryption/Decryption

Encryption: Encryption means that the sender converts the original information into another form and sends the
unintelligible message over the network.

Decryption: Decryption reverses the Encryption process in order to transform the message back to the original form.

The data which is to be encrypted at the sender site is known as plaintext, and the encrypted data is known as ciphertext.
The data is decrypted at the receiver site.

There are two types of Encryption/Decryption techniques:


Algorithms :- DES, 3DES, AES & RCA, RSA
•Privacy with secret key Encryption/Decryption
•Privacy with public key Encryption/Decryption
Secret Key Encryption/Decryption technique Public Key Encryption/Decryption technique

In Secret Key Encryption/Decryption technique, the same


key is used by both the parties, i.e., the sender and
receiver.
There are two keys in public key encryption: a private key and a
public key.The private key is given to the receiver while the public
key is provided to the public.
Geeky Hub

20.
NAS & NAT

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Network Attached Storage (NAS)

Network-attached storage (NAS) is dedicated file storage that enables multiple users and
heterogeneous client devices to retrieve data from centralized disk capacity. Users on a local area
network (LAN) access the shared storage via a standard Ethernet connection.
Network Address Translation (NAT)
To access the Internet, one public IP address is needed, but we can use a private IP address in our private network. The idea of NAT is
to allow multiple devices to access the Internet through a single public address. Network Address Translation (NAT) is a process in
which one or more local IP address is translated into one or more Global IP address

● Uses private addresses:


■ 10.0.0.0-10.255.255.255,
■ 172.16.0.0-172.32.255.255 or
■ 192.168.0.0-192.168.255.255
.

Network Address Translation (NAT)


There are 3 ways to configure NAT:

Static NAT :- A static network address translation (static NAT) is a type of NAT technique that routes and maps network traffic
from a static public IP address to an internal private IP address and/or network.

Dynamic NAT :- Dynamic network address translation (Dynamic NAT) is a technique in which multiple public Internet
Protocol (IP) addresses are mapped and used with an internal or private IP address.

Port Address Translation (PAT) :- Port address translation (PAT) is a function that allows multiple users within a private
network to make use of a minimal number of IP addresses. Its basic function is to share a
single IP public address between multiple clients who need to use the Internet publicly. It is
an extension of network address translation (NAT).
Basic Operation of
NAT
Geeky Hub

21.
RAID (Redundant Array of Independent Disk)

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
RAID : Redundant Array of Independent Disk
RAID, or “Redundant Arrays of Independent Disks” is a technique which makes use of a combination of
multiple disks instead of using a single disk for increased performance, data redundancy or both.
RAID 1(Mirrored)

strip 0 strip 1 strip 2 strip 3

strip 4 strip 5 strip 6 strip 7

strip 8 strip 9 strip 10 strip 11


strip 12 strip 13 strip 14 strip 15

strip 0 strip 1 strip 2 strip 3

strip 4 strip 5 strip 6 strip 7


strip 8 strip 9 strip 10 strip 11
strip 12 strip 13 strip 14 strip 15
Geeky Hub

22.
Sharing Folder in Network

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
For Sharing…
1. Permissions
2. Discovery of Network
3. Sharing Privacy
4. Firewall Rule
5. Same Network
Geeky Hub

23.
Telnet in Network

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Telnet Remote Config?

Telnet utility allows users to test connectivity to remote machines and issue commands through the use of a keyboard.

Network Virtual Terminal


Network Virtual terminal: An application layer allows a user to log on to a remote host.
Geeky Hub

24.
Remote Desktop Connection

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Remote Desktop Connection
Remote Desktop Connection (RDC) is a technology that permits a computer to connect, gain access and
take control of a remote PC over a network. It implements Remote Desktop Protocol (RDP) through Terminal
service or Windows Remote Desktop Service to gain remote access over a computer or a network.
Geeky Hub

25.
Windows Remote Assistance

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Windows Remote Assistance
A remote assistance when enabled allows another user on the Internet to use your computer. This may be asked by Microsoft agent or
your friend or something else. Take caution while giving anyone remote access, this means everything in the PC is accessible to the one
who has taken control.
Geeky Hub

26.
FTP in Network

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
FTP (File Transfer Protocol)
A popular means of data exchange is connecting computers to one another. The File Transfer Protocol (FTP) is used to transfer files
between two computers over a network and Internet. ... Auto FTP Manager is an advanced FTP client that automates file transfers
between your computer and the FTP server.
Geeky Hub

27.
Configuring Network

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Let’s Configure Network
Geeky Hub

28.
Configuring Router

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Let’s Configure Router
Geeky Hub

29.
Protocols You need to know

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Protocols
1. IP
2. HTTP
3. HTTPS
4. FTP
5. TFTP
6. SMTP
7. POP3
8. IMAP
9. SNMP
10. TELNET
11. ICMP
12. IGMP
Geeky Hub

30.
Networking Commands You need to know

Make Sure to watch whole video, if possible then download the video and
Geeky Hub watch it whenever you have time! All the best!!! /__adarshrajput
Commands
1. Ipconfig
2. systeminfo
3. Hostname
4. Ping
5. getmac
6. Tracert
7. Netstat
8. Nslookup
9. Netsh wlan show profiles
10. Netsh wlan show all
11. Netsh wlan show interfaces
12. Netsh wlan export profile name
13. Netsh wlan add profile name
14. Netsh wlan delete profile name

Hope you may get some value from this
video If, Yes then hit LIKE Button!

Download this presentation link is in description

You might also like