0% found this document useful (0 votes)
85 views74 pages

Configure Network Peripherals Guide

Uploaded by

Chala Bekele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views74 pages

Configure Network Peripherals Guide

Uploaded by

Chala Bekele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Unit Four:-Install and Configure peripherals to a network

 Computer networking refers to interconnected computing devices that can exchange data
and share resources with each other.

 These networked devices use a system of rules, called communications protocols, to


transmit information over physical or wireless technologies.

 A computer network is a set of computers sharing resources located on or provided by


network nodes. The computers use common communication protocols over digital
interconnections to communicate with each other.

 A computer network, also referred to as a data network, is a series of interconnected nodes


that can transmit, receive and exchange data, voice and video traffic.

 Examples of nodes in a network include servers or modems.

 Computer networks commonly help endpoint users share resources and communicate.
Advantage of Networking:
 Share Documents
 Exchange e-mail messages
 Live audio and video broadcast
 Using one device for many computers like printer
 Sharing external memory like Hard disk.
 Security.
A computer network is mainly of four types by their geographical coverage:

1. LAN(Local Area Network)


2. PAN(Personal Area Network)
3. MAN(Metropolitan Area Network)
4. WAN(Wide Area Network)
LAN(Local Area Network)

 A local area network (LAN) is a collection of devices connected together in one


physical location, such as a building, office, or home.

 A network is a group of two or more connected computers, and a LAN is a network


contained within a small geographic area, usually within the same building.

 Home WiFi networks and small business networks are common examples of LANs.
Personal area network (PAN)

 A PAN is a computer network for interconnecting electronic devices within


an individual person's workspace. A PAN provides data transmission among
devices such as computers, smart phones, tablets and personal digital
assistants.

 One of the most common real-world examples of a PAN is the connection


between a Bluetooth earpiece,Remote and a Smartphone.

 PANs can also connect laptops, tablets, printers, keyboards, and other
computerized devices.
Features of PAN :
 Low cost, little or No infrastructure setup.
 Short range communication.
 Small personal network , use anywhere.
 Wide range of devices.
 Low power consumption.
 No complex connectivity.
There are two types of Personal Area Network:

 Wireless Personal Area Network:

 Wireless Personal Area Network is developed by simply


using wireless technologies such as Wi-Fi, Bluetooth. It is
a low range network.
 Wired Personal Area Network:

 Wired Personal Area Network is created by using the USB


and Network cable.
MAN (Metropolitan Area Network)

 A MAN is a network that covers a larger geographic area by interconnecting a


different LAN to form a larger network.

 Government agencies use MAN to connect to the citizens and private industries.

 In MAN, various LANs are connected to each other through a telephone exchange
line.

 The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.

 It has a higher range than Local Area Network(LAN).


Uses of Metropolitan Area Network:

 MAN is used in communication between the banks in a city.

 It can be used in an Airline Reservation.

 It can be used in a college within a city.

 It can also be used for communication in the military.


WAN (Wide Area Network)
 A Wide Area Network is a network that extends over a large geographical area such
as states or countries.

 A Wide Area Network is quite bigger network than the LAN.

 A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.

 The internet is one of the biggest WAN in the world.

 A WAN is widely used in the field of Business, government, and education.


Advantages of Wide Area Network:

a. Geographical area: A Wide Area Network provides a large geographical area.


Suppose if the branch of our office is in a different city then we can connect with
them through WAN. The internet provides a leased line through which we can
connect with another branch.

b. Centralized data: In case of WAN network, data is centralized. Therefore, we do


not need to buy the emails, files or back up servers.

c. Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
Cont’s

d. Exchange messages: In a WAN network, messages are transmitted fast. The web
application like Facebook, Whatsapp, Skype allows you to communicate with friends.

e. Sharing of software and resources: In WAN network, we can share the software
and other resources like a hard drive, RAM.

f. Global business: We can do the business over the internet globally.

g. High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in turn
increases the productivity of our company.
Disadvantages of Wide Area Network:

a. Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security problem.

b. Needs Firewall & antivirus software: The data is transferred on the internet which can
be changed or hacked by the hackers, so the firewall needs to be used. Some people can
inject the virus in our system so antivirus is needed to protect from such a virus.

c. High Setup cost: An installation cost of the WAN network is high as it involves the
purchasing of routers, switches.

d. Troubleshooting problems: It covers a large area so fixing the problem is difficult.


Category of computer Network by its Functional Relationship:

1. Peer-to-Peer Networking

 In P2P networking, a group of computers are linked together with equal permissions
and responsibilities for processing data. Unlike traditional client-server networking,
no devices in a P2P network are designated solely to serve or to receive data.

 In a peer-to-peer network, computers on the network are equal, with each workstation
providing access to resources and data.

 This is a simple type of network where computers are able to communicate with one
another and share what is on or attached to their computer with other users.
Cont’s

 The primary goal of peer-to-peer networks is to share resources and help computers
and devices work collaboratively, provide specific services, or execute specific tasks.
As mentioned earlier, P2P is used to share all kinds of computing resources such as
processing power, network bandwidth, or disk storage space.

 Other key uses of a P2P network include: File sharing: The use of P2P in file sharing
is extremely convenient for businesses. P2P networking can also save you money with
this feature because it eliminates the need to use another intermediate server to
transfer your file.

 Peer-to-Peer computer network is a network that relies on computing power at the


edges of a connection, there is no hierarchy among the computers.
 Advantages

 Much easier to set up than a client-server network - does not need specialist
knowledge
 Less initial capital – no need for a dedicated server
 No need for system administration (administrator)

 Disadvantages

 Ensuring that viruses are not introduced to the network is the responsibility of
each individual user
 Decentralized – no central repository for the files and application.
 Security – does not provide the security available on a client/server network.
 2. Client-Server Network

 In the environment with more than 10 users, a peer to peer network will not
adequate. There need comes to use a dedicated computer which optimized
(increase) the service of network to clients quickly and ensure the security of files.

 Therefore, there will be one or more server computers which serve other station
(client) computers to optimized network system. A dedicated computer with
software that carries out some task on behalf of users.
What is Server?
 Server is a dedicated computer that provide resources to Network users or Client computers.

 Advantages of server-based network

 Centralized – resources and data security are controlled through the server
 Scalability – any or all elements can be replaced individually as need increase.
 Flexibility – new technology can be easily integrated into system
 Interoperability – all components (client/network/server) work together
 Accessibility – server can be accessed remotely and across multiple platforms.

 Disadvantages of server-Based computer networks

 Expensive – requires initial investment in dedicated server


 Maintenance – large networks will require a staff to ensure efficient operations
 Dependence- when a server goes down, operations will cease across the network.
 Server may fail- incase the server failed, the entire network goes down
 Types of Server:

 File and Printer server

 Mail server

 Communication server

 Directory service server

 Application server

 Fax server

 Backup Server
Network Topology
 Network topology is the arrangement of the elements of a communication
network. Network topology can be used to define or describe the arrangement of
various types of telecommunication networks, including command and control
radio networks, industrial field busses and computer networks.

 Network topology is the topological structure of a network and may be depicted


physically or logically.
 The term topology, or more specifically, network topology, refers to the
arrangement or physical layout of computers, cables, and other components on
the network.
 In addition, the term “topology” you will find several other terms that are used to
define a network’s:
Physical design network diagram/Map

a. Bus Topology
b. Star Topology
c. Ring Topology
d. Mesh Topology
e. Hybrid Topology
a. Bus topology

 Bus Topology also known as line topology, is a type of network


topology in which all devices in the network are connected by one
central RJ-45 network cable or coaxial cable. The single cable, where
all data is transmitted between devices, is referred to as the bus,
backbone, or trunk.

 An example of bus topology is connecting two floors through a single


line. Ethernet networks also use a bus topology. In a bus topology, one
computer in the network works as a server and other computers behave
as clients. The purpose of the server is to exchange data between client
computers.
Cont’s
 It is often referred to as a “linear bus” because the computers are connected in a
straight line. This is the simplest and most common method of networking
computers.

 In a bus topology, all computers are connected to a shared communication line,


called a trunk or a backbone.

 The computers are connected to the backbone using T-connectors.

 Both ends of the backbone use terminators in order to prevent reflection of signals.

 If the terminator is missing or is deliberately removed, the data transmissions are


disrupted.

 There is no central device or any special configuration.


Advantages
 A bus network is the cheapest of all topologies.
 No special configuration is required.
 It is easy to install, and no special equipment is
 needed for installation.
 It needs less cable length than do other topologies.

 Disadvantages

1. A break in cable or a missing terminator can


2. bring down the entire network.
3. It is not possible to add or remove computers
4. without disrupting the network.
Star Topology

 Star topology is a network topology in which each network component is physically


connected to a central node such as a router, hub or switch. In a star topology, the
central hub acts like a server and the connecting nodes act like clients.

 A star network is a local area network (LAN) in which all nodes (workstations or
other devices) are directly connected to a common central Hub or Switch.

 Every workstation is indirectly connected to each other through the central Hub or
Switch.

 Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination. The hub, switch, or concentrator manages and controls
all functions of the network. It also acts as a repeater for the data flow. This
configuration is common with twisted pair cable; however, it can also be used with
coaxial cable or fiber optic cable.
Advantages of a Star Topology

 Easy to install and wire.


 No disruptions to the network when connecting or removing devices.
 Easy to detect faults and to remove parts.

 Disadvantages of a Star Topology


 Requires more cable length than a linear topology.
 If the hub, switch, or concentrator fails, nodes attached are disabled.
 More expensive than linear bus topologies because of the cost of the hubs, etc.
Ring Topology

 Ring topology is a type of network topology in which each device is


connected to two other devices on either side via an RJ-45 cable or coaxial
cable. This forms a circular ring of connected devices which gives it its
name. Data is commonly transferred in one direction along the ring, known
as a unidirectional ring.

 A ring network is a network topology in which each node connects to


exactly two other nodes, forming a single continuous pathway for signals
through each node – a ring. Data travels from node to node, with each node
along the way handling every packet.
Mesh Topology

 A mesh topology is a network setup where each


computer and network device is interconnected with one
another. This topology setup allows for most
transmissions to be distributed even if one of the
connections goes down. It is a topology commonly used
for wireless networks.
 In a mesh topology, all computers in the network are
connected to every other computer, forming a mesh of
connections and each computer makes a point-to-point
connection to every other computer.
There are two types of mesh topology

 Full mesh topology

 Each node (workstation or other device) is connected directly to each of the


others.

 Partial mesh topology

 Some nodes are connected to all the others, but some of the nodes are connected
only to those other nodes with which they exchange the most data.
 Advantages
 A mesh network is highly reliable because of redundant multiple paths between
computers.
 The failure of a single computer or a cable fault does not affect network
operations.
 Computers can be added or removed without affecting the network.
 Disadvantages
 It is difficult to install and troubleshoot.
 It is very expensive because of the length of cable required to make multiple
redundant connections.
 Only a limited number of computers can be connected in a mesh topology.
Hybrid Topology

 It is combination of any two or more network topologies.

These instances can occur where two basic network


topologies, when connected together, can still retain the basic
network character, and therefore not be a hybrid network.

 A hybrid topology is a type of network topology that uses

two or more differing network topologies. These topologies


can include a mix of bus topology, mesh topology, ring
topology, star topology, and tree topology.
 Advantages of Hybrid Topology

 Used for a vast network


 Reliable to use
 Any topology can be combined to make a new network
 Scalable and very effective

 Disadvantages of Hybrid Topology

 Costly very expensive


 Difficult to install
 Need more Hardware requirements
 Cable failure
 Some of the major applications of the hybrid topology are the financial and
banking sector, automated industries, multi-national companies, research
organizations, and many educational institutions.

 The best cabled network topology for large businesses is the star topology.
This is because it is easier to control from a central console as the
management software just needs to communicate with the switch to get full
traffic management features.
 Network Transmission Media

 Transmission Media is the physical path between the transmitter and the receiver
in a data communication system.
 Transmission Media categorized in two categories:-

1. Wired/Guided

 Wire/Guided Transmission Media uses a "cabling" system that guides the data
signals along a specific path. The data signals are bound by the "cabling" system.
Guided Media is also known as Bound Media. Cabling is meant in a generic
sense in the previous sentences and is not meant to be interpreted as copper wire
cabling only.
Cont’s

2. Wireless/Unguided

 Wireless/Unguided Transmission Media consists of a means for the data signals to

travel but nothing to guide them along a specific path. The data signals are not bound

to a cabling media and as such are often called Unbound Media.

 Commonly types of guided transmission are:-

a. Twisted Pair Cable

b. Coaxial Cable

c. Optical fiber cable


a. Twisted Pair Cable

 Twisted pair cabling is a type of wiring in which two conductors of a single

circuit are twisted together for the purposes of improving electromagnetic

compatibility.

 Twisted-pair cable consists of two insulated strands of copper wire twisted

around each other.

 The oldest, least expensive and most commonly used transmission media.
 Two types of twisted-pair cable:-

1. Unshielded twisted-pair (UTP)

 Unshielded twisted pair (UTP) cables are widely used in the computer and
telecommunications industry as Ethernet cables and telephone wires. In an UTP
cable, conductors which form a single circuit are twisted around each other in
order to cancel out electromagnetic interference (EMI) from external sources.

 UTP cables are mostly used for LAN networks. They can be used for voice, low-
speed data, high-speed data, audio and paging systems, and building automation
and control systems. UTP cable can be used in both the horizontal and backbone
cabling subsystems.
Cont’s

 It is the most commonly used cable types in LANs.

 It is made up of four twisted pairs enclosed in a plastic jacket.

 Depending on the bandwidth offered there are seven types of UTP


cables such as Cat-1,Cat-2,cat-3,cat-4,cat-5,cat-6 and cat-7
2. Shielded Twisted Pair (STP) cable

 Uses a woven copper braid jacket and higher quality protective jacket. Also
uses foil wrap b/n and around the wire pairs

 Much less susceptible to interference and supports higher transmission rates


than UTP

 shielding makes it somewhat harder to install

 same 100 meters limit as UTP

 uses RJ-45 telephone-type connectors (larger than telephone and consists of


eight wires vs. telephone’s 4 wires)
b. Coaxial Cable

 Coaxial Cable consists of 2 conductors. The inner conductor is held inside an


insulator with the other conductor woven around it providing a shield. An insulating
protective coating called a jacket covers the outer conductor.

 The outer shield protects the inner conductor from outside electrical signals. The
distance between the outer conductor (shield) and inner conductor plus the type of
material used for insulating the inner conductor determine the cable properties or
impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV, 50
ohms for Ethernet Thinnet and Thicknet. The excellent control of the impedance
characteristics of the cable allow higher data rates to be transferred than Twisted Pair
cable.
c. Fiber optic (Optical Fiber)
 Optical fiber is the technology associated with data transmission using light pulses travelling along
with a long fiber which is usually made of plastic or glass. Metal wires are preferred for transmission
in optical fiber communication as signals travel with fewer damages. Optical fibers are also unaffected
by electromagnetic interference. The fiber optical cable uses the application of total internal reflection
of light. An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by
a concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is
easier to install, but cannot carry the light pulses for as long a distance as glass.

 The basic function of any optical fiber is to guide light, i.e., to act as a dielectric waveguide. Light
injected into one end should stay guided in the fiber. In other words, it must be prevented from getting
lost e.g. by reaching the outer surface and escaping there. We explain this here for glass fibers, but the
operation principle of plastic optical fibers is the same.

 In principle, the simplest solution for guiding light would be a homogeneous glass rod. If it is thin
enough, it can also be bent to some degree. The outer surface can reflect light via total internal
reflection. Due to the large refractive index contrast, this works for a considerable range of input beam
angles, and in principle there don't need to be any power losses.
Two types of optical fiber are commonly available:

1. Single-mode and Multimode.

 Single-mode fiber is used for long runs because it can transmit data 50 times
further than multimode fiber and at a faster rate. For example, single-mode fiber
might be used on an organization’s corporate campus between buildings. Single-
mode fiber (SMF), on the other hand, has a small core that allows only a single
light beam to pass. The light transmissions in single-mode fiber pass through the
core in a direct line, like a flashlight beam.
Difference between Single mode and Multimode
Multimode fiber (MMF)

 Multimode fiber (MMF) has a larger core than single-mode. This larger core
allows hundreds of light rays to flow through the fiber simultaneously.

 The numerous light beams in multimode fiber bounce around inside the core,
inching toward their destination. Because light beams bounce within the core, the
light beams slow down, reduce in strength, and take some time to travel along the
cable. Multimode fiber provides high bandwidth at high speeds over medium
distances (up to about 3000 feet) but can be inconsistent for very long runs.
Cabling system
 Three types of Ethernet cables are available

Straight-through cable

 Crossover cable

 Rolled cable
The straight-through cable is used to connect
 Host to switch or hub
 Router to switch or hub
The crossover cable can be used to connect

 Switch to switch
 Hub to hub
 Host to host
 Hub to switch
 Router direct to host
 Pc to Pc
 Rolled Cable
You can use a rolled Ethernet cable to connect a
host to a router console serial communication
(com) port.
 Networking Devices

 The network device is one kind of device used to connect devices or computers
together to transfer resources or files like fax machines or printers.

 Common network device:-

 Hub
 Switch
 Router
 Bridge
 Gateway
 Modem
 Repeater
 Access Point
HUB
 A network hub is a node that broadcasts data to every computer or Ethernet-
based device connected to it. A hub is less sophisticated than a switch, the latter
of which can isolate data transmissions to specific devices. Network hubs are
best suited for small, simple local area network (LAN) environments.

 In general, a hub refers to a hardware device that enables multiple devices or


connections to connect to a computer. An example is a USB hub, which allows
multiple USB devices to connect to one computer, even though that computer
may only have a few USB connections.
 There are three types of network hubs:

 Passive

 Active

 Intelligent network.

They do not improve the performance of local area networks (LANs), and may
limit maximum media distances. Typically, passive hubs are connected to other
devices in a star configuration.
Switch
 Just like a hub and a bridge, a switch is also used to connect multiple devices in a
LAN segment. A switch is the upgraded version of the bridge. Besides providing
all the functionalities of a bridge, it also offers several additional features.

 The biggest advantage of a switch is that it makes switching decisions in


hardware by using application-specific integrated circuits (ASICs).

 Unlike the generic processors that we use in our PC, ASICs are specialized
processors built only to perform particular tasks. Usually, the ASICs in switches
have a single task and that is switching the frames as fast as they can.

 An ASIC occupied switch performs this task blazingly fast. For example, an
entry-level 2960 Catalyst Switch can process 2.7 million frames per second.
Router
 A router connects different network segments. It switches data packets between networks that
are either located in different logical segments or constructed with different network-layer
protocols.

 A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet.

 When a router receives a data packet on any of its interfaces, it checks the destination address
of that packet, and based on that destination address, forwards that data packet to the interface
that is associated with the destination address.

 To forward data packets to their destination, the router keeps a record of the connected network.
These records are maintained in a database table known as the routing table. Routing tables can
be created statically or dynamically.
The main functions of routers are the following: -

 To connect different network segments.


 To connect different network protocols such as IP and IPX.
 To connect several smaller networks into a large network.
 To break a large network into smaller networks.
 To connect two different media types such as UTP and Fiber optical.
 To connect two different network architectures such as Token Ring and
Ethernet.
 To connect LAN network with Telco company's office.
 To access DSL services.
Bridge

 A bridge is used to divide a large network into smaller segments. The basic functions
of a bridge are the following: -

1. Breaking a large network into smaller segments.


2. Connecting different media types such as UTP and fiber optic.
3. Connecting different network architectures such as Ethernet and the Token ring.

 A bridge can connect two different types of media or network architecture, but it
cannot connect two different types of network layer protocols such as TCP/IP or IPX.
It requires the same network-layer protocols across all segments.
There are three types of bridge:-

 Local Bridge: - The Bridge directly connects two LAN segments. In Ethernet
implementations, this is known as a transparent bridge. In the Token Ring network,
this is called a source-routed bridge.

 Remote Bridge: - This Bridge connects with another Bridge over the WAN link.

 Wireless Bridge: - This Bridge connects with another Bridge without using wires. It
uses radio signals for connectivity.

 In networking models such as the OSI layers model and TCP/IP model, the
functionalities of Bridges are defined in the physical layer and data link layer.

 Just like a Hub, a Bridge is also no longer used in the computer network. Bridges
have been replaced by switches.
Gateway

 Gateway is used to forward packets that originate from a local host or a local network and are intended for remote
networks. If a data packet does not get its destination address in the local network then it takes the help of the
gateway device to find the destination address in the remote network. The gateway device knows the path to the
remote destination address. If necessary, it also encapsulates the packet so that it can travel through other networks
to reach its destination address.

 Modem

 A modem is a device that is used to connect to the Internet. Technically, it is the device that enables digital data to
be transmitted over telecommunication lines.

 A Telco company uses entirely different data transmission technology from the technology that a PC uses for data
transmission. A modem understands both technologies. When it receives signals from the PC, it converts them into
the format that the Telco company understands. When it receives signals from the Telco company, it converts them
into a format that the PC understands.
 Repeater
 Repeaters are usually used to strengthen signals going long distances.

 A repeater amplifies the signal it receives on one port before it transmits it


on other ports.

 Because the repeater does not check on the contents of the data it receives
or retransmits, frames that are corrupted by noise and other factors can also
be repeated.

 The development of the hub replaced the repeater for all practical
purposes, because it performs the same functions, and can include
additional features.
Network Interface Cards (NICs)
 NICs are the mechanisms by which computers connect to a
network.
 NICs come in all shapes and sizes, and they come in prices to suit
all budgets.
 Known as network card, network adapter, and LAN adapter, etc.
 When buying one consider

1. Network compatibility – Ethernet/Token Ring


2. Bus compatibility – PCI/ ISA /PCI-e
3. Port compatibility – UTP/ Fibre
4. Hardware compatibility – Easy to install / Recognized by many
OS’s
Wireless Access Point (WAP)
 are a transmitter and receiver (transceiver) device used for wireless LAN
(WLAN) radio signals.

 Depending on the size of the network, one or more WAPs may be required.
Additional WAPs are used to allow access to more wireless clients and to
expand the range of the wireless network.
Transceivers
 The term transceiver does not necessarily describe a separate network device
but rather an integrated technology embedded in devices.
 transceiver = transmitter and a receiver

 device that receives data, converts it, and then sends it to another location

 RF transceivers, fiber-optic transceivers, Ethernet transceivers, are examples

 can also be used in pairs to insert a fiber segment into copper networks
Firewall

 a hardware or software system that is used to separate one computer or network


from another one.

 The most common type is used to protect a computer or an entire network from
unauthorized access from the Internet.

 can also be used to control the flow of data to and from multiple networks within
the same organization. Firewalls

 can be programmed to filter data packets based on the information that is contained
in the packets.
IP Terminology
 Bit A bit is one digit, either a 1 or a 0.

 Byte A byte is 7 or 8 bits, depending on whether parity is used.

 Octet An octet, made up of 8 bits, is just an ordinary 8-bit binary number.

 Network address This is the designation used in routing to send packets to a remote
network for example, [Link], [Link], and [Link].

 You can depict an IP address using one of three methods:

 Dotted-decimal, as in [Link]

 Binary, as in 10101100.00010000.00011110.00111000

 Hexadecimal, as in AC.10.1E.38
Three classes of networks
 Network Address Range: Class A

 0xxxxxxx

 00000000 = 0

 01111111 = 127

 Network Address Range: Class B

 10000000 = 128

 10111111 = 191
Network Address Range: Class C
 11000000 = 192

 11011111 = 223

 Network Address Ranges: Classes D and E

 The addresses between 224 to 255 are reserved for Class D and E networks.

 Class D (224–239) is used for multicast addresses and Class E (240–255) for scientific
purposes
Private IP Addresses.
Subnet Masks
 A subnet mask is a 32-bit value that allows the recipient of IP packets to
distinguish the network ID portion of the IP address from the host ID portion of
the IP address.

 The network administrator creates a 32-bit subnet mask composed of 1s and 0s.

 The 1s in the subnet mask represent the positions that refer to the network or
subnet addresses.
Configure security
 The Network Security Configuration feature lets apps customize their network
security settings in a safe, declarative configuration file without modifying app
code. These settings can be configured for specific domains and for a specific app.

 How to Set Up a Secure Network: Back to Basics

 Step One: Locate and Open Up Your Router Settings Page.


 Step Two: Create a Password for Your Router.
 Step Three: Change the Name of Your Network's SSID.
 Step Four: Enable Network Encryption.
 Step Five: Filter Out Your Mac Addresses.
 Step Six: Reduce Your Wireless Signal's Range.
8 ways to improve wired network security

 Perform auditing and mapping.


 Keep the network up-to-date.
 Physically secure the network.
 Consider MAC address filtering.
 Implement VLANs to segregate traffic.
 Use 802.1X for authentication.
 Use VPNs to encrypt select PCs or servers.
 Encrypt the entire network.
Devices needed to be secured

 These devices include routers, firewalls, switches, servers, load-balancers,


intrusion detection systems, domain name systems, and storage area
networks.

 These devices are ideal targets for malicious cyber actors because most or
all organizational and customer traffic must pass through them.
Configure workstation
 Do you have a question ?

You might also like