SlideShare a Scribd company logo
1 of 107
What is computer networking
Computer networking means sharing of data &
resources between two or more computer with a
communication between them. The communication
medium can be through wires, radio waves, leased line,
infra-red, optical fiber etc.
The main purpose of networking is sharing of data &
resources.
Advantages of Networking
 Sharing Information
 Sharing Hardware resources
 Sharing software resources
 Centralizing administration
 Pre-reserving Information
 Protecting Information
 E-mail
Disadvantage of Networking
 If fault occur in the server then all the clients are failed
  to access software's from server.
 Network fault can cause lose of Data & resources.
 System open to hackers.
 User work dependent up on network.
Advantage of Networking
 Networking Enables:
                                                Information
                                                  Sharing




    Centralized
   Administration
    and Support
                       Hardware and Software Sharing

                                                              5
Networking Devices
 NIC (Network Interface Card) :-
     A card installed in a computer that unable the computer to
    communicate a network. All NIC implement a networking standards
    called Ethernet Every client & server must have a network interface
    card in order to be a part of network.
   Cable:-
     computers in a network are physically connected to each other using
    cables.
   Hub/Switch:-
     Network cables usually does not connect computer directly to each
    other. Instead of this, Each computer connected by a cable to a device
    known as hub or switch. The hub or switch connect rest of the network.
    Each switch contain certain no of port typically 8,16,24 etc.
   Network software:-
      Typically server computer use a special software in order to function
    efficiently & the client computer needs to have their setting
    configuration in order to access to the network.
      Network software is used to efficiently shar information.
 Modem:-
  modem is the combination of two word modulation &
  demodulation. Modem is a device which convert analog
  signal to digital signal & vice versa.
 Router:-
  A router is a device that forwards data packets along
  networks. The router used to connect two or more
  networks & uses multiple paths to send & receive data.
  sometimes router is also called gateway.
 Access point:-
  Access point act as an interface cable network & wireless
  device. We can also connect nodes(computer) to a access
  point.
 Repeater:-
  Repeaters are used maintain the strength of the signal
  constant. Hub, Switchs, routers are also acts as a repeater.
Difference Between Switch & Hub
              Hub                             Switch
 It is manageable.                It is not manageable.
 It works on the 1st layer of     It works on the 2nd layer of
  OSI reference model.              OSI reference model.
 Collision detection is turned    Collision detection is not
  on.                               turned on.
 Operates on half Duplex          Operates on full duplex mode.
  mode.
Different Modes of Communication
 Unicast:-one sender one receiver
 Multicast:- one sender multiple devices are the
  receiver but not all
 Broadcast:-One sender all other devices are receiver.
CSMA/CD
Carrier Sense Multiple Access With Collision
detection(CSMA/CD) is a protocol that is implemented in bus
topology. It is divided into three part:-
 Multiple Access:-
Multiple access refers to the fact that in bus system. Each
Station has access to the common cable.
 Carrier Sense:-
It refer to the fact that each station listen to see if no other
station are transmitting before sending.
 Collision Detection:-
It refers to the principal of listening if other station are
transmitting While we are transmitting.
The OSI (Open Systems
Interconnection) Data Model
ISO standard for computer networks design and
 functioning.
Involves at least 7 layers, each playing a specific
 role when applications are communicating over
 the network.
OSI Layer
7. Application layer
6. Presentation
5. Session layer
4. Transport layer
3. Network layer
2. Data-link layer
1. Physical layer
Physical layer:- It ensures a safe and efficient travel
 of data; consists of electronic circuits for data
 transmission etc. The physical layer defines the
 electrical, mechanical specification for maintaining,
 activating, deactivating physical link between end
 system.
Data link layer:- It is in charge of data encapsulation
 under the form of packets. The data link layer
 defines how data is formatted for transmission
 how access to the network is control.
Network layer:- It is in charge of packets transmission
  from a source A to destination B. Network layer
  provides connectivity &path selection between two
  communicating host system that might be located
  on two different network.
Transport layer:- It is in charge of the delivery of
  packets from a source A to a destination B. The
  transport layer segments data packets from the
  sending host system & reassemble the data in a data
  stream on the receiving host system.
Session layer:- It is in charge of the management of
  network access. The session layer establish, manages
  session between two communicating host system.
Presentation layer:- It determines the format of the data
  transmitted to applications, data compressing
  decompressing, encrypting etc. The presentation layer
  ensures the information that the application layer of one
  system sends out is readable by the application layer of
  another system.
Application layer:- It contains the applications which are used
  by the end user, such as Java, Word etc. It provides network
  services to user application. It does not provide services to
  any other OSI layer.
Switch
Network Interface Card      hub




                                        Router
                         Access point

      modem
Repeaters and Hubs
                Repeater
             Transmits data to
         all connected computers


                Repeater


                   Hub
      Transmits data to all connected
       computers in a star topology



                   Hub
Switches



  Switch




           18
Routers

  Router




  Router
Cabling
The two most popular types of network cabling are
twisted-pair (also known as 10BaseT) and thin coax
(also known as 10Base2) & Optical Fiber. 10BaseT
cabling looks like ordinary telephone wire, except that
it has 8 wires inside instead of 4. Thin coax looks like
the copper coaxial cable.
Network Cables
                  Types of Cables


Twisted-Pair
                                    Unshielded (UTP)
      10BaseT
                                    Shielded (STP)


Coaxial
                10Base2, 10Base5




Fiber-Optics




                                                       21
10baseT
In this type of cabling wires are twisted to each other.
 This help to reduce the electromagnetic induction.
 When 10BaseT cabling is used, a strand of cabling is
 inserted between each computer and a hub. If you have
 5 computers, you'll need 5 cables. Each cable cannot
 exceed 325 feet in length. Because the cables from all
 of the PCs converge at a common point, a 10BaseT
 network forms a star configuration. RJ45 connectors
 are used in this type of cabling.
Standard color-code for
   Twisted pair cable
10Base2
10BASE2 coax cables had a maximum length of 185 meters
(607 ft). The maximum practical number of nodes that can
be connected to a 10BASE2 segment is limited to 30. In a
10BASE2 network. The geometric design that is formed
when thin coax cabling is used is called a linear or
backbone configuration. The reason for this is that thin
coax is always arranged in a straight line of PCs, hubs, or
other devices. Thin coax networks always require
termination. In a 10BASE2 network, each segment of cable
is connected to the transceiver (which is usually built into
the network adaptor) using a BNC T-connector, with one
segment connected to each female connector of the T.
10 Base 2 cabling
10Base2 Cable
Optical Fiber Cable
An optical fiber (or optical fibre) is a flexible,
transparent fiber made of glass (silica) or plastic,
slightly thicker than a human hair. Optical fiber can be
used as a medium for telecommunication
and computer networking because it is flexible and
can be bundled as cables. It is especially advantageous
for long-distance communications. The most
commonly used fiber optic cable is a multi-mode fiber
cable (MMF) with a 62.5 micron fiber optic core .
Single-mode fiber, another kind of cabling, is more
efficient than multi-mode, but far more expensive.
Maximum length is up to 25 km & speed is up to 2 gb.
optical fiber Cable & connector




  Optical fiber Cable
Network Models

Peer-to-Peer - A peer to peer network is one in which
 there is no dedicated server and every computer acts
 as both a client and a server. This is a good networking
 solution when there are 10 or less users .
Client/Server –
This type of network is designed to support a large
 Number of users and uses dedicated server(s) to
 accomplish this. Clients log on to the server(s) in order
 to run applications or obtain files.
Network Models
Peer-to-Peer




Client-Server




                                 30
Types of networks
Local Area Network(LAN):-
A local area network (LAN) is a computer network that spans
  a relatively small area, such as a single office or office
  building, and typically offers high-speed communications.
Metropolitan Area Networking(MAN):-
 A MAN is a computer network that usually spans with in a
  large campus or a city. A MAN usually interconnect no of
  LANs
Wide Area Networking(WAN):-
 A wide are a network (WAN) computer network that spans
  a relatively large geographical area. Computers connected
  to a wide-area network are often connected through public
  networks, such as the telephone system, leased lines
  (ISDN), satellite, microwave, or other connection method.
Wireless Local Area Network(WLAN):-
A communications network that provides connectivity to
wireless devices within a limited geographic area. "Wi-Fi" is
universal standard for wireless networks and is the wireless
equivalent of wired Ethernet networks.
Storage Area Network(SAN) :-
A SAN is a network of storage devices that can be accessed
by multiple computers. Each computer on the network can
access hard drives in the SAN as if they were local disks
connected directly to the computer. This allows individual
hard drives to be used by multiple computers, making it
easy to share information between different machines.

personal area network(PAN):-
A personal area network(PAN) is a computer network
organized around an individual person. Personal area
networks typically involve a mobile computer, a cell
phone . You can use these networks to transfer files
including email and calendar appointments, digital
photos and music. typically within 10 meters or 33 feed).
Networking Type
Local Area
Network




Wide Area Network




                    33
WAN
Storage area Network
Topology
 In computer networking topology refers to the layput
  or design of connected devices.
 Physical Topology:- It refers to the physical design of
  the network including the devices, location & cable
  installation.
 Logical Topology:-It refers to the fact that how data
  actually transfers in a network as opposed to its
  design.
Different Types of Topologies
 Bus Topology
 Star Topology
 Ring Topology
 Mesh Topology
 Tree Topology
 Hybrid Topology
Bus Topology
 All   the nodes (file server, workstations, and
  peripherals) on a bus topology are connected by one
  single cable.
 A bus topology consists of a main run of cable with a
  terminator at each end. All nodes (file
  server, workstations, and peripherals) are connected to
  the linear cable.
 Popular on LANs because they are inexpensive and
  easy to install.
Bus Topology
Bus Topology
Advantages of Bus Topology
 It is Cheap, easy to handle and implement.
 Require less cable
 It is best suited for small networks.
Disadvantages of Bus Topology
 The cable length is limited. This limits the number of
 stations that can be connected.
 This network topology can perform well only for a
 limited number of nodes.
Ring Topology
 In a ring network, every device has exactly two neighbours
  for communication purposes.
 All messages travel through a ring in the same direction.
 A failure in any cable or device breaks the loop and can
  take down the entire network.
 To implement a ring network we use the Token Ring
  technology.
 A token, or small data packet, is continuously passed
  around the network. When a device needs to transmit, it
  reserves the token for the next trip around, then attaches
  its data packet to it.
Ring Topology
Ring Topology
Advantage of Ring Topology
 Cable faults are easily located, making troubleshooting
  easier.
 Ring networks are moderately easy to install
 Easier to Mange than a Bus Network
Disadvantages of Ring Topology
 The failure of a single node of the network can cause
  the entire network to fail.
 A single break in the cable can disrupt the entire
  network.
Star Topology
 In a star network, each node (file server, workstations, and
  peripherals) is connected to a central device called a hub.
 The hub takes a signal that comes from any node and
  passes it along to all the other nodes in the network.
 Data on a star network passes through the hub, switch, or
  concentrator before continuing to its destination.
 The hub, switch, or concentrator manages and controls all
  functions of the network.
 The star topology reduces the chance of network failure by
  connecting all of the systems to a central node.
Star Topology
Star Topology
Advantages of Star Topology
 Easy to manage
 Easy to locate problems (cable/workstations)
 Easier to expand than a bus or ring topology.
 Easy to install and wire.
 Easy to detect faults and to remove parts.
Disadvantages of Star Topology
 Requires more cable length than a linear topology.
 If the hub or concentrator fails, nodes attached are
  disabled.
 More expensive
Tree Topology
 A tree topology (hierarchical topology) can be viewed
  as a collection of star networks arranged in a hierarchy.
 Tree Topology is also called the combination of bus
  topology & star Topology
 This is particularly helpful for colleges, universities and
  schools so that each of the connect to the big network
  in some way.
Tree Topology
Tree Topology
Advantages of a Tree Topology
 Point-to-point wiring for individual segments.
 All the computers have access to the larger and their
  immediate networks.
Disadvantages of a Tree Topology
 Overall length of each segment is limited by the type of
  cabling used.
 If the backbone line breaks, the entire segment goes down.
 More difficult to configure and wire than other topologies
Mesh Topology
 In this topology, each node is connected to every other
 node in the network.
 Implementing the mesh topology is expensive and
 difficult.
 In this type of network, each node may send message
 to destination through multiple paths.
 While the data is travelling on the Mesh Network it is
 automatically configured to reach the destination by
 taking the shortest route which means the least
 number of hops.
Mesh Topology
Mesh Topology
Advantage of Mesh Topology
 No traffic problem as there are dedicated links.
 It has multiple links, so if one route is blocked then other
  routes can be used for data communication.
 Points to point links make fault identification easy.
Disadvantage of Mesh Topology
 There is mesh of wiring which can be difficult to manage.
 Installation is complex as each node is connected to every
  node.
 Cabling cost is high.
Hybrid Topology
 A combination of any two or more network topologies.
 A hybrid topology always accrues when two different
  basic network topologies are connected.
 It is a mixture of above mentioned topologies.
  Usually, a central computer is attached with sub-
  controllers which in turn participate in a variety of
  topologies
Hybrid Topology
Hybrid Topology
Advantages of a Hybrid Topology
 It is extremely flexible.
 It is very reliable.
Disadvantages of a Hybrid Topology
 Expensive
IP Address
 Internet Protocol Address (or IP Address) is an unique
address that computing devices use to identify itself and
communicate with other devices in the Internet Protocol
network. Any device connected to the IP network must
have an unique IP address within its network.
IP address is a 32 bit number that is used to uniquely
identify a computer on a network.
Subnet Mask
An IP address has two components, the network address and the
host address. A subnet mask separates the IP address into the
network and host addresses (<network><host>). A Subnet mask
is a 32-bit number that masks an IP address, and divides the IP
address into network address and host address. Subnet Mask is
made by setting network bits to all "1"s and setting host bits to
all "0"s. Within a given network, two host addresses are reserved
for special purpose. The "0" address is assigned a network
address and "255" is assigned to a broadcast address, and they
cannot be assigned to a host.
Default Gateway
Computer can communicate directly with the other
computer on the same network. The only way to
communicate with a computer on the different
network is through a router(internetworking). The
default gateway represents the IP address of the router
that is used to communicate outside of its network.
IP Address classes
IP Address ranges
Class-A(1-126):-
Example:- 11.0.0.1 (IP address)
          255.0.0.0 (Subnet mask)
Binary value of subnet mask
  11111111.00000000.00000000.00000000
Total no of host=2^n=2^24=16777216
Total no of valid host=2^n-2=16777214
n=Total no of Host bit
1 represents for network bits & 0 represents for Host bits
IP Address ranges
Class-B(128-191):-
Example:- 129.0.0.12(IP address)
          255.255.0.0 (Subnet mask)
Binary value of subnet mask
  11111111.11111111.00000000.00000000
Total no of host=2^n=2^16=65536
Total no of valid host=2^n-2=65534
n=Total no of Host bit
1 represents for network bits & 0 represents for host bits
IP Address ranges
Class-C(192-223):-
Example:- 192.0.0.1(IP address)
          255.255.255.0 (Subnet mask)
Binary value of subnet mask
  11111111.11111111.11111111.00000000
Total no of host=2^n=2^8=256
Total no of valid host=2^n-2=254
n=Total no of Host bit
1 represents for network bits & 0 represents for host bits
private IP addresses
 The Internet Assigned Numbers Authority (IANA) has
  reserved the following three blocks of the IP address
  space for private local networks:-
 10.0.0.0 - 10.255.255.255
  172.16.0.0 - 172.31.255.255
  192.168.0.0 - 192.168.255.255
Public IP address
 An IP address is considered public if the IP number is
  valid and falls outside any of the IP address ranges
  reserved for private uses by Internet standards groups.
 All the computer connected to the internet must have
  unique IP address other than the private IP address.
 The IP address which is used in publicly for example
  internet & we have to pay money for that to the service
  provider.
Other reserved IP address
 127.0.0.0-127.255.255.255 is reserved for diagnostic &
  testing purpose.
 IP addresses in the range of 169.254.0.0 -
  169.254.255.255 are reserved for Automatic Private
  IP Addressing.
Setting the IP address
 Click Start > Control Panel.
 On the control panel, double-click Network Connections.
 Right-click Local Area Connection.
 Click Properties.
 Select Internet Protocol (TCP/IP), and then
  click Properties.
 Select Use the Following IP Address.
 Specify the IP address, Subnet mask, and Default
  gateway (If available)
 Click OK on the Local Area Connection Properties window.
Intranet & Extranet & Internet
 If the Network is spans with in a office building then it
  is called intranet.
 If two different networks are connected through the
  internet it is called extranet.
 Interconnection of many Computer networks is called
  Internet. It is a international Computer network.
Intranet & Extranet
Intranet




           Internet
            Internet


            Extranet

            Extranet
Uniform Resource Locator (URL)
 It is used to locate the resource in the network.
 URL
  (http://example.microsoft.com/tutorial/default.h
  tml)
   Protocol used (http://)
   DNS address (example.microsoft.com)
   Path on the server (/tutorial/default.html
Networking Protocols
 Protocol:- A set of rules or guidelines that are used in
 networking is called protocol.
 Some of the networking protocols are:-
 TCP/IP:-
  It is combination of two protocols one is TCP another
  is IP. TCP is the connection oriented reliable protocol.
  It is responsible for breaking the messages into
  segments & reassembling them at the destination
  station, resending any thing that is not received. The
  internet protocol handles the address part of the
  packets so that it gets to the right destination.
 ICMP( Internet Control Message protocol):-
  It is a networking protocol that is used by the operating
  system of network computer to send error message.
  Example:- Destination host unreachable
 Pop3(post Office Protocol) , IAMP( Internet Control
  Message Protocol) & SMTP(Simple Mail transfer
  Protocol):-
 These protocols are used for email retrieval virtually in the
  network.
 Telnet( terminal Emulation):-
  It is a protocol used for remotely accessing the computer of
  the another network.
 ARP - provides IP-address to MAC address resolution
  for IP packets. A MAC address is your computer's
  unique hardware number and appears in the form 00-
  A0-F1-27-64-E1 (for example).
 FTP - File transfer protocol is used for transferring
  files between remote systems. Must resolve host name
  to IP address to establish communication
 HTTP - The Hypertext Transfer Protocol is the set of
  rules for exchanging files (text, graphic images, sound,
  video, and other multimedia files) on the World Wide
  Web. It is the protocol controlling the transfer and
  addressing of HTTP requests and responses.
Internet protocol suite
 The     Internet protocol suite is the set
  of communications protocols used for the Internetand
  similar networks, and generally the most
  popular protocol stack for wide area networks. It is
  commonly known as TCP/IP, because of its most
  important      protocols:     Transmission        Control
  Protocol (TCP) and Internet Protocol(IP), which were
  the first networking protocols defined in this standard.
 TCP/IP provides end-to-end connectivity specifying
  how              data             should              be
  formatted, addressed, transmitted, routed and received
  at the destination. It has four abstraction layers, each
  with its own protocols.
The layers are:
1. The link layer (commonly Ethernet) contains
   communication technologies for alocal network.
2. The internet layer (IP) connects local networks, thus
   establishing internetworking.
3. The transport layer (TCP) handles host-to-host
   communication.
4. The application layer (for example HTTP)
Firewall
Firewall is any hardware or software that is designated
to prevent the unwanted networking traffic.
Firewall can block the information entering to &
getting out from the network.
Firewall
                       Authorized
LAN
                          User




LAN              Internet


      Firewall


LAN                   Unauthorized
                         User
NetMeeting
NetMeeting provides people around the world with a
new way of communicating. Users can work together
on virtually any Windows-based application, exchange
or mark up graphics on an electronic
whiteboard, transfer files, or use the text-based chat
program. To install Net meeting goes to star then run
type conf & then ok
IIS( Internet Information Service)
IIS     is web server software that provides
integrated, reliable, secure, and scalable software for
creating and managing internal corporate websites and
external websites on the internet. IIS is not installed
by default.
Creating IIS server
 Create a folder on a drive.
 Under this folder create a text file & write down something.
 Then rename the file with .html extension name.
 Go to IIS from
 start=> programs=>Administrative tools=>IIS=>expand the on
  computer name & then right click on website=>new=>specify the
  description of website =>next=>next=>browse the .html file
  path=> then click on finish.
 Then right click on website you created
  =>properties=>documents=>click on add=>give the html file
  name=>ok=>click on move up=>apply=>ok
  On the client side to access the website go to internet explorer
  type http://IP Address or DNS name
DHCP
 DHCP ( Dynamic Host Configuration protocol). DHCP is a
  protocol used to assign the IP address automatically.
 In a large corporate where the no of computers are more, it
  is difficult to assign the IP addresses automatically. That’s
  why we are using DHCP server to assign the IP addresses
  automatically
 DHCP releases & renews the IP addresses as devices
  leave & rejoin the network.
How A DHCP client get IP address
      from DHCP server
NETWORK ARICHITECHTURE
                                            DHCP
                     DHCP                   CLIENT5
                     CLIENT5
DHCP
SERVER



                                                DHCP
                               SWITCH           CLIENT4




            DHCP
            CLIEN1                           DHCP
                                  DHCP       CLIENT3
                                  CLIENT2
Advantage Of DHCP
DHCP reduce the effort of administrator.
Reduce the time of providing IP address.
Reduce the conflict in networking
There is no need to assign IP addresses    to each
computer manually.
Disadvantage Of DHCP
 When a client location is change or another computer is
  connect in the place of that computer. In that case the IP
  address is changed.
Install DHCP server service on
       Windows Server 2003
 Insert the Windows server 2003 CD
 Go to Start > Control Panel > Add or Remove Programs .
 When the Add or Remove Programs window
  launches, click Add/Remove Windows Components in the
  left pane.
 When the Windows Components Wizard comes up, scroll
  down and highlight Networking Services and then click
  the Details button.
 When the Networking Services window comes up, place a
  check mark next to Dynamic Host Configuration Protocol
  (DHCP)       and    click  OK     and    OK      again.
Configure DHCP on Windows
            Server 2003
 Start > Administrative Tools > DHCP
 Right-click the server node in the left pane and
  choose New Scope . This will launch the New Scope
  Wizard.
 On the New Scope Wizard, click Next
 Specify a scope name and scope description.
 Specify an IP address range and subnet mask. For
  the Start IP address enter 192.168.0.1, for the End IP
  address enter192.168.0.254 . Finally, specify
  a subnet mask of 255.255.255.0 and click Next.
 Specify IP addresses to exclude from assignment.
  click Add , and then click Next. The IP address of DHCP
  server should be in the exclude List
 Specify the lease duration for the scope. Verify
  that Days is 8 and click Next.
 Configure DHCP Options. Make sure “ Yes, I want to
  configure these settings now ” is selected and
  click Next to begin configuring DHCP options.
 Specify the router IP address and then click Next . If the
  router is available.
 Configure domain name and DNS servers.(If available)
 Configure WINS servers. On the next screen(If available)
 Finally, the wizard asks whether you want to activate the
  scope.
DNS(Domain Name System)
 Every network requires a mechanism to resolve
  computer names to Internet Protocol (IP) addresses.
 DNS is a mechanism for converting computer name to
  IP address also IP address to computer name.
 It works on two Zones. These are forward look up zone
  & reverse Look up zone.
 Forward look up zone convert computer name to IP
  address.
 Reverse look up zone convert IP address to computer
  name.
Installing DNS
 Insert the CD of Windows server 2003.
 Click Start, click Control Panel, and then click Add or
  Remove Programs.
 Click Add/Remove Windows Components.
 select the Networking Services check box, and then
  click Details.
 In Subcomponents of Networking Services, select
  the Domain Name System (DNS) check box, click OK,
  and then click Next.
Configuring DNS
 Start-Programs-Administrative Tools
 Then select DNS
 Expand the computer name.
 Right click on Forward kook up zone
 Select new zone Then click on Next-Next-Next
 Then Specify the zone Name With a .com extention
  name.
 Click on Next &Then finish.
Domain Controller
 A domain controller is a server that is running a version of
  the Windows Server operating system and has Active
  Directory Services installed.
 In     Windows       Server    2003        and      Microsoft
  Windows 2000 Server, the directory service is named
  Active Directory.
 Active Directory serve as a central location for
  administration & security.
 A Microsoft active directory, in simple terms, is like a
  telephone book that organizes within it all of the computers
  and people that have been entered into it.
 To install Active directory services Go to Start-run type
  dcpromo.
Benefits of a Domain
Organized                                                   Easy Location of
                    Paris
Objects
                                                              Information
            Sales           Repair




   User1 Computer1 User2        Printer1

                                           Delegated Authority
Features of a Domain
     Single Logon
                         Unauthorized client
                         can not log on to the
                         domain




Centralized Management           Scalability




                                                 94
Backup Domain Controller
 Backup Domain Controller (BDC) is a computer that
  has a copy of the user accounts database. Unlike the
  accounts database on the Primary Domain
  Controller (PDC), the BDC database is a read only copy.
  When changes are made to the master accounts
  database on the PDC, the PDC pushes the updates
  down to the BDCs
 Most domains will have at least one BDC, often there
  are several BDCs in a domain. These additional domain
  controllers exist to provide fault tolerance. If the PDC
  fails, then it can be replaced by a BDC.
Child Domain Controller
 For DNS and Active Directory, a domain located in the
  namespace tree directly beneath another domain (the
  parent domain). For example, example.microsoft.com
  would be a child domain of the parent domain
  microsoft.com. Also known as a sub domain.
 A child domain is a member domain of a Windows
  Active Directory directory service but is not the root
  domain of that Active Directory.
 The main purpose of child domain is load balancing.
Domain, Tree & Forest
 A domain is the core administrative unit of the
  Windows Server 2003 directory service. However, an
  enterprise may have more than one domain in its
  Active Directory.
 A tree contain multiple domains with contiguous DNS
  name space.
 A forest is the combination of multiple trees.
Domain Naming
           Forest              Mass.com




                                                                  Tree
mcse.com                                                            ccna.com
               Tree                    Tree

                               microsoft.com




       example.microsoft.com                   sp.microsoft.com

               Domain                                  Domain
                                                                         98
Remote Desktop
 Remote Desktop allows you to access your computer
  from a remote location.
 The Remote Desktop Connection client software (for
  the computer from which you want to connect) is
  installed by default on all computers running Windows
  7, Vista, or XP.
 For using remote desktop connection. The remote
  desktop connection must be enabled in the host
  computer.
Enable the Remote Desktop
feature on your host computer
1.   From the Start menu, select Control Panel (or Settings, and
     then Control Panel). Double-click System.
2.   In Windows 7 and Vista, click Remote settings. In the "Remote
     Desktop" section, select one of the two options to allow
     connections from other computers. In Windows XP, select
     the Remote tab. Select Allow users to connect remotely to
     this computer.
3.   To choose which users will have remote access, in 7 and Vista,
     click Select Users... or in XP, click Select Remote Users... .
     Typically, all administrators of the computer will have access
     by default. Each user must have a password before you can
     allow remote access.
4.   When you are finished, click OK. Your computer will now be
     able to accept incoming Remote Desktop connections.
How to Get Remote Desktop

 Start   => All Programs => Accessories =>
  Communications, => Remote Desktop Connection
 Then give the IP address of the computer that you want
  access remotely.
Internet Connection Sharing
(ICS)
 ICS offers a simple way to configure computers in a small
  home office network to share a single Internet connection.
 For small networks, ICS offers a cost-effective way to provide
  Internet access to multiple computers.
 The IP addresses of the computers on the network must also
  be in the 192.168.0.x range, and the subnet mask must always
  be 255.255.255.0. If network computers cannot use these
  addresses, ICS does not work properly.
 When you enable ICS, the ICS computer configures itself with
  the IP address 192.168.0.1 and also becomes a DHCP server
  for the network, so that it can provide IP addressing
  information to other computers.
ICS using Ccpooxy software
 Download CCProxy from the download center, run
  ccproxysetup.exe and keep clicking the "Next" button to
  finish the installation.
 Launch CCProxy on the server for Internet connection
  sharing.
 After set up proxy server with CCProxy, you can create
  accounts and specify the authentication type for your own
  proxy server in the "Account Manager" dialog box of
  CCProxy .
 There are 2 authentication types for you to select:
  Anonymous - please select "Permit All" for "Permit
  Category.
 Authentication required - please select "Permit Only"
  for "Permit Category" and then select proper "Auth
  Type" as you wish.
 CCProxy supports several authentication types such as
  "IP Address", "MAC Address", "User/Password" and
  some combined auth types as you can see in the
  "Account Manager" dialog box. For Internet connection
  sharing, we recommend "IP Address" authentication
  type.
Make proxy server settings for IE
on client
 Go to client computer and open IE properties by right
  clicking on Internet explorer.
 Select "Connections" tab, click "LAN Settings" button
  and open the "Local Area Network(LAN) Settings"
  dialog box.
 Check "Use a proxy server for your LAN", Fill
  "192.168.0.1" in "Address" and "808" in "Port"
 Click "OK" button in "Local Area Network (LAN)
  Settings" and "Internet Options" dialog boxes.
 Now you can browser Internet web sites in IE at the
  client
Basic networking in power point by suprabha

More Related Content

What's hot

Computer network
Computer networkComputer network
Computer networkNeha Gupta
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networkingkieshore
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsAnkit Garg
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communicationKajal Sharma
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking ConceptsSehajbir Singh
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application pptNitesh Dubey
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.satyamjipatel
 
Types of network
Types of networkTypes of network
Types of networkishjari
 
Networking devices
Networking devicesNetworking devices
Networking devicesfrestoadi
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt finalArushi Garg
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applicationsvarun arora
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 

What's hot (20)

Computer network
Computer networkComputer network
Computer network
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking
NetworkingNetworking
Networking
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
networking
networkingnetworking
networking
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Types of network
Types of networkTypes of network
Types of network
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Lan, man and wan ppt final
Lan, man and wan ppt finalLan, man and wan ppt final
Lan, man and wan ppt final
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 

Viewers also liked

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
Computer hardware and networking components
Computer hardware and networking componentsComputer hardware and networking components
Computer hardware and networking componentsManpreet Singh Bedi
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

Viewers also liked (6)

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Computer hardware and networking components
Computer hardware and networking componentsComputer hardware and networking components
Computer hardware and networking components
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Basic networking in power point by suprabha

Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Unit 1 ppt-idc
Unit 1 ppt-idcUnit 1 ppt-idc
Unit 1 ppt-idchiya123jes
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptOsama Yousaf
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyManas Saha
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 

Similar to Basic networking in power point by suprabha (20)

Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Networking
NetworkingNetworking
Networking
 
Unit 1 ppt-idc
Unit 1 ppt-idcUnit 1 ppt-idc
Unit 1 ppt-idc
 
What is networking
What is networkingWhat is networking
What is networking
 
W 10 introduction to network
W 10 introduction to networkW 10 introduction to network
W 10 introduction to network
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Lan
LanLan
Lan
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 

Recently uploaded

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Recently uploaded (20)

Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Basic networking in power point by suprabha

  • 1.
  • 2. What is computer networking Computer networking means sharing of data & resources between two or more computer with a communication between them. The communication medium can be through wires, radio waves, leased line, infra-red, optical fiber etc. The main purpose of networking is sharing of data & resources.
  • 3. Advantages of Networking  Sharing Information  Sharing Hardware resources  Sharing software resources  Centralizing administration  Pre-reserving Information  Protecting Information  E-mail
  • 4. Disadvantage of Networking  If fault occur in the server then all the clients are failed to access software's from server.  Network fault can cause lose of Data & resources.  System open to hackers.  User work dependent up on network.
  • 5. Advantage of Networking Networking Enables: Information Sharing Centralized Administration and Support Hardware and Software Sharing 5
  • 6. Networking Devices  NIC (Network Interface Card) :-  A card installed in a computer that unable the computer to communicate a network. All NIC implement a networking standards called Ethernet Every client & server must have a network interface card in order to be a part of network.  Cable:-  computers in a network are physically connected to each other using cables.  Hub/Switch:-  Network cables usually does not connect computer directly to each other. Instead of this, Each computer connected by a cable to a device known as hub or switch. The hub or switch connect rest of the network. Each switch contain certain no of port typically 8,16,24 etc.  Network software:-  Typically server computer use a special software in order to function efficiently & the client computer needs to have their setting configuration in order to access to the network.  Network software is used to efficiently shar information.
  • 7.  Modem:- modem is the combination of two word modulation & demodulation. Modem is a device which convert analog signal to digital signal & vice versa.  Router:- A router is a device that forwards data packets along networks. The router used to connect two or more networks & uses multiple paths to send & receive data. sometimes router is also called gateway.  Access point:- Access point act as an interface cable network & wireless device. We can also connect nodes(computer) to a access point.  Repeater:- Repeaters are used maintain the strength of the signal constant. Hub, Switchs, routers are also acts as a repeater.
  • 8. Difference Between Switch & Hub Hub Switch  It is manageable.  It is not manageable.  It works on the 1st layer of  It works on the 2nd layer of OSI reference model. OSI reference model.  Collision detection is turned  Collision detection is not on. turned on.  Operates on half Duplex  Operates on full duplex mode. mode.
  • 9. Different Modes of Communication  Unicast:-one sender one receiver  Multicast:- one sender multiple devices are the receiver but not all  Broadcast:-One sender all other devices are receiver.
  • 10. CSMA/CD Carrier Sense Multiple Access With Collision detection(CSMA/CD) is a protocol that is implemented in bus topology. It is divided into three part:-  Multiple Access:- Multiple access refers to the fact that in bus system. Each Station has access to the common cable.  Carrier Sense:- It refer to the fact that each station listen to see if no other station are transmitting before sending.  Collision Detection:- It refers to the principal of listening if other station are transmitting While we are transmitting.
  • 11. The OSI (Open Systems Interconnection) Data Model ISO standard for computer networks design and functioning. Involves at least 7 layers, each playing a specific role when applications are communicating over the network.
  • 12. OSI Layer 7. Application layer 6. Presentation 5. Session layer 4. Transport layer 3. Network layer 2. Data-link layer 1. Physical layer
  • 13. Physical layer:- It ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc. The physical layer defines the electrical, mechanical specification for maintaining, activating, deactivating physical link between end system. Data link layer:- It is in charge of data encapsulation under the form of packets. The data link layer defines how data is formatted for transmission how access to the network is control.
  • 14. Network layer:- It is in charge of packets transmission from a source A to destination B. Network layer provides connectivity &path selection between two communicating host system that might be located on two different network. Transport layer:- It is in charge of the delivery of packets from a source A to a destination B. The transport layer segments data packets from the sending host system & reassemble the data in a data stream on the receiving host system. Session layer:- It is in charge of the management of network access. The session layer establish, manages session between two communicating host system.
  • 15. Presentation layer:- It determines the format of the data transmitted to applications, data compressing decompressing, encrypting etc. The presentation layer ensures the information that the application layer of one system sends out is readable by the application layer of another system. Application layer:- It contains the applications which are used by the end user, such as Java, Word etc. It provides network services to user application. It does not provide services to any other OSI layer.
  • 16. Switch Network Interface Card hub Router Access point modem
  • 17. Repeaters and Hubs Repeater Transmits data to all connected computers Repeater Hub Transmits data to all connected computers in a star topology Hub
  • 19. Routers Router Router
  • 20. Cabling The two most popular types of network cabling are twisted-pair (also known as 10BaseT) and thin coax (also known as 10Base2) & Optical Fiber. 10BaseT cabling looks like ordinary telephone wire, except that it has 8 wires inside instead of 4. Thin coax looks like the copper coaxial cable.
  • 21. Network Cables Types of Cables Twisted-Pair Unshielded (UTP) 10BaseT Shielded (STP) Coaxial 10Base2, 10Base5 Fiber-Optics 21
  • 22. 10baseT In this type of cabling wires are twisted to each other. This help to reduce the electromagnetic induction. When 10BaseT cabling is used, a strand of cabling is inserted between each computer and a hub. If you have 5 computers, you'll need 5 cables. Each cable cannot exceed 325 feet in length. Because the cables from all of the PCs converge at a common point, a 10BaseT network forms a star configuration. RJ45 connectors are used in this type of cabling.
  • 23. Standard color-code for Twisted pair cable
  • 24. 10Base2 10BASE2 coax cables had a maximum length of 185 meters (607 ft). The maximum practical number of nodes that can be connected to a 10BASE2 segment is limited to 30. In a 10BASE2 network. The geometric design that is formed when thin coax cabling is used is called a linear or backbone configuration. The reason for this is that thin coax is always arranged in a straight line of PCs, hubs, or other devices. Thin coax networks always require termination. In a 10BASE2 network, each segment of cable is connected to the transceiver (which is usually built into the network adaptor) using a BNC T-connector, with one segment connected to each female connector of the T.
  • 25. 10 Base 2 cabling
  • 27. Optical Fiber Cable An optical fiber (or optical fibre) is a flexible, transparent fiber made of glass (silica) or plastic, slightly thicker than a human hair. Optical fiber can be used as a medium for telecommunication and computer networking because it is flexible and can be bundled as cables. It is especially advantageous for long-distance communications. The most commonly used fiber optic cable is a multi-mode fiber cable (MMF) with a 62.5 micron fiber optic core . Single-mode fiber, another kind of cabling, is more efficient than multi-mode, but far more expensive. Maximum length is up to 25 km & speed is up to 2 gb.
  • 28. optical fiber Cable & connector Optical fiber Cable
  • 29. Network Models Peer-to-Peer - A peer to peer network is one in which there is no dedicated server and every computer acts as both a client and a server. This is a good networking solution when there are 10 or less users . Client/Server – This type of network is designed to support a large Number of users and uses dedicated server(s) to accomplish this. Clients log on to the server(s) in order to run applications or obtain files.
  • 31. Types of networks Local Area Network(LAN):- A local area network (LAN) is a computer network that spans a relatively small area, such as a single office or office building, and typically offers high-speed communications. Metropolitan Area Networking(MAN):- A MAN is a computer network that usually spans with in a large campus or a city. A MAN usually interconnect no of LANs Wide Area Networking(WAN):- A wide are a network (WAN) computer network that spans a relatively large geographical area. Computers connected to a wide-area network are often connected through public networks, such as the telephone system, leased lines (ISDN), satellite, microwave, or other connection method.
  • 32. Wireless Local Area Network(WLAN):- A communications network that provides connectivity to wireless devices within a limited geographic area. "Wi-Fi" is universal standard for wireless networks and is the wireless equivalent of wired Ethernet networks. Storage Area Network(SAN) :- A SAN is a network of storage devices that can be accessed by multiple computers. Each computer on the network can access hard drives in the SAN as if they were local disks connected directly to the computer. This allows individual hard drives to be used by multiple computers, making it easy to share information between different machines. personal area network(PAN):- A personal area network(PAN) is a computer network organized around an individual person. Personal area networks typically involve a mobile computer, a cell phone . You can use these networks to transfer files including email and calendar appointments, digital photos and music. typically within 10 meters or 33 feed).
  • 34. WAN
  • 36. Topology In computer networking topology refers to the layput or design of connected devices.  Physical Topology:- It refers to the physical design of the network including the devices, location & cable installation.  Logical Topology:-It refers to the fact that how data actually transfers in a network as opposed to its design.
  • 37. Different Types of Topologies  Bus Topology  Star Topology  Ring Topology  Mesh Topology  Tree Topology  Hybrid Topology
  • 38. Bus Topology  All the nodes (file server, workstations, and peripherals) on a bus topology are connected by one single cable.  A bus topology consists of a main run of cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable.  Popular on LANs because they are inexpensive and easy to install.
  • 40. Bus Topology Advantages of Bus Topology  It is Cheap, easy to handle and implement.  Require less cable  It is best suited for small networks. Disadvantages of Bus Topology  The cable length is limited. This limits the number of stations that can be connected.  This network topology can perform well only for a limited number of nodes.
  • 41. Ring Topology  In a ring network, every device has exactly two neighbours for communication purposes.  All messages travel through a ring in the same direction.  A failure in any cable or device breaks the loop and can take down the entire network.  To implement a ring network we use the Token Ring technology.  A token, or small data packet, is continuously passed around the network. When a device needs to transmit, it reserves the token for the next trip around, then attaches its data packet to it.
  • 43. Ring Topology Advantage of Ring Topology  Cable faults are easily located, making troubleshooting easier.  Ring networks are moderately easy to install  Easier to Mange than a Bus Network Disadvantages of Ring Topology  The failure of a single node of the network can cause the entire network to fail.  A single break in the cable can disrupt the entire network.
  • 44. Star Topology  In a star network, each node (file server, workstations, and peripherals) is connected to a central device called a hub.  The hub takes a signal that comes from any node and passes it along to all the other nodes in the network.  Data on a star network passes through the hub, switch, or concentrator before continuing to its destination.  The hub, switch, or concentrator manages and controls all functions of the network.  The star topology reduces the chance of network failure by connecting all of the systems to a central node.
  • 46. Star Topology Advantages of Star Topology  Easy to manage  Easy to locate problems (cable/workstations)  Easier to expand than a bus or ring topology.  Easy to install and wire.  Easy to detect faults and to remove parts. Disadvantages of Star Topology  Requires more cable length than a linear topology.  If the hub or concentrator fails, nodes attached are disabled.  More expensive
  • 47. Tree Topology  A tree topology (hierarchical topology) can be viewed as a collection of star networks arranged in a hierarchy.  Tree Topology is also called the combination of bus topology & star Topology  This is particularly helpful for colleges, universities and schools so that each of the connect to the big network in some way.
  • 49. Tree Topology Advantages of a Tree Topology  Point-to-point wiring for individual segments.  All the computers have access to the larger and their immediate networks. Disadvantages of a Tree Topology  Overall length of each segment is limited by the type of cabling used.  If the backbone line breaks, the entire segment goes down.  More difficult to configure and wire than other topologies
  • 50. Mesh Topology  In this topology, each node is connected to every other node in the network.  Implementing the mesh topology is expensive and difficult.  In this type of network, each node may send message to destination through multiple paths.  While the data is travelling on the Mesh Network it is automatically configured to reach the destination by taking the shortest route which means the least number of hops.
  • 52. Mesh Topology Advantage of Mesh Topology  No traffic problem as there are dedicated links.  It has multiple links, so if one route is blocked then other routes can be used for data communication.  Points to point links make fault identification easy. Disadvantage of Mesh Topology  There is mesh of wiring which can be difficult to manage.  Installation is complex as each node is connected to every node.  Cabling cost is high.
  • 53. Hybrid Topology  A combination of any two or more network topologies.  A hybrid topology always accrues when two different basic network topologies are connected.  It is a mixture of above mentioned topologies. Usually, a central computer is attached with sub- controllers which in turn participate in a variety of topologies
  • 55. Hybrid Topology Advantages of a Hybrid Topology  It is extremely flexible.  It is very reliable. Disadvantages of a Hybrid Topology  Expensive
  • 56. IP Address Internet Protocol Address (or IP Address) is an unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. Any device connected to the IP network must have an unique IP address within its network. IP address is a 32 bit number that is used to uniquely identify a computer on a network.
  • 57. Subnet Mask An IP address has two components, the network address and the host address. A subnet mask separates the IP address into the network and host addresses (<network><host>). A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into network address and host address. Subnet Mask is made by setting network bits to all "1"s and setting host bits to all "0"s. Within a given network, two host addresses are reserved for special purpose. The "0" address is assigned a network address and "255" is assigned to a broadcast address, and they cannot be assigned to a host.
  • 58. Default Gateway Computer can communicate directly with the other computer on the same network. The only way to communicate with a computer on the different network is through a router(internetworking). The default gateway represents the IP address of the router that is used to communicate outside of its network.
  • 60.
  • 61. IP Address ranges Class-A(1-126):- Example:- 11.0.0.1 (IP address) 255.0.0.0 (Subnet mask) Binary value of subnet mask 11111111.00000000.00000000.00000000 Total no of host=2^n=2^24=16777216 Total no of valid host=2^n-2=16777214 n=Total no of Host bit 1 represents for network bits & 0 represents for Host bits
  • 62. IP Address ranges Class-B(128-191):- Example:- 129.0.0.12(IP address) 255.255.0.0 (Subnet mask) Binary value of subnet mask 11111111.11111111.00000000.00000000 Total no of host=2^n=2^16=65536 Total no of valid host=2^n-2=65534 n=Total no of Host bit 1 represents for network bits & 0 represents for host bits
  • 63. IP Address ranges Class-C(192-223):- Example:- 192.0.0.1(IP address) 255.255.255.0 (Subnet mask) Binary value of subnet mask 11111111.11111111.11111111.00000000 Total no of host=2^n=2^8=256 Total no of valid host=2^n-2=254 n=Total no of Host bit 1 represents for network bits & 0 represents for host bits
  • 64. private IP addresses  The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private local networks:-  10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255
  • 65. Public IP address  An IP address is considered public if the IP number is valid and falls outside any of the IP address ranges reserved for private uses by Internet standards groups.  All the computer connected to the internet must have unique IP address other than the private IP address.  The IP address which is used in publicly for example internet & we have to pay money for that to the service provider.
  • 66. Other reserved IP address  127.0.0.0-127.255.255.255 is reserved for diagnostic & testing purpose.  IP addresses in the range of 169.254.0.0 - 169.254.255.255 are reserved for Automatic Private IP Addressing.
  • 67. Setting the IP address  Click Start > Control Panel.  On the control panel, double-click Network Connections.  Right-click Local Area Connection.  Click Properties.  Select Internet Protocol (TCP/IP), and then click Properties.  Select Use the Following IP Address.  Specify the IP address, Subnet mask, and Default gateway (If available)  Click OK on the Local Area Connection Properties window.
  • 68. Intranet & Extranet & Internet  If the Network is spans with in a office building then it is called intranet.  If two different networks are connected through the internet it is called extranet.  Interconnection of many Computer networks is called Internet. It is a international Computer network.
  • 69. Intranet & Extranet Intranet Internet Internet Extranet Extranet
  • 70. Uniform Resource Locator (URL)  It is used to locate the resource in the network.  URL (http://example.microsoft.com/tutorial/default.h tml)  Protocol used (http://)  DNS address (example.microsoft.com)  Path on the server (/tutorial/default.html
  • 71. Networking Protocols Protocol:- A set of rules or guidelines that are used in networking is called protocol. Some of the networking protocols are:-  TCP/IP:- It is combination of two protocols one is TCP another is IP. TCP is the connection oriented reliable protocol. It is responsible for breaking the messages into segments & reassembling them at the destination station, resending any thing that is not received. The internet protocol handles the address part of the packets so that it gets to the right destination.
  • 72.  ICMP( Internet Control Message protocol):- It is a networking protocol that is used by the operating system of network computer to send error message. Example:- Destination host unreachable  Pop3(post Office Protocol) , IAMP( Internet Control Message Protocol) & SMTP(Simple Mail transfer Protocol):- These protocols are used for email retrieval virtually in the network.  Telnet( terminal Emulation):- It is a protocol used for remotely accessing the computer of the another network.
  • 73.  ARP - provides IP-address to MAC address resolution for IP packets. A MAC address is your computer's unique hardware number and appears in the form 00- A0-F1-27-64-E1 (for example).  FTP - File transfer protocol is used for transferring files between remote systems. Must resolve host name to IP address to establish communication  HTTP - The Hypertext Transfer Protocol is the set of rules for exchanging files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web. It is the protocol controlling the transfer and addressing of HTTP requests and responses.
  • 74. Internet protocol suite  The Internet protocol suite is the set of communications protocols used for the Internetand similar networks, and generally the most popular protocol stack for wide area networks. It is commonly known as TCP/IP, because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol(IP), which were the first networking protocols defined in this standard.  TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. It has four abstraction layers, each with its own protocols.
  • 75. The layers are: 1. The link layer (commonly Ethernet) contains communication technologies for alocal network. 2. The internet layer (IP) connects local networks, thus establishing internetworking. 3. The transport layer (TCP) handles host-to-host communication. 4. The application layer (for example HTTP)
  • 76. Firewall Firewall is any hardware or software that is designated to prevent the unwanted networking traffic. Firewall can block the information entering to & getting out from the network.
  • 77. Firewall Authorized LAN User LAN Internet Firewall LAN Unauthorized User
  • 78. NetMeeting NetMeeting provides people around the world with a new way of communicating. Users can work together on virtually any Windows-based application, exchange or mark up graphics on an electronic whiteboard, transfer files, or use the text-based chat program. To install Net meeting goes to star then run type conf & then ok
  • 79. IIS( Internet Information Service) IIS is web server software that provides integrated, reliable, secure, and scalable software for creating and managing internal corporate websites and external websites on the internet. IIS is not installed by default.
  • 80. Creating IIS server  Create a folder on a drive.  Under this folder create a text file & write down something.  Then rename the file with .html extension name.  Go to IIS from  start=> programs=>Administrative tools=>IIS=>expand the on computer name & then right click on website=>new=>specify the description of website =>next=>next=>browse the .html file path=> then click on finish.  Then right click on website you created =>properties=>documents=>click on add=>give the html file name=>ok=>click on move up=>apply=>ok On the client side to access the website go to internet explorer type http://IP Address or DNS name
  • 81. DHCP  DHCP ( Dynamic Host Configuration protocol). DHCP is a protocol used to assign the IP address automatically.  In a large corporate where the no of computers are more, it is difficult to assign the IP addresses automatically. That’s why we are using DHCP server to assign the IP addresses automatically  DHCP releases & renews the IP addresses as devices leave & rejoin the network.
  • 82. How A DHCP client get IP address from DHCP server
  • 83. NETWORK ARICHITECHTURE DHCP DHCP CLIENT5 CLIENT5 DHCP SERVER DHCP SWITCH CLIENT4 DHCP CLIEN1 DHCP DHCP CLIENT3 CLIENT2
  • 84. Advantage Of DHCP DHCP reduce the effort of administrator. Reduce the time of providing IP address. Reduce the conflict in networking There is no need to assign IP addresses to each computer manually.
  • 85. Disadvantage Of DHCP  When a client location is change or another computer is connect in the place of that computer. In that case the IP address is changed.
  • 86. Install DHCP server service on Windows Server 2003  Insert the Windows server 2003 CD  Go to Start > Control Panel > Add or Remove Programs .  When the Add or Remove Programs window launches, click Add/Remove Windows Components in the left pane.  When the Windows Components Wizard comes up, scroll down and highlight Networking Services and then click the Details button.  When the Networking Services window comes up, place a check mark next to Dynamic Host Configuration Protocol (DHCP) and click OK and OK again.
  • 87. Configure DHCP on Windows Server 2003  Start > Administrative Tools > DHCP  Right-click the server node in the left pane and choose New Scope . This will launch the New Scope Wizard.  On the New Scope Wizard, click Next  Specify a scope name and scope description.  Specify an IP address range and subnet mask. For the Start IP address enter 192.168.0.1, for the End IP address enter192.168.0.254 . Finally, specify a subnet mask of 255.255.255.0 and click Next.
  • 88.  Specify IP addresses to exclude from assignment. click Add , and then click Next. The IP address of DHCP server should be in the exclude List  Specify the lease duration for the scope. Verify that Days is 8 and click Next.  Configure DHCP Options. Make sure “ Yes, I want to configure these settings now ” is selected and click Next to begin configuring DHCP options.  Specify the router IP address and then click Next . If the router is available.  Configure domain name and DNS servers.(If available)  Configure WINS servers. On the next screen(If available)  Finally, the wizard asks whether you want to activate the scope.
  • 89. DNS(Domain Name System)  Every network requires a mechanism to resolve computer names to Internet Protocol (IP) addresses.  DNS is a mechanism for converting computer name to IP address also IP address to computer name.  It works on two Zones. These are forward look up zone & reverse Look up zone.  Forward look up zone convert computer name to IP address.  Reverse look up zone convert IP address to computer name.
  • 90. Installing DNS  Insert the CD of Windows server 2003.  Click Start, click Control Panel, and then click Add or Remove Programs.  Click Add/Remove Windows Components.  select the Networking Services check box, and then click Details.  In Subcomponents of Networking Services, select the Domain Name System (DNS) check box, click OK, and then click Next.
  • 91. Configuring DNS  Start-Programs-Administrative Tools  Then select DNS  Expand the computer name.  Right click on Forward kook up zone  Select new zone Then click on Next-Next-Next  Then Specify the zone Name With a .com extention name.  Click on Next &Then finish.
  • 92. Domain Controller  A domain controller is a server that is running a version of the Windows Server operating system and has Active Directory Services installed.  In Windows Server 2003 and Microsoft Windows 2000 Server, the directory service is named Active Directory.  Active Directory serve as a central location for administration & security.  A Microsoft active directory, in simple terms, is like a telephone book that organizes within it all of the computers and people that have been entered into it.  To install Active directory services Go to Start-run type dcpromo.
  • 93. Benefits of a Domain Organized Easy Location of Paris Objects Information Sales Repair User1 Computer1 User2 Printer1 Delegated Authority
  • 94. Features of a Domain Single Logon Unauthorized client can not log on to the domain Centralized Management Scalability 94
  • 95. Backup Domain Controller  Backup Domain Controller (BDC) is a computer that has a copy of the user accounts database. Unlike the accounts database on the Primary Domain Controller (PDC), the BDC database is a read only copy. When changes are made to the master accounts database on the PDC, the PDC pushes the updates down to the BDCs  Most domains will have at least one BDC, often there are several BDCs in a domain. These additional domain controllers exist to provide fault tolerance. If the PDC fails, then it can be replaced by a BDC.
  • 96. Child Domain Controller  For DNS and Active Directory, a domain located in the namespace tree directly beneath another domain (the parent domain). For example, example.microsoft.com would be a child domain of the parent domain microsoft.com. Also known as a sub domain.  A child domain is a member domain of a Windows Active Directory directory service but is not the root domain of that Active Directory.  The main purpose of child domain is load balancing.
  • 97. Domain, Tree & Forest  A domain is the core administrative unit of the Windows Server 2003 directory service. However, an enterprise may have more than one domain in its Active Directory.  A tree contain multiple domains with contiguous DNS name space.  A forest is the combination of multiple trees.
  • 98. Domain Naming Forest Mass.com Tree mcse.com ccna.com Tree Tree microsoft.com example.microsoft.com sp.microsoft.com Domain Domain 98
  • 99. Remote Desktop  Remote Desktop allows you to access your computer from a remote location.  The Remote Desktop Connection client software (for the computer from which you want to connect) is installed by default on all computers running Windows 7, Vista, or XP.  For using remote desktop connection. The remote desktop connection must be enabled in the host computer.
  • 100. Enable the Remote Desktop feature on your host computer 1. From the Start menu, select Control Panel (or Settings, and then Control Panel). Double-click System. 2. In Windows 7 and Vista, click Remote settings. In the "Remote Desktop" section, select one of the two options to allow connections from other computers. In Windows XP, select the Remote tab. Select Allow users to connect remotely to this computer. 3. To choose which users will have remote access, in 7 and Vista, click Select Users... or in XP, click Select Remote Users... . Typically, all administrators of the computer will have access by default. Each user must have a password before you can allow remote access. 4. When you are finished, click OK. Your computer will now be able to accept incoming Remote Desktop connections.
  • 101. How to Get Remote Desktop  Start => All Programs => Accessories => Communications, => Remote Desktop Connection  Then give the IP address of the computer that you want access remotely.
  • 102. Internet Connection Sharing (ICS)  ICS offers a simple way to configure computers in a small home office network to share a single Internet connection.  For small networks, ICS offers a cost-effective way to provide Internet access to multiple computers.  The IP addresses of the computers on the network must also be in the 192.168.0.x range, and the subnet mask must always be 255.255.255.0. If network computers cannot use these addresses, ICS does not work properly.  When you enable ICS, the ICS computer configures itself with the IP address 192.168.0.1 and also becomes a DHCP server for the network, so that it can provide IP addressing information to other computers.
  • 103.
  • 104. ICS using Ccpooxy software  Download CCProxy from the download center, run ccproxysetup.exe and keep clicking the "Next" button to finish the installation.  Launch CCProxy on the server for Internet connection sharing.  After set up proxy server with CCProxy, you can create accounts and specify the authentication type for your own proxy server in the "Account Manager" dialog box of CCProxy .  There are 2 authentication types for you to select: Anonymous - please select "Permit All" for "Permit Category.
  • 105.  Authentication required - please select "Permit Only" for "Permit Category" and then select proper "Auth Type" as you wish.  CCProxy supports several authentication types such as "IP Address", "MAC Address", "User/Password" and some combined auth types as you can see in the "Account Manager" dialog box. For Internet connection sharing, we recommend "IP Address" authentication type.
  • 106. Make proxy server settings for IE on client  Go to client computer and open IE properties by right clicking on Internet explorer.  Select "Connections" tab, click "LAN Settings" button and open the "Local Area Network(LAN) Settings" dialog box.  Check "Use a proxy server for your LAN", Fill "192.168.0.1" in "Address" and "808" in "Port"  Click "OK" button in "Local Area Network (LAN) Settings" and "Internet Options" dialog boxes.  Now you can browser Internet web sites in IE at the client