0% found this document useful (0 votes)
29 views35 pages

Configure Peripheral Services

Uploaded by

assenmasud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views35 pages

Configure Peripheral Services

Uploaded by

assenmasud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

CONFIGURE

PERIPHERAL
SERVICES
Install required software to
Configure/manage local area network
Network Peripherals
◦A network peripheral refers to equipment which typically
enables computers to communicate each others.

◦A local peripherals is a peripheral that can be connected


to the stand alone computer.

◦Examples of Network peripherals include: - routers,


Switches, Access points, Network interface cards and
other hardware devices.
Hub
◦A network hub is a node that broadcasts data to every
computer or Ethernet-based device connected to it.

◦A hub is less sophisticated than a switch, the latter of


which can isolate data transmissions to specific devices.

◦Network hubs are best suited for small, simple


local area network environments.
Switch
◦The Switch is a network device that is used to segment the
networks into different subnetworks called subnets or LAN
segments.

◦It is responsible for filtering and forwarding the packets


between LAN segments based on MAC address.

◦Switches have many ports, and when data arrives at any


port, the destination address is examined first and some
checks are also done and then it is processed to the devices.
Repeater

◦A repeater amplifies the signal it receives on one port


before it transmits it on other ports.

◦Because the repeater does not check on the contents of


the data it receives or retransmits, frames that are
corrupted by noise and other factors can also be repeated.

◦The development of the hub replaced the repeater for all


practical purposes, because it performs the same
functions, and can include additional features.
Routers

◦A router is a special computer which has the ability


to perform such tasks as routing and forwarding
information with use of software and hardware.

◦A router is used to provide connectivity across wide


area network (WAN) links and route information
between two LAN segments.
Gateways

◦The term getaway is applied to any device, system,


or software application that can perform the function
of translating data from one format to another.
Modems

◦Modems perform a simple function: They translate digital


signals from a computer into analog signals that can travel
across conventional phone lines .

◦A modem, which stands for "modulator-demodulator," is a


device connecting your home to your internet service
provider (ISP) through a physical connection.

◦The modem translates the data from your ISP into a format
that your home network devices can use
Network Interface Cards (NICs)

◦NICs are the mechanisms by which computers


connect to a network.

◦NICs come in all shapes and sizes, and they come in


prices to suit all budgets.

◦Known as network card, network adapter, and LAN


adapter, etc.
Firewall

◦A hardware or software system that is used to


separate one computer or network from another one.

◦The most common type is used to protect a computer


or an entire network from unauthorized access from
the Internet.
Configuring security and access to
make use of peripherals.
Basics of Peer to peer Network
◦In a peer-to-peer network k, computers on the network are
equal, with each workstation providing access to resources
and data.

◦This is a simple type of network where computers are able to


communicate with one another and share what is on or
attached to their computer with other users.
Configuring peripherals to access
and use security
User Privileges

◦Windows 10 allows providing security to files and


folders; this feature is available because of the NTFS
(New Technology File System).

◦There are different levels of security, such as read,


modify, full control etc.
Cont.…
Full control permissions include:
◦Read

◦Write

◦execute

◦delete

◦change permissions
Cont.…
Sharing Network resources
◦Sharing allows an object to be accessed from network. By
default in windows 10, there are some hidden shares, these
shares end with a $ symbol.

◦To view these default shares open computer management


(right click on my computer and choose manage) and select
shared folders and then shares.

◦Most devices support access control lists. Example: printers,


sharing data using folders, and manage devices, etc
IP Networking Basics

◦IP address is A Unique string of characters that identifies each


computer using the Internet Protocol to communicate over a network.

◦IP addresses are classified into two main types based on version: IPv4
(Internet Protocol version 4) and IPv6 (Internet Protocol version 6).

◦These types differ in their format and the number of bits used to
represent addresses.
IPv4 (Internet Protocol version 4)
◦Format: IPv4 addresses are 32-bit numerical labels, typically
represented in dotted-decimal format (e.g., 192.168.0.1).

◦Address Space: Provides approximately 4.3 billion unique


addresses.

◦Notation: Consists of four octets separated by periods (e.g.,


192.168.0.1).

◦Common Usage: Still widely used in most networks today.

◦Example: 192.168.1.1
IPv6 (Internet Protocol version 6)
◦Format: IPv6 addresses are 128-bit hexadecimal
numbers, separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).

◦Address Space: Offers an immensely larger address


space than IPv4, allowing for virtually unlimited
unique addresses.

◦Notation: Consists of eight groups of four


IP address class

◦IP address classes are a way to categorize IP addresses based


on their initial bits, and they were a part of the original design
of the Internet Protocol (IPv4).

◦IP addresses are divided into five different classes, designated


as Class A, Class B, Class C, Class D, and Class E. Each class
has a specific range of IP addresses that can be assigned to
networks.
IP address class…..

Class A:
◦Range: 1.0.0.0 to 126.0.0.0
◦Network ID: The first octet represents the network
ID, and the remaining three octets are used for host
addresses.
◦Example: 10.0.0.1
IP address class…..

Class B:
◦Range: 128.0.0.0 to 191.255.0.0
◦Network ID: The first two octets represent the
network ID, and the remaining two octets are used
for host addresses.
◦Example: 172.16.0.1
IP address class…..

Class C:
◦Range: 192.0.0.0 to 223.255.255.0
◦Network ID: The first three octets represent the
network ID, and the last octet is used for host
addresses.
◦Example: 192.168.0.1
IP address class…..

Class D:
◦Range: 224.0.0.0 to 239.255.255.255
◦Purpose: Class D addresses are reserved for
multicast groups, which are used for one-to-many
communication.
IP address class…..

Class E:
◦Range: 240.0.0.0 to 255.255.255.254
◦Purpose: Class E addresses are reserved for
experimental or future use and are not used in
general networking.
Hosts
Class Network Portion Allowed
A from 1.0 to 127.0 approx. 16
million
B from 128.0 to 65,536
191.255
C from 192.0 to 255
223.255.255

Table 5.1: IP Address Classes


Subnet Masks

◦A subnet mask tells a router how much of an address


it should treat as the network portion. The masks for
traditional Class A, B and C networks.
Class Subnet Mask
A 255.0.0.0

B 255.255.0.0

C 255.255.255.0

Table 5.2: Standard IP Subnets


Thank You

You might also like