the Application Software is a software that APPLIES to the real life application. For example: Microsoft Word is used to create documents similar to you create manually on paper. Accounting Softwares those are used for accounting which is simallarly done manually on Account Book.
Thus, Application Software are easier to be understood by normal users because they directly deals with the normal real life applications.
But the System Softwares are the softwares which deals with the system or hardware. For example: Disk Management Tools which are used to partition or format the disk.
System Softwares are recommended to be used only by Advanced users who are having advance knowledge of the computer system.
2 or more network components(routers, computers, printers and anything else that can be connected to eachother.) and network cables. (Kan be wireless aswell.)
The various components are:
computer systems
transmission media
network interfaces
protocols
Logical or physical network topologies:
1) A Star network is defined as a network where all computers connect to a central computer or server. It looks like this:
2) A bus network is defined as a network where all computers share a central backbone to connect all computers together. It looks like this:
3) A mesh network is defined as a network where all computers are connected to each other. It looks like this:
Remember that while the figure depicting a mesh network is very commonly used, it is not accurate. Computers are rarely connected directly to each other. They usually go through an intermediate network device. Correctly depicted, the devices connecting to each other should be network devices such as switches or routers. Indeed, some form of mesh or partial mesh between network devices is very common in enterprise networks.
4) A ring network is defined as a network where one computer connects to another to form a ring. It looks like this:
Features of 802.x standards and FDDI (Fiber Distributed Data Interface) networking technologies
1) 802.2 LLC [Logical Link Control (IEEE 802.2, ISO, OSI)]
Speed: speed depends on the network
Access method: Used with CSMA/CD and token passing.
Topology: Used in Ethernet and Token-Ring networks.
Media: Used with ethernet and token-ring, defines putting the signal on the media.
2)802.3 Ethernet
Speed: Speed ranges from 10 MBPS to 10 GBPS.
Access method: CSMA/CD
Topology: Commonly used in bus and star configurations.
Media: Either copper or fiber optic based media.
3) 802.5 Token Ring
Speed: 4 MBPS to 1 GBPS
Access method: Token passing
Topology: Star (even though it says Ring, its physical topology is a star)
Media: IBM "Type-1" Shielded Twisted Pair (copper)
4)802.11x wireless
Speed: 1 MBPS to 108 MBPS
Access method: CSMA/CA
Topology: Wireless - uses wireless access-points to connect users.
Media: Wireless - radio frequencies
5) FDDI
Speed: 100 to 200 MBPS
Access method: Token passing
Topology: Token Ring
Media: Fiber or copper (called CDDI if copper is used, and not FDDI)
Cable Standards Characteristics
1) 10BASE-T
Speed: 10 MBPS
Length: 100 meters
Topology: Ethernet
Cable type: CAT 3 or better
2) 10BASE-FL
Speed: 10 MBPS
Length: 2000 meters
Topology: Ethernet
Cable type: Fiber optic
3) 100BASE-TX
Speed: 100 MBPS (200 mbps - full duplex)
Length: Network segments limited to 100 meters
Topology: Ethernet
Cable type: cat 5 cable
4) 100BASE-FX
Speed: 100 MBPS
Length: 400 meters half duplex or 2000 meters for full duplex
Topology: Ethernet
Cable type: Fiber optic
5)1000BASE-T
Speed: 1 GBPS
Length: each network segment is limited to 100 meters.
Topology: Ethernet
Cable type: Cat 5e ("category 5 enhanced") or cat 6 cable.
6) 1000BASE-CX
Speed: 1 GBPS
Length: 25 meters per network segment
Topology: Ethernet
Cable type: Copper based - STP (shielded twisted pair)
7) 1000BASE-SX
Speed: 1 GBPS
Length: 550 meters.
Topology: Ethernet
Cable type: Multi-mode fiber optics with 0.85 micrometer core.
8) 1000BASE-LX
Speed: 1 GBPS
Length: 5000 meters.
Topology: Ethernet
Cable type: Single mode fiber optic cable.
9) 10 GBASE-SR
Speed: 10 GBPS
Length: 300 meters
Topology: Ethernet
Cable type: Multi-mode fiber optics.
10) 10 GBASE-LR
Speed: 10 GBPS
Length: 2000 meters
Topology: Ethernet
Cable type: Single-mode fiber optics. Used over dark fiber connected to SONET equipment.
11) 10 GBASE-ER
Speed: 10 GBPS
length: 40,000 meters
Topology: Ethernet
Cable type: Uses either single or multi-mode fiber. Used over dark fiber connected to SONET equipment.
Network Devices
Hubs
Purpose: A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. Not so common now.
Switches
Purpose: Similar to a hub, in that it provides a central connection between two or more computers on a network, but with some intelligence. They provide traffic control for packets Rather than forwarding data to all the connected ports, a switch forwards data only to the port on which the destination system is connected. It maintains a MAC address table for this purpose.
Bridges
Purpose: A Bridge is a networking device which connects multiple LANs and forwards or filters data packets between them based on their destination address. A bridge prevents unnecessary data from crossing connected networks
Routers
Purpose: Routers are network devices that literally route data around the network. By examining data as it arrives, the router can determine the destination address for the data; then, by using tables of defined routes, the router determines the best way for the data to continue its journey. It connects networks together and routes information between them so that unnecessary data is not sent to the other networks by using the IP address. The function of a Router is to determine the next point a data packet needs to be forwarded to on to its destination.
Gateways
Purpose: A gateway is a networking device which translates between two dissimilar protocols. A gateway links and translates between local area networks with different protocols. This makes it possible to receive different formatted data and translate to a format which your computer can understand
CSU/DSU (Channel Service Unit / Data Service Unit)
Purpose: A hardware device used to interface between a serial port and a digital circuit. Allows for the connection of networks far apart from each other. The function of a CSU/DSU is to act as a translator between the LAN data format and the WAN data format
NICs (Network Interface Card)
Purpose: is a device which plugs into a computer and adapts the network interface to the appropriate standard. The NIC card is used to connect your computer to the network
ISDN (Integrated Services Digital Network) adapter
Purpose: A device which allows your computer to transmit over ISDN lines
WAPs (Wireless Access Point)
Purpose: is a transceiver or radio component in a wireless LAN that acts as the transfer point between wired and wireless signal and vice versa
Features: Connects your wired and your wireless devices together
Functions: The function of a WAP is to connect your wireless devices to your wired network setup
Modem
Purpose: is a device which enables a computer to transmit data over analogue telephone lines. Connects your computer to the internet using a modem (dial up account)
Firewalls
Purpose: a networking device, either hardware or software based, that controls access to your organization's network. It allows for control of administration on your network. The function of a Firewall is to prevent outside sources from connecting to your networks
Protocols and Standards
Each and every Ethernet device interface to the network media (e.g., network adapter, port on a hub) has a unique MAC address, which is "burned" into the hardware when it is manufactured. MAC addresses uniquely identify each node in a network at the Media Access Control layer, the lowest network layer, the one that directly interfaces with the media, such as the actual wires in a twisted-pair Ethernet. In modern Ethernets the MAC address consists of six bytes which are usually displayed in hexadecimal; e.g., 00-0A-CC-32-FO-FD
MAC addresses have two parts:
1) the first half of the numbers (ie. 00-0A-CC) are the manufacture's code. You can use this code to find out who built the network interface card (NIC).
2) The second half of the numbers (ie. 32-FO-FD) are the card's individual serial number.
The OSI (Open Systems Interconnect) model
There are seven layers of the OSI model. When a network devices wants to sent data over the network it begins at layer 7 and moves to layer 1 (encoding). From there it is sent to the receiving computer and the computer decodes that message by beginning at layer 1 and moving to layer 7. An easy way of remembering the layers is to keep this saying in mind "Please do not throw small people around."
Layer 7
Application
Description: Applications and application interfaces for OSI networks. Provides access to lower layers and functions.
Layer 6
Presentation
Description: Negotiates syntactic representations and performs data transformations , e.g. compression and code conversion.
Layer 5
session
Description: Coordinates connection and interaction between applications, established dialog, manages and synchronizes data flow direction.
Layer 4
transport
Description: Ensures end-to-end data transfer and integrity across the network. Assembles packets for routing by layer 3.
Layer 3
network
Description: Routes and relays data units across a network of nodes. Manages flow control and call establishment procedures.
Layer 2
data link
Description: Transfers data units from one network unit to another over transmission circuit. Ensures data integrity between nodes.
Layer 1
Physical
Description: Delimits and encodes the bits onto the physical medium. Defines electrical, mechanical, and procedural formats.
Layer 1 - Hubs, NICs and WAPs
Layer 2 - Switches and bridges
Layer 3 - Routers
The purpose of subnetting is to form smaller networks from one larger network. By doing this we end up getting a faster network because of reduced overhead (broadcast traffic).
Static - A static IP address is a 32 bit number that is assigned to a computer or network device by a network administrator or Internet service provider (ISP) to be its permanent address on the network.
Dynamic - An IP address that is assigned to a host (computer) when they connect to the network by a DHCP server. When the host disconnects, that IP address is once again free to give to another host. A dynamic IP address is not necessarily different every time a host connects.
Self-assigned (APIPA (Automatic Private Internet Protocol Addressing)). A feature of Microsoft Windows, APIPA is a DHCP failover mechanism. With APIPA, DHCP clients can obtain IP addresses when DHCP servers are non-functional. APIPA exists in all popular versions of Windows except Windows NT. When a DHCP server fails, APIPA allocates addresses in the private range 169.254.0.1 to 169.254.255.254. Clients verify their address is unique on the LAN using ARP. When the DHCP server is again able to service requests, clients update their addresses automatically. In APIPA, all devices use the default network mask 255.255.0.0 and all reside on the same subnet.
VPN (Virtual Private Network) - A virtual private network (VPN) is a private communications network often used by companies or organizations, to communicate confidentially over a public network. VPN traffic can be carried over a public networking infrastructure (e.g. the Internet) on top of standard protocols, or over a service provider's private network with a defined Service Level Agreement (SLA) between the VPN customer and the VPN service provider. A VPN can send data (e.g., voice, data or video, or a combination of these media) across secured and encrypted private channels between two points.
Firewalls
In today's network environments, firewalls are being used to protect systems from external as well as internal threats. Although firewalls initially became popular in corporate environments, many home networks with a broadband Internet connection now also implement a firewall to protect against Internet borne threats.
Essentially, a firewall is an application, device, system, or group of systems that controls the flow of traffic between two networks. The most common use of a firewall is to protect a private network from a public network such as the Internet. However, firewalls are also increasingly being used as a means to separate a sensitive area of a private network from less-sensitive areas.
At its most basic, a firewall is a device (it could be a computer system or a dedicated hardware device) that has more than one network interface and manages the flow of network traffic between those interfaces. How it manages the flow and what it does with certain types of traffic depends on its configuration.
A basic firewall implementation
Strictly speaking, a firewall performs no action on the packets it receives besides the basic functions just described. However, in a real-world implementation, a firewall is likely to offer other functionality, such as Network Address Translation (NAT) and proxy server services. Without NAT, any host on the internal network that needs to send or receive data through the firewall needs a registered IP address. Although there are such environments, most people have to settle for using a private address range on the internal network and therefore rely on the firewall system to translate the outgoing request into an acceptable public network address.
Although the fundamental purpose of a firewall is to protect one network from another, you need to configure the firewall to allow some traffic through. If you don't need to allow traffic to pass through a firewall, you can dispense with it entirely and completely separate your network from others.
LANs and WANs:
A local area network (LAN) is a computer network that spans a relatively small area, such as a single office or office building, and typically offers high-speed communications. Most LANs are confined to a single building or group of closely located buildings. However, one LAN can be connected to other LANs over any distance via telephone lines, coaxial cable, satellite, etc. creating a WAN (see below). Most LANS of today utilize Ethernet and/or Wi-Fi connections.
A wide area network (WAN) is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system, leased lines (ISDN), satellite, microwave, or other connection methods. The connected LANS can be in another building, or as far away as in Another Country. The largest WAN in existence is the Internet.
Wireless Networking:
As the name implies, wireless networks allow computers to comunicate without the use of cables. The wi-fi standards are covered by IEEE 802.11x. The two most commonly used are IEEE 802.11b operating at 11Mbps and IEEE 802.11g operating at 54Mbps. 802.11 defines two pieces of equipment, a wireless station, which is usually a PC or a Laptop with a wireless network interface card (NIC), and a Wireless Access Point (WAP), which acts as a bridge between the wireless stations and Distribution System (DS) or wired networks. An 802.11 wireless network adapter can operate in two modes, Ad-Hoc and Infrastructure. In infrastructure mode, all your traffic passes through a wireless 'access point'. In Ad-hoc mode your computers talk directly to each other in a peer-to-peer mode and do not need an access point at all. To set up an Ad Hoc wireless network, all those who want to access it need to agree on a SSID and have an IP address in the same subnet.
Bluetooth (IEEE 802.15.1), was originally developed by Ericsson in 1994 and later formalized by the Bluetooth Special Interest Group (SIG). It is named after King Harald Blatan (Bluetooth) of Denmark. It is a specification for wireless personal area networks that facilitate the exchange of data between electronic devices, such as mobile phones, PDAs, laptops, personal computers, printers and digital cameras. Due to hopping spread spectrum technique that changes its signal 1600 times per second, interference from other devices doesn't stop the transmission, although its speed may be slowed down.
There are three Bluetooth power classes - class 1 (not very common; allows transmission distance of up to 100 meters); class 2 (the most common; allows transmission distance of 10 meters) and class 3 (very rare; allows transmission distance of about 10 cm with a maximum of 1 meter).
Bluetooth technology is available in three versions, including 1.1 (allowing transmission data speeds of up to 1 Mbps in the); 1.2 (allows devices to be discovered more reliably, have better audio quality and better reliability under interference conditions) and 2.0 (allowing transmission data speeds of up to 3 Mbps with lower power consumption).
Infrared technology uses light beams to transmit data and uses a line-of-sight connection. Line-of-sight means that the devices communicating with each other must have an unobstructed "view" of each other. They can be used for transmitting data between PDAs or cell phones. This technology previously connected at a speed of about 115 Kbps while advanced technologies for connecting 2 networks together between buildings can run as high as 10 Gbps and extend several miles. Windows XP supports VFIR (Very Fast Infrared) which can transmit at up to 16Mbps and has become common.
Standard
Frequency
Description
Maximum Length
Speed
802.11b - WiFi
2.4 Ghz
Wireless networking commonly used in homes and SOHO environments. Being replaced by the faster 802.11g standard. Uses a wireless access point (WAP) to connect to other wireless computers.
150+ feet
11 mbps
802.11g - WiFi
2.4 Ghz
Wireless networking commonly used in homes and SOHO environments. Uses a wireless access point (WAP) to connect to other wireless computers. Backward compatible with 802.11b
150+ feet
54 mbps
Infrared - IrDA
Uses light, not radio frequencies
Uses line of sight connections making it useful for sharing data between personal devices.
4Mbps, (VFIR = 16Mbps)
Bluetooth
2.4 Ghz
See above
Up to 30 feet
721 kbps
Cabling:
The most common form of LAN uses Ethernet which is a collection of standards and specifications that define wiring and signalling for the network. There are a wide variety of standards and cable types. The most common cable types are discussed below:
A plenum area is the air return for an air conditioning system. In most buildings, the plenum area above a drop ceiling is used as the source of air for the air conditioning systems. Wire and cable are usually installed in this area, and if that wire burns during a fire, it will emit toxic fumes. The fumes could carry to the rest of the building through the air conditioner, and, as a result, the fumes could harm others. Plenum grade cabling is required in these types of installations because it is resistant to fire and does not emit poisonous gasses when burned. PVC cable (the standard variety), while cheaper, will emit poisonous gases in extreme heat or fire. Plenum grade cabling is quite a bit more expensive.
The various cable types vary in their capacity to transmit data. The definition of the word "bandwidth" can get complicated, but for the purposes of the A+ exam, this term will mean the transmission speed on a network. This next table lists the transmission speeds/bandwidth of the various cable types.
Transmission Medium
Transmission Speed
cat 3 twisted pair
10 mbps
cat 5 twisted pair
100 mbps
cat 5e twisted pair
1 gbps
cat 6 twisted pair
10 gbps
Fiber Optic
100 mbps - 1 gbps
Connectors:
Just like there are a variety of cable types, there are a variety of connectors used with these cables. Let's take a look at the most common ones - please note that the images are not to scale.
Ethernet LAN Types:
The following table lists the most common Ethernet types in use today.
Name
Cable Type
Connector
Maximum Length
Speed
10Base-T
Category 3 or better UTP cable
RJ-45
100 meters(328 ft)
10 mbps
10Base-FL
Fiber optic cable
ST, SC, LC, MT-RJ
2000 meters
10 mbps
100Base-TX
Cat 5 twisted pair
RJ-45
100 meters(328 ft)
100 mbps
100Base-FX
Fiber Optic
ST, SC, LC, MT-RJ
2000 meters
100 mbps
1000Base-T
CAT5e or higher
RJ-45
100 meters(328 ft)
1 gbps
Note that there are emerging fibre optic technologies such as laser over fibre that have faster speeds and longer distances, but are outside the scope of this course at present.
Remote Access:
For the purposes of the A+ exam, you will need to be familiar with the following methods of connecting to the internet:
Speed
Description
Dial-up connection (POTS)
Up to 56 Kbps
Twisted pair with RJ-11 connector.
Rapidly being replaced by broadband technologies such as DSL and cable.
Integrated Services Digital Network (ISDN)
128 kbps
Twister pair with RJ-11 connector.
Business access
Digital Subscriber Line (DSL)
256 Kbps to 8 Mbps
Twisted-pair with RJ-45 connector.
Home, small business, and enterprise access using existing phone lines.
Cable modem
512 Kbps to 52 Mbps
Coaxial cable with F connector.
Home, business, school access
Satellite
400 kbps
Satellite Dish
Rural and remote areas
Cellular Broadband
Up to 2.4 mbps
Cell phone
Access on the go.
Additional Notes:
Protocols
The function of a network is to share resources between computers. In order for this to happen the computers must be able to "talk" to each other which is accomplished with the use of protocols which are essentially a set of "rules" that govern communication over a network. Computers must be configured with a common protocol in order to be able to communicate. Below are some of the most common protocols:
TCP/IP Protocol Suite:
The TCP/IP protocol suite is made of many other protocols that perform different functions. Below is a list of some of them:
TCP/IP Ports:
Ports are what an application uses when communicating between a client and server computer. Some common ports are:
TCP/IP Addressing:
Every IP address can be broken down into 2 parts, the Network ID (netid) and the Host ID (hostid). All hosts on the same network must have the same netid. Each of these hosts must have a hostid that is unique in relation to the netid. IP addresses are divided into 4 octets with each having a maximum value of 255. We view IP addresses in decimal notation such as 124.35.62.181, but it is actually utilized as binary data.
IP addresses are divided into 3 classes as shown below:
Class
Range
A
1-126
B
128-191
C
192-223
NOTE: 127.x.x.x is reserved for loopback testing on the local system and is not used on live systems. The following address ranges are reserved for private networks (ie not used on the Internet):
10.0.0.0 - 10.254.254.254
172.16.0.0 - 172.31.254.254
192.168.0.0 - 192.168.254.254
IPv6:
The previous information on TCP/IP has referred to IPv4, however, this addressing scheme is running out of available IP addresses due to the large influx of internet users and expanding networks. As a result, a new addressing scheme to deal with this situation is IPv6. This new addressing scheme utilizes a 128 bit address (instead of 32) and utilizes a hex numbering method in order to avoid long addresses such as
132.64.34.26.64.156.143.57.1.3.7.44.122.111.201.5.
The hex address format will appear in the form of 3FFE:B00:800:2::C for example.
VOIP (Voice Over Internet Protocol)
Also known as Internet Telephony, VOIP is the technology that allows voice traffic to be transmitted and routed over a data network using the Internet Protocol. The advantage of VOIP is that it is low cost (in some cases free) in comparison to using traditional POTS (Plain Old Telephone Systems) for voice communications. Companies such as Vonage and Comcast Cable are currently offering VOIP phone services and Skype is a freeware program that provides free long distance communications with other Skype users.
Network Devices:
A network is composed of computers, servers, printers, and other devices. The computer, printer, etc. (also known as a client) will have a network interface card (NIC) that one end of the cable plugs into. The NIC can be built into the motherboard or can be an expansion card. In either case, it will need to have the correct driver loaded like any other expansion card.
On most Ethernet networks, there are hubs or switches that serve as the central location that all of the clients plug in to. On larger networks, there is usually a wiring closet with at least one switch. Often, the network devices plug into a wall jack that is wired to the switches in the wiring closet.
On even larger networks, routers are often needed to divide the network into different segments. Routers are also used as a gateway to the outside world (i.e. connection to ISP).
Dial-up Connection:
This type of connection is being used less frequently all the time with the emergence of faster and better broadband options. However, you may still need to know how to deal with this type of network connection. Dial-up and ISDN connections use a modem which converts digital signals from your computer to analogue for transmission over phone lines. On the receiving end is another modem which converts the signal back to digital. From a physical standpoint, setting up this type of connection is as simple as connecting a phone cord from your computer to the wall jack.
The easiest way to configure this type of connection is to right click on My Network Places and select Properties. Next, click on Create a New Connection which will launch the New Connection Wizard. This wizard can be used to set up a wide variety of connection types including the ones below that are described manually. Once we complete the wizard, a new icon appears in our Network Connections window.
The dial-up icon was not there previous to completing the wizard. Now we can go in and configure our dial-up connection. To do this, right click on the dial-up connection icon and select Properties. From here you can configure the modem itself, the connection options, protocols, security, internet connection sharing and other settings.
Local Area Network Connection:
Once your client is physically plugged into the network, you then need to set things up on the software side. In newer versions of Windows, this has become pretty simple. First, we are going to set up a connection on a LAN. To get started, right click on the "My Network Places" icon on the desktop and select "Properties". This will bring up the network connections dialog box shown below.
As you can see in the image, this window lists your current network connections and their status. Here we have a LAN connection that does not have a cable plugged in, a wireless connection that is currently connected, and a 1394 net adapter which is for a firewire network connection.
On the left side, you should see "Create a new connection". When you click this, Windows launches the Network Connection Wizard which allows you to configure your cable or DSL connection, dial-up or VPN to a corporate network, and peer-to-peer connections such as serial or infrared.
After you have completed the wizard, your new connection should appear in the Network Connections dialogue box. Now the network needs to be configured. To do this, right click on your new connection and click "properties".
From here, you can configure your network card (NIC) by clicking on the configure button, although in most cases nothing needs to be done here. This will take you to the same place as viewing the NICs properties in Device Manager.
Next we may need to configure our protocol(s). In this case, our network is using TCP/IP, however if you need to use a protocol that isn't there, click on the "Install" button. This will bring up a list of protocols that can be installed. If you still don't see the one you need, then you probably need a disk that contains the installation files for that protocol. This should be very rare. In any event, first highlight the "Internet Control Protocol (TCP/IP)" and click the "properties" button and you will see the screen below.
If our network has a DHCP server, then we probably don't need to configure anything at all and should leave the "Obtain an IP address automatically" radio button selected. Checking the other radio buttons will allow you to manually enter IP address, subnet mask, default gateway, and DNS Servers. Once this is done, you should have a connection to your network.
Shared Connection With ICS:
In the above example, we connected to an existing LAN. What if we want to connect a single computer to a DSL or cable connection? This is as simple as connecting the NIC on the computer to the DSL router or cable modem and following the configuration instructions from the broadband vendor. But, what if we need to connect a few computers to a broadband connection? One option is to get a router and run NAT - the other is to let Windows solve the problem. Windows 2000 and XP include a service called Internet Connection Sharing (ICS). This allows one computer to be connected to the internet, and the others to share the connection. One caveat of this configuration is that the host computer must have 2 network cards installed unless you are using dial-up - one to connect to the cable modem or DSL router and the other to connect to the LAN.
To get started, you must have 2 connections in your Network Connections. First, right click on the cable modem or DSL connection and select properties. This will bring up the Local Area Connection Properties window.
Next, you need to click on the advanced tab. Here you simply check the box that says, "Allow other network users to connect through this computer's internet connection".
Next, we need to configure the clients. This is as easy as going to our TCP/IP properties window shown earlier and making sure that the connection is set to use DHCP. In other words make sure that the "Obtain an IP address automatically" radio button is selected and all other fields are clear.
Wireless Connection:
Wireless connections are somewhat plug and play and it is fairly easy to set up a basic connection. The first step is to connect the wireless access point (WAP) to a computer using the ethernet cable that came with the WAP. Almost all WAPs have an internal web page that can be viewed by entering the default IP address that it is programmed with. This is usually something like 192.168.1.1 and the default username is usually something like "admin" and "password" respectively. Check the documentation that comes with the WAP for this information. Once logged into the web page, you can configure a wide variety of settings for the access point including IP settings, SSID, wireless channel, WEP and WPA security, and more. The first thing you should do is change the SSID to a unique identifier for your network and change the default username and password. You may need to change the IP settings depending on your situation. Next, it is a good idea to set up security. WPA2 is the best available, although some access points only support WPA. After all of the settings are configured, connect the WAP to the network as appropriate.
Now, we need to configure our Wi-Fi client to connect to the access point. Windows includes a wizard that simplifies this process, but we are going to look at the manual method. To get started, first right click on My Network Places and select properties. This will bring up the Network Connections window that we saw in previously discussed connections. There should be a wireless connection icon that will appear after you install the wireless network adapter on the computer. Right click on this icon and select properties. This will bring up the Wireless Network Connection Properties window that is very similar to the Local Area Connection Properties window we saw earlier, and you can configure your TCP/IP properties for your wireless connection in the same manner described earlier.
The major difference between this window and the Local Area Connection Properties window is that this one has a Wireless Networks tab that when clicked brings up this window. This allows you to view available wireless networks and connect to them.
The next step is to select your preferred wireless network. Your network will show up using the SSID that you configured on the WAP earlier. Once selected, click the properties button where you can configure your security settings depending on what selections you made when configuring the WAP. After all of these steps, you should be able to connect to your wireless network. You can check your connection's "health" by going to My Network Places and double-clicking on the wireless network connection icon.
This shows your signal strength, connection speed, and other information that is useful for troubleshooting when there is a problem. If you want to see which networks are available to connect to, simply click on the View Wireless Networks button.
Command line network utilities
The OSI Model:
OSI Model (Open Systems Interconnection Model) was developed by the International Standards Organization (ISO). The OSI reference model is a 7 layer networking framework that divides the networking process into logical layers which are often used as a framework for troubleshooting. The 7 layers are: Physical, Data Link (which has sub-layers called Media Access Control and Logical Link Control), Network, Transport, Session, Presentation, and Application. You won't need to know in-depth information about this for the exam, but you should be familiar with it.
A local area network consists of devices connected by some type of media, such as copper wire. The connections between clients or devices may be through network connectivity devices, such as hubs, switches, routers, bridges, and gateways. Some connectivity devices are software, most are hardware based, and some are both.
1.Network Devices such as Printers,File servers etc. 2.Network Communication Devices hubs,routers,switches. 3.Network Interface Cards 4.Cables 5.Network Operating System
list of component of LAN
The components of NIC are : buffer pulse transformers lan dc/dc converters lan filters
Lan-uv but lan-oo in northern dialects.
how unblock my lan
Chih Lan has written: 'Lan chien chi'
The size of a LAN is set by the type of LAN configuration and specifications
LAN is live active network such as ps3 lan
LAN can be connected by routers . A router can be used to connect to LAN's .a LAN to a WAN and LAN to Internet.
Chinese: 我是兰兰 [wǒ shì lán lan] English: I am Lan-lan. Note: Lan-lan (兰兰 for instance) could be a Chinese first name, especially for a girl. In another case, Lan is a person's name or nickname, double used as a kind of endearment.
Advantages of bus LAN Advantages of bus LAN
A wired LAN uses wires to connect the computers but a wireless LAN uses radio waves.
A server-based LAN is a Local Area Network (LAN) which is being controlled by a Server.