0% found this document useful (0 votes)
14 views121 pages

10 Jun 2020034833 PM

Uploaded by

dipanjali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views121 pages

10 Jun 2020034833 PM

Uploaded by

dipanjali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 121

આઈ.સી.ટી.એસ.એમ.

લે શ ન લાન

િનયામક
રોજગાર અને તાલીમ
ડૉ. વરાજ મહેતા ભવન
ગાંધીનગર
CVs‡FD Sh_j\ d5ƨTh ………………………. F: TRG :05
_jƨN BY _pbW
˼° P: ICTSM Ʌk.9.ȵk5 Wh\-
dp\pƨN^ W5Z^-4 dj_pZdȵ 5k ac½- 2017(NSQF)

_pbW Yh`ap_ dj_pZdWs bjEaahWs


_pbWȵk5 Wh\
W5Z^ d\] ajD W5Z^ ajD W5Z^

Introduction to computer networks, advantages of


1 networking. Peer-to-peer and Client Server network 2Hrs
Types of Network topologies- star, ring, bus, tree, mesh,
2 2Hrs
hybrid.
3 TypesofNetwork–LAN–WANͲMAN 1 Hrs 79
Internet,Ethernet,wiͲfi,Bluetooth,Mobile,Networking,
4 WireandWirelessNetworking. 2Hrs

5 DifferencebetweenInternetandInternet. 1Hrs
CommunicationMedia&connectors–unshielded
6 twisted–pair(UPT),shieldedtwistedpair(STP) 2Hrs

7 Fiberopticsandcoaxialcable:RJͲ45–RJ–11BNC. 2Hrs 80 & 81


UnderstandingcolorcodesofCATSCable568Aand568B
8 convention. 2 Hrs
Introduction to data communication – Analog and Digital
9 2Hrs
signals
82
Simplex – Half Duplex and Fun Duplex transmission
10 2Hrs
mode.
OSI Model - The function of different layers in OSI
11 2Hrs 83
model
12 Network components – modems, Firewall, Hubs, Bridge 2Hrs
84
13 Gateways, Repeaters, Router 2Hrs
Transceivers, switches, Access point their types function
14 advantages and applications. 2Hrs
85
15 IP Routing in Network RIP IGRP. 2Hrs
16 Protocols, TCP (IP), FTP ,Telnet, 2Hrs
Theory on setting IP address. (IP4/IP6) & Subnet mask,
17 classes of IP addressing. 2Hrs
Overview of Virtual LA, VLAN Memberships, 86
18 Identifying VLAN, Trunking - VLAN Trunk Protocol 2Hrs
(VTP).
19 Concept of Translator gateways 2Hrs
Simples mail Transfer Protocol (SMTP) Telnet, File
Transfer Protocol (FTP) , Hyper Text Transfer Protocol
20 (HTTP), Simple Network Management Protocol (SNMP) 2 Hrs 87
LDAP (Lightweights Directory Access Protocol)

1
_pbW Yh`ap_ dj_pZdWs bjEaahWs
_pbWȵk5 Wh\
W5Z^ d\] ajD W5Z^ ajD W5Z^
21 Network security 2Hrs
87
22 Concept of dynamic Host control protocol. 2Hrs
Concept of internet architecture of Internet, DNS Server,
23 Internet Access Techniques, ISPs and examples 2Hrs
(Broadband/ Dialup/ WiFi).
Concept of social networking cites, video calling 88
24 2Hrs
&confrens ing
Concept of virus and its protections using antivirus, UTM
25 and firewall. 2Hrs

26 Collaborating using wired and wireless networks . 2Hrs


Protecting a network, Network performance study and 89
27 enhancement. 2Hrs
Surveillance using network devices, collaboration on
28 network for team optimization and support activities. 2 Hrs
90
29 Remote management of devices. 2Hrs
Modern Network security threats and the basics of
30 securing a network. 2Hrs
Secure Administrative access and LAN security
31 considerations. 2Hrs
91
Network security devices, Cryptography
32 2Hrs
Wifi security considerations.
33 2 Hrs
Server concepts, Server, Hardware, Installation steps
34 configuration of server. 2Hrs

Concept Of Active Directory,ADS overview ADS Data 92


35 base, Active Directory Name pace, Logical & Physical 2Hrs
Elements of AD.
Concept of DNS name resolution – host names net BIOS
36 name DNS overview 2Hrs
93 & 94
37 DHCP overview, DHCP clients and leases 2Hrs
Remote Access Overview,VPN Concepts,Remote Access
38 Authentication 2Hrs
Protocol. 95
39 RRAS Policies 2Hrs
40 IAS & TCP/IP Routing 2 Hrs
Concept of user and group, Planning Security group
41 2Hrs
strategy
AGDLP Process & Planning user Authentication
42 2Hrs
Strategy. 96
Planning OU Structure & Planning a group Policy
43 2Hrs
Strategy
44 Deploying software Through GPO. 2Hrs

2
_pbW Yh`ap_ dj_pZdWs bjEaahWs
_pbWȵk5 Wh\
W5Z^ d\] ajD W5Z^ ajD W5Z^

45 Introduction to Web server 2Hrs


46 Introduction to Messaging services 2Hrs 97
47 Concept of Backup and Recovery of server 2Hrs
48 Security Baseline and Templates & Audit Policy 2 Hrs
49 Understanding IP Sec 2Hrs
98
50 Protocol Security 2Hrs
51 Planning Security for wireless Network 2Hrs
52 Managing Network Traffic 2Hrs
53 Types of Problems of Internet Connectivity 2 Hrs 99
54 Types and working of server Service. 2 Hrs
Linux server installation and configuration,
55 Configuration plan , Configuration plan 2Hrs

56 Public and data directory, Host file 2Hrs


100
57 SWAT 2Hrs

58 Password Authentication &Telnet 2Hrs




 

3
 

4
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 79 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 1 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Introductiontocomputernetworkingandadvantagesofnetworking.
y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutIntroductiontocomputernetworkingand


y..y _pbWWh e°ȱB
advantagesofnetworking.
y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :

z..z 7‡[̆p^Rh : Datacommunicationsandnetworkingarechangingthewaywedobusinessandthe


waywelive.
x Introductiontocomputernetworking
x Advantagesofnetworking.






















5
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Computer Explain: Acomputernetworkisasysteminwhichmultiple networking
networking computers are connected to each other to share
 Computer informationandresources. 
 networking
 ¾ Filescanbestoredonacentralcomputer(the 
file server) allowing data to be shared
 
 throughoutanorganization. 
  ¾ Filescanbebackedupmoreeasilywhenthey
 
areallonacentralfileserverratherthanwhen
Advantagesof Explain: they are scattered across a number of
2) independentworkstations. Advantages
networking
Advantagesof
 ¾ Networksalsoallowsecuritytobeestablished,
networking
ensuringthatthenetworkusersmayonlyhave
accesstocertainfilesandapplications.

¾ Software and resources can be centrally


managed.

¾ Network versions of software often allow for


theirspeedyinstallationonworkstationsfrom
thefileserver.

¾ Expensive devices such as laser printers or


scannerscanbeshared.

¾ Users can access their files from any


workstation

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

x Acomputernetworkordatanetwork isa telecommunicationsnetwork whichallowscomputersto


exchangedata.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:Introductiontocomputernetworking
x Explain:Advantagesofnetworking.

6. eap XJŽWs XhO : Yh`ap_ d\]: 05 i\iWN

*Typesofnetworktopologies:Ring,star,mesh,bus,tree,andhybrid.


6
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 79 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 2 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Typesofnetworktopologies:Ring,star,mesh,bus,tree,hybrid.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutTypesofnetworktopologies:Ring,star,mesh,bus,


y..y _pbWWh e°ȱB
tree,hybrid.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout

x Introductiontocomputernetworking
x Advantagesofnetworking.
z..z 7‡[̆p^Rh : whenwedoshoping,therearemultiplecompaniesoftheproducts.Eachhaveits advantages,but
wechoosethatonebestofforus.Similarly,computernetworkhasadifferentnetworkwithitsown
benefits.wehavetochoosebatteroneforus.SotodaywergoingtostudyaboutNetworktopology.

x Typesofnetworktopologies:Ring,star,mesh,bus,tree,hybrid.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Bustopology Explain: Inbusnetwork topology, Bustopology


  Bustopology everyworkstationisconnectedtoa 
   maincablecalledthebus. 
    
2) Startopology Explain: Inthestarnetworktopology,thereis Startopology
  startopology acentralcomputerorserverto 
   whichalltheworkstationsare 
   directlyconnected. 

7
  
3) Ringtopology Explain: Intheringnetworktopology,the Ringtopology
  ringtopology workstationsareconnectedina 
   closedloopconfiguration. 

    

4) Meshtopology Explain: Inthemeshtopology,each Meshtopology

  meshtopology workstationisconnecteddirectlyto 

   eachoftheothers. 

    

5) Treetopology Explain: Thetreenetworktopologyusestwo Treetopology

  treetopology ormorestarnetworksconnected 

   together. 

   

   

6) Hybridtopology Explain: Hybrid networks use a combination Hybridtopology

hybridtopology of any two or more topologies, in


such a way that the resulting
network does not exhibit oneof the
standardtopologies

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

x In communication networks, a topology is a usually schematic description of the arrangement of a network,
including its nodes and connecting lines. There are two ways of defining network geometry: the physical
topologyandthelogical(orsignal)topology.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:Bustopology
x Explain:Startopology
x Explain:Ringtopology
x Explain:Treetopology
x Explain:Meshtopology
x Explain:Hybridtopology

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*Typesofnetworks:LAN,MAN,WAN.

8
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 79 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 3 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Typesofnetworks:LAN,MAN,WAN.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutTypesofnetworks:LAN,MAN,WAN.


y..y _pbWWh e°ȱB

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout

x Typesofnetworktopologies:Ring,star,mesh,bus,tree,hybrid.

z..z 7‡[̆p^Rh : 

x Typesofnetworks:LAN,MAN,WAN.

9
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) LAN Explain:LAN A localareanetwork,or LAN, ALANisvery


   consistsofacomputernetworkata usefulfor
   singlesite,typicallyanindividual sharing
   officebuilding.ALANisveryuseful resources
   forsharingresources,suchasdata 
   storageandprinters. 
    
    
2) MAN Explain:MAN Ametropolitanareanetwork, networkacross
   orMAN,consistsofacomputer anentirecity
   networkacrossanentirecity,college 
   campusorsmallregion. 
    
    
3) WAN Explain:WAN Awideareanetwork,orWAN, AWANcan
occupiesaverylargearea,suchasan containmultiple
entirecountryortheentireworld. smaller
networks

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

x LANscanbebuiltwithrelativelyinexpensivehardware,suchashubs,networkadaptersandEthernet
cables.
x AMANislargerthanaLAN,whichistypicallylimitedtoasinglebuildingorsite.
x AWANcancontainmultiplesmallernetworks,suchasLANsorMANs.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:LAN
x Explain:MAN
x Explain:WAN

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN


*FamiliarizationwithvariousnetworkFacilities.

10
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 79 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 4 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ :FamiliarizationwithvariousnetworkFacilities:Ethernet,Internet,WiͲFi,Bluetooth,mobile,wired


andwirelessnetworks.
y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutEthernet,Internet,WiͲFi,Bluetooth,mobile,wired


y..y _pbWWh e°ȱB
andwirelessnetworks.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout

x Typesofnetworks:LAN,MAN,WAN.
z..z 7‡[̆p^Rh : 
x Ethernet,Internet,WiͲFi,Bluetooth,mobile,wiredandwirelessnetworks.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Ethernet Explain:Ethernet Asystemforconnectinganumberof Ethernet
   computersystemstoformalocal systemsare
   areanetwork,withprotocolsto 10BASEͲTͲ
   controlthepassingofinformation transmission
   andtoavoidsimultaneous speedsupto10
   transmissionbytwoormore Mbps
   systems.

   
2) Internet Explain:Internet Aglobalcomputernetworkproviding usesthe
   avarietyofinformationand standard

11
   communicationfacilities,consisting Internet
   ofinterconnectednetworksusing Protocol
   standardizedcommunication (TCP/IP).
   protocols. 
   
3) WiͲFi Explain:WiͲFi Afacilityallowingcomputers,smart supportupto30

   phones,orotherdevicestoconnect usersarangeof

   totheInternetorcommunicatewith 100–150feet

   oneanotherwirelesslywithina indoorsand300

   particulararea. feetoutdoors.

    

4) Bluetooth Explain:Bluetooth AstandardfortheshortͲrange


Bluetooth
   wirelessinterconnectionofmobile
   phones,computers,andother 

   electronicdevices. 

    

5) Mobile Explain:Mobile Adecorativestructurethatis Mobile

   suspendedsoastoturnfreelyinthe 

   air. 

    

6) Wiredandwireless Explain:Wiredand Awirednetworkconnectsdevicesto Wiredand

networks. wirelessnetworks. theInternetorothernetworkusing wireless

 cables. networks.

Awirelessnetworkisanytypeof
computernetworkthat
useswirelessdataconnectionsfor
connectingnetworknodes.

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

¾ The most commonwired networksuse cables connected to Ethernet ports on thenetworkrouter on one
endandtoacomputerorotherdeviceonthecable'soppositeend.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:Ethernet,Internet,WiͲFi,andBluetooth,mobile,wiredandwirelessnetworks.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN


*Difference:InternetandIntranet

12
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 79 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 5 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Difference:InternetandIntranet

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutDifference:InternetandIntranet


y..y _pbWWh e°ȱB

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout

x Ethernet,Internet,WiͲFi,Bluetooth,mobile,wiredandwirelessnetworks.

z..z 7‡[̆p^Rh : 

x Difference:InternetandIntranet

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Difference:Internet Explain: Internet 
andIntranet Difference:Internet 1.Internetiswidenetworkof
 andIntranet computersandisopenforall.

 2.Internetitselfcontainsalarge
 numberofintranets.
 3.Thenumberofuserswhouse
 internetisUnlimited.
 4.TheVisitorstrafficisunlimited.
 5.Internetcontainsdifferentsource

ofinformationandisavailableforall.




13
 Intranet Intranet
1.Intranetisalsoanetworkof

computersdesignedforaspecific
 groupofusers.
2.Intranetcanbeaccessedfrom
Internetbutwithrestrictions.
3.Thenumberofusersislimited.
4.Thetrafficallowedisalsolimited.
5.Intranetcontainsonlyspecific
groupinformation.














|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


¾ InternetisawideN/Wopenforallunlimitedusersunlimitedtrafficcontaindifferentsources&available
forall
¾ Interamet:designedforspecificaccessinternetwithrestrictions,limitedusertrafficcontainandspecific
information.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:Difference:InternetandIntranet

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*Communicationmediaandconnector:UTP&STP.

14
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 80 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 6 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Communicationmedia:UTP&STP.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutCommunicationmediaandconnector:UTP&STP.


y..y _pbWWh e°ȱB

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout


x Difference:InternetandIntranet

z..z 7‡[̆p^Rh : 
x Communicationmediaandconnector:UTP&STP.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) UTP(Unshielded Explain: UTP UTP cable isalsothemostcommon Unshielded


 twistedpair)  cableusedincomputernetworking. twistedpair
   ModernEthernet,themostcommon 
   datanetworkingstandard,canuse 
   UTPcables.Twistedpaircablingis 
   oftenusedindatanetworksforshort 
   andmediumlengthconnections 
   becauseofitsrelativelylowercosts 
   comparedtoopticalfiberandcoaxial 
   cable. 
    

15
   
    
2) STP(Shielded Explain:STP STP,atypeofcoppertelephone Shieldedtwisted
twistedpair): wiringinwhicheachofthetwo pair
copperwiresthataretwisted 
togetherarecoatedwithan
insulatingcoatingthatfunctionsasa
groundforthewires.Theextra
coveringinshieldedtwistedpair
wiringprotectsthetransmissionline
fromelectromagnetic
interferenceleakingintooroutof
thecable.STPcablingoftenisused
inEthernetnetworks,especiallyfast
datarateEthernets.







|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


¾ UTPcablesarefoundinmanyEthernetnetworksandtelephonesystems.
¾ ItconsistsofcolorͲcodedcopperwires,butdoesnotincludeanyfoilorbraidingasinsulatortoprotect
againstinterference
¾ STPislesssusceptibletonoiseascomparedtoUTPandthereforereducesthecrosstalkandinterference

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:UTP&STP

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN



*Fiberopticandcoaxialcable,RJͲ45connectorandcolorcodefor568A&568Bcable.


16
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 81 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 7 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : fiberopticandcoaxialcable,RJͲ45connectorandcolorcodefor568A&568Bcable.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ :


y..y _pbWWh e°ȱB

1) ToStudyaboutfiberopticandcoaxialcable

2)TostudyaboutRJͲ45connectorandcolorcodefor568A&568Bcable.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout


x Communicationmediaandconnector:UTP&STP.
z..z 7‡[̆p^Rh : 
x Inthislessonwestudyanothertwocablesfiberopticandcoaxialcableusedinasacommunicationmedia
andaconnectorRJͲ45andcolorcodefor568A&568Bcable.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Fiberoptic Explain:Fiberoptic An opticalfibercable is Natureof


   acablecontainingoneor light(straight
   moreopticalfibersthatareusedto line)
carrylight.
  
   Theopticalfiberelementsare 
   typicallyindividuallycoatedwith 
   plasticlayersandcontainedina 
   protectivetubesuitableforthe 
   environmentwherethecablewillbe 
   deployed. 
   
Coaxialcable,orcoax,isatype
   
ofcablethathasaninnerconductor
   
surroundedbyatubularinsulating
   

17
2) Coaxialcable Explain:Coaxial layer,surroundedbyatubular 
  cable conductingshield.Manycoaxial 
   cablesalsohaveaninsulatingouter 
   sheathorjacket. 
   

   
3) RJͲ45connector Explain:RJͲ45 ShortforRegisteredJackͲ45,an 
eightͲwireconnectorusedcommonly
  connector RJͲ11
toconnectcomputersontoalocalͲ
   areanetwork(LAN), Exampleiswired
   especiallyEthernets. telephone
  

  
4) Colorcodefor568A Explain:Colorcode Colorcodeof568ͲAcable:
&568Bcable. for568A&568B Pin WireColor
 cable. 1 White/Green
  2 Green
 3 White/Orange
 4 Blue
 5 White/Blue
 6 Orange
 7 White/Brown
 8 Brown
 Colorcodeof568ͲBcable:
PinWireColor

1 White/Orange
2 Orange
3 White/Green
4 Blue
5 White/Blue
6 Green
7 White/Brown
8 Brown




|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


x Differenttypesofcableareusedfordifferentapplications,forexamplelongdistancetelecommunication,
orprovidingahighͲspeeddataconnectionbetweendifferentpartsofabuilding.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN


x Explain:fiberopticandcoaxialcable
x Explain:RJͲ45connector
x Explain:colorcodefor568A&568Bcable.
6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN
*UnderstandingcolourcodesofCATScables568A&568Bconvention.

18
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 81 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 08 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Understanding colour codes of CATS cables 568A &568B convention.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : : ToStudyaboutcolourconventionof568A&568B


y..y _pbWWh e°ȱB

y..z dhVWs :chalk,duster,markerpen

y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout

x Fiberopticsandcoaxialcable.

z..z 7‡[̆p^Rh : in this chapter we are going to learn about

x colourconventionof568A&568B.











19
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs Ihajȿk X \hˆeSj ƨXsN eŽƛN

1) Colorcodefor568A Explain:Colorcode Colorcodeof568ͲAcable:


&568Bcable. for568A&568B PinWireColor
cable. 1 White/Green
2 Green
3 White/Orange
4 Blue
5 White/Blue
6 Orange
7 White/Brown
8 Brown
Colorcodeof568ͲBcable:
PinWireColor
1 White/Orange
2 Orange
3 White/Green
4 Blue
5 White/Blue
6 Green
7 White/Brown
8 Brown


|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

x Provides better internet connectivity by colour code convention 568A & 568B
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

*Explain:colorcodefor568A&568Bcable.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*Introductiontodatacommunication:analoganddigitalsignal.

20
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 82 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 9 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Introductiontodatacommunication:analoganddigitalsignal.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutIntroductiontodatacommunication:analogand


y..y _pbWWh e°ȱB
digitalsignal.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouslessonwehavestudiedaboutUnderstandingcolourcodesofCATScables568A


&568Bconvention.

z..z 7‡[̆p^Rh :
Generally,thedatausabletoapersonorapplicationarenotinaformthatcanbetransmittedovera
network.Forexample,aphotographymustfirstbechangedtoaformthattransmissionmediacanaccept.
Transmissionmediaworkbyconductingenergyalongaphysicalpath.
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs Ihajȿk X \hˆeSj ƨXsN eŽƛN

1) Datacommunication Explain:Data DataCommunication istheexchange transmitteddata


  communication ofdata(intheformofOsand1s) mustbe
   betweentwodevicesviasomeform transformedto
   oftransmissionmediumsuchasa electromagnetic
   wirecable. signal.
    
   
   
   
   

21
2) Analogsignal. Explain:Analog An analog or analoguesignal isany
  signal continuoussignalforwhichthetime
   varyingfeature(variable)of
   thesignalisarepresentationof
   someothertimevaryingquantity,
   i.e.,analogoustoanothertime
   varyingsignal.
   
3) Digitalsignal Explain:Digitalsignal Adigitalsignalisa
physicalsignalthatisa
representationofasequenceof
discretevalues(aquantified
discreteͲtimesignal),forexampleof
anarbitrarybitstream,orofa
digitized(sampledandanalogͲtoͲ
digitalconverted)analogsignal.

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

Components of data communication


x Datacanbeanalogordigital.Analogdataarecontinuousandtakecontinuousvalue.Digitaldatahavediscrete
statesandtakediscretevalues.
x Signalscanbeanalogordigital.Analogsignalscanhaveaninfinitenumberofvaluesinarange;digitalsignals
canhaveonlyalimitednumberofvalues.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN


x Explain:Introductiontodatacommunication:analoganddigitalsignal.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN


*Typesoftransmissionmodes:simplex,halfduplexandfullduplex.

22
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 82 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 10 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Typesoftransmissionmodes:simplex,halfduplexandfullduplex.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutTypesoftransmissionmodes:simplex,halfduplex


y..y _pbWWh e°ȱB
andfullduplex.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout

x Introductiontodatacommunication:analoganddigitalsignal.
z..z 7‡[̆p^Rh : 

x Typesoftransmissionmodes:simplex,halfduplexandfullduplex.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs Ihajȿk X \hˆeSj ƨXsN eŽƛN

1) transmission Transmissionmodemeanstransferringof directthe


 modes:  databetweentwodevices.Itisalsocalled directionof
   communication mode. These modes flowof
   directthedirectionofflowofinformation. information
   There are three types of transmission 
   mode. 
    
    
    

23
2) simplexmode Givetheexamplefor InSimplextypeoftransmissionmode e.g.
  unidirectionalmode datacanbesentonlythroughone loudspeaker
   directioni.e.communicationis e.g.walkieͲ
   unidirectional.Wecannotsendamessage talkie
   backtothesender.Unidirectional 
   communicationisdoneinSimplex 
   Systems. 
3) Halfduplexmode Differentbetween Inhalfduplexsystemwecansenddatain e.g.mobile
  simplex&half bothdirectionsbutitisdoneoneata phone
  duplex. timethatiswhenthesenderissending
   thedatathenatthattimewecan’tsend
  thesenderourmessage.Thedataissent
  inonedirection.
  
4) Fullduplexmode Infullduplexsystemwecansenddatain
bothdirectionsasitisbidirectional.Data
canbesentinbothdirections
simultaneously.Wecansendaswellas
wereceivethedata.

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

Transmissionmodemeanstransferringofdatabetweentwodevices.Itisalsocalledcommunicationmode.These
modesdirectthedirectionofflowofinformation.Therearethreetypesoftransmissionmode.Theyare:

x SimplexMode
x HalfduplexMode
x FullduplexMode

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:Typesoftransmissionmodes:simplex,halfduplexandfullduplex.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*OSImodelandfunctionofeachlayer.

 

24
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 83 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 11 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : OSImodelandfunctionofeachlayer.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : 1). ToStudyaboutOSImodel


y..y _pbWWh e°ȱB
2).ToStudyaboutfunctionofeachlayer.
y..z dhVWs : chalk,duster,markerpen

y..{ d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehrouzA.Forouzan

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout


x Typesoftransmissionmodes:simplex,halfduplexandfullduplex.
z..z 7‡[̆p^Rh : 
x Therearenumbersofuserswhousecomputernetworkandarelocatedovertheworld.Sotoensure,
nationalandworldwidedatacommunication,systemsmustbedevelopedwhicharecompatibleto
communicationwitheachother.ISOhasdevelopedthis.ISOstandsforInternationalorganizationof
standardization.ThisiscalledamodelforopensystemInterconnection(OSI)andiscommonlyknownas
OSImodel.todaywearegoingtostudyaboutOSImodelandfunctionofitseachlayer.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) OSIlayers Whatisosi? ThesevenͲlayerOSImodelprovides 


 Whyosiused? guidelinesforthedevelopmentof 
  universallycompatiblenetworking 
  protocols. 
   
Physicallayer FunctionofPhysical Thephysicallayer,thelowestlayer responsiblefor
 layer oftheOSImodel,isconcernedwith thesource–to–
  thetransmissionandreceptionof destination
  theunstructuredrawbitstreamover deliveryofa
  aphysicalmedium.Itdealswiththe packet
  mechanicalandelectrical 
  specificationsoftheinterfaceand 
  transmissionmedium.Italsodefines 

25
Datalinklayer FunctionofDatalink theproceduresandfunctionthat responsiblefor
 layer? physicaldevices thedeliveryofa
   messagefrom
   oneprocessto
   another
Networklayer FunctionofNetwork ThedatalinklayerprovideserrorͲ responsiblefor
 layer? freetransferofdataframesfrom translation,
  onenodetoanotheroverthe compression,
  physicallayer,allowinglayersabove andencryption
  ittoassumevirtuallyerrorͲfree 
 Functionof transmissionoverthelink. 
 Transportlayer? Thenetworklayercontrolsthe 
  operationofthesubnet,deciding 
  whichphysicalpaththedatashould 
  takebasedonnetworkconditions, 
  priorityofservice,andotherfactors. 
Transportlayer FunctionofSession .Thetransportlayerensuresthat responsiblefor
 layer? messagesaredeliverederrorͲfree,in providing
  sequence,andwithnolossesor servicestothe
  duplications.Itrelievesthehigher user
Sessionlayer Functionof layerprotocolsfromanyconcern
 Presentationlayer? withthetransferofdatabetween
  themandtheirpeers.
  Thesessionlayerallowssession
Presentationlayer Functionof establishmentbetweenprocesses
 Applicationlayer? runningondifferentstations.
 Thepresentationlayerformatsthe
Applicationlayer datatobepresentedtothe
 applicationlayer.Itcanbeviewedas
thetranslatorforthenetwork.
Theapplicationlayerservesasthe
windowforusersandapplication
processestoaccessnetwork
services.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x TheOpenSystemsInterconnect(OSI)modelhassevenlayers.Thisarticledescribesandexplainsthem,
beginningwiththe'lowest'inthehierarchy(thephysical)andproceedingtothe'highest'(theapplication).
Thelayersarestackedthisway:
x Application
x Presentation
x Session
x Transport
x Network
x DataLink
x Physical
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:OSImodelandfunctionofeachlayer.
x DrawtheOSImodel
6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN
*Networkcomponents:Modem,firewall,hub

26
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 84 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 12 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Networkcomponents:Modem,firewall,hub.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutNetworkcomponents:Modem,firewall,hub.


y..y _pbWWh e°ȱB


y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout

x OSImodelandfunctionofeachlayer.

z..z 7‡[̆p^Rh :

Networkcomponents:Modem,firewall,hub.

27
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Modem Explain:Modem


Modemisacombineddevicefor Modulatorand
   modulationanddemodulation,for demodulator
example,betweenthedigitaldata 
   ofacomputerandtheanalog
signalofatelephoneline. 
  
 
   

   
Actingasabarrier
Afirewallisanetworksecurity
2) Firewall Explain:Firewall betweenatrusted
system,eitherhardwareor
networkandother
   softwarebased,thatcontrols
untrustednetworks
incomingandoutgoingnetwork
   trafficbasedonasetofrules. 

   

   

3) Hub Explain:Hub Hubsarecommonly
Acommonconnectionpoint
fordevicesinanetworkiscalled usedto

hub. connectsegmentsof
aLAN.


|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

¾ ActingasabarrierbetweenatrustednetworkandotheruntrustednetworksͲͲsuchastheInternetͲͲor
lessͲtrustednetworksͲͲsuchasaretailmerchant'snetworkoutsideofacardholderdataenvironmentͲͲa
firewallcontrolsaccesstotheresourcesofanetworkthroughapositivecontrolmodel.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:Networkcomponents:Modem,firewall,hub.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*Explainuseandfunctionof:gateway,repeater,transceiver.

28
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 84 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 13 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Explainuseandfunctionof:gateway,repeater,transceiver.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutuseandfunctionof:gateway,repeater,


y..y _pbWWh e°ȱB
transceiver.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavestudiedabout


x Networkcomponents:Modem,firewall,hub.

z..z 7‡[̆p^Rh : 
x Explainuseandfunctionof:gateway,repeater,transceiver.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Gateway Explain:gateway A gateway isa network pointthat Gateways,also


   actsasanentrancetoanother calledprotocol
   network.OntheInternet,anodeor converters
   stoppingpointcanbeeithera 
   gatewaynodeorahost(endͲpoint) 
   node.Boththecomputersof 
   Internetusersandthecomputers 
   thatservepagestousersarehost 
   nodes. 
  
Arepeateristhesimplestfacility Regeneratesthe
2) Repeater Explain:repeater usedfornetworkinterconnection, strengthofthe
   whosemajorfunctionistoreceivea signalbefore
   networksignalfromoneLAN
transmittingit
   terminalcablesegmentandto
regenerateandretransmitthesignal 

29
   asitisinitsoriginalstrengthovera 
  oneormoreothercablesegment. 
   

  
 
  atransceiver
3) Transceiver Explain:transceiver Thetermtransceiverdoesnot getsitsname
necessarilydescribeaseparate
frombeingboth
 networkdevicebutratheran
atransmitter
integratedtechnologyembeddedin
devicessuchasnetworkcards. andareceiver




|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


¾ A gateway is an essential feature of mostrouters, although other devices (such as any PC or server) can
functionasagateway.

¾ ThenumberofrepeatersthatcanbeusedintandemisgenerallylimitedbyaparticularLAN
implementation.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x Explain:Explainuseandfunctionof:gateway,repeater,andtransceiver.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*typesofSwitches,AccesspointsAnditsadvantagesand Applications.

30
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ :85 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 14 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Switches,Accesspointtheirtypes,Functions&Advantages.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutSwitches,Accesspoint:Theirtypes,Functions&


y..y _pbWWh e°ȱB
Advantages.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouschapterswelearnedaboutExplainuseandfunctionof:gateway,repeater,


transceiver.

z..z 7‡[̆p^Rh : Whatisswitch&Accesspointandwheretheyareusedisdiscussedinthischapter.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Switches WhatisSwitch? ASwitchisadevicethatprovides Bridging


  ExplaininDetail. bridgingFunctionalitywithgreater Functionality.
   efficiency. 
   Theswitchnormallyhasabufferfor 
   eachlinktowhichitisconnected. 
   Whenitreceivesapacketitstores 
   thepacketinthebufferofthe 
   receivinglinkandchecksthe 
   addresstofindtheoutgoinglink.If 
   theoutgoinglinkisfreetheswitch 
   sendstheformtothatparticular 
   link. 
    
2) ExplaininDetail: Incomputernetworking,Awireless Mediator

31
 Accesspoint Accesspoint accesspointisadevicethatallows Betweenwired
  wirelessdevicetoconnecttoa Network&
  wirednetworkusingWiͲFiorrelated Devicesor
 standard. Peripherals.

























|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

¾ SwitchprovidesbridgingFunctionality&normallyhavebufferfortheeachlink.
¾ AccesspointisadevicethatallowsconnectingtoaWiredNetwork.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

*Gathermoreinformationaboutswitchesandaccesspoint.

6. eap XJŽWs XhO : Yh`ap_ d\] :05 i\iWN

*IPRoutinginNetwork&RIP,IGRP.

32


CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06


_pbW Ɯ_hW

dj_pZdȵk aco:2017(NSQF)  dp\pƨN^W5Z^:4

˼° P:ICTSM iac]:˼°PTj]^Ž

ajDW5Z^:85 Yh`ap_d\]:120i\iWN

_pbWW5Z^:15 Ʌ.k 9.ȵ5k Wh\:

_pbWȵk5 Wh\:IPROUTINGINNETWORK:RIP,IGRP

y.ȶ la½Sq]h^Ž:

k /_pbWWhӔSpSh_j\T˜:ToStudyaboutiproutinginnetworkRip,igrp.
y..y_pbWWhe°ȱB


y..zdhVWs:chalk,duster,markerpen


y..3d5U[½dˆeƗ]:DataandcommunicationnetworkingbyBehruzAforozon.


k V
z.̆ƨShaWh/ȶ lah½ȵd 5 hW: Yh`ap_d\]:10i\iWN

z..yd\jëh/^ŽƥȻk:InpreviouschapterwelearnedaboutSwitches,Accesspointtheirtypes,Functions&
Advantages.

z..z7‡[̆p^Rh:wheninformationflowsfromoneroutertoanotherrouterwewilldeterminethepathfrom
routingprotocolslike:ripigrpetc.

33
3.iac]^ȩk8S:Yh`ap_d\]:90i\iWN

7.W5. k 
e°ȱB ̆ĕs IhajȿkX\hˆeSj ƨXsNeŽƛN

1) IProuting Whatisiprouting? IPROATINGISANumbrellatermfor Determinepath


   thesetofprotocolsthatdetermine forthedata
   thepaththatdeterminethepath acrossmultiple
   thatdatafollowsinordertotravel networks
   acrossmultiplenetworksfromits 
   sourcetoitsdestinationthrougha 
   seriesofrouters,andacross 
   multiplenetworks. 
    
   Theroutinginformationprotocolis Oldset
2) Routinginformation WhatisRIP? oneoftheolddistanceͲvector distance
 protocol(RIP)  routingprotocolwhichemploysthe vectorrouting
   hopcountasaroutingmetric.
protocol.
   

   
Communicate
   
routing
3. Interiorgateways  Interiorgetawayroutingprotocolis
information
 routingprotocol WhatisIGRP? aproprietarydistancevectorrouting
withahost
 (IGRP)  protocolusedtocommercerouting
network.
informationwithinahastnetwork.
 
ItwasinventedbyCisco.
 








|.dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\WjN

IP routing means to determine path across multiple network for data

¾ The most used distance – vector routing protocol are: rip& igrp.

}. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\]: 05 i\WjN

*DeterminethemainfunctionsofRIP&IGRP

6.eapXJŽWsXhO:. Yh`ap_d\]:0i\iWN
*Protocol:TCP,IP,FTP,telnet

34
CVs‡FDSh_j\d5ƨTh..........................F: TRG : 06

_pbW Ɯ_hW

dj_pZdȵk aco:2017(NSQF)  dp\pƨN^W5Z^:4

˼° P:ICTSM iac]:˼°PTj]^Ž

ajDW5Z^:86 Yh`ap_d\]:120i\iWN

_pbWW5Z^: 16 Ʌ.k 9.ȵ5k Wh\:

_pbWȵk5 Wh\:protocols,TCP/IP/FTP/Telnet

y.ȶ la½Sq]h^Ž:

k /_pbWWhӔSpSh_j\T˜:Tostudyaboutprotocols,TCP/IP/FTP&Telnet
y..y_pbWWhe°ȱB

y..zdhVWs:Blackboard/chalk/duster

y..3d5U[½dˆeƗ]:Datacommunication&networkingbybehrouzaforozoun

k V
z.̆ƨShaWh/ȶ lah½ȵd 5 hW: Yh`ap_d\]:10 min

z..yd\jëh/^ŽƥȻk:inpreviouschapterwehavelearnedaboutIPROUTINGINNETWORK:RIP,IGRP

z..z7‡[̆p^Rh:whatisthebasicfunctionofprotocol&whichprotocolisusedwherearethemaintopicswewill
discussinthischapter.

3.iac]^ȩk8S: Yh`ap_d\]:90min

7.W5. k 
e°ȱB ̆ĕs IhajȿkX\hˆeSj ƨXsNeŽƛN

1) Protocol Whatisprotocol? Aprotocolisasetofrulesthat Setofrules


   governdatacommunication 
    
   TCPisaconnectionoriented Connection
2) Transmission Explain:TCP protocolmeansaconnectionmust oriented
 controlprotocol  beestablishedbetweenendsof protocol
 (TCP)  transmissionbeforeeithermay 
   transmitdata. 
    
3) Internetprotocol Explain:IP IPhasthetaskofdeliveringpackets 
 (ip)  fromthesourcetodestination Delivering
   basedonIPaddressinthepacket packetsfrom
   headers. sourceto
    destination.
4) Filetransfer EXPLAININDETAIL FTPisastandardnetworkprotocol Transferfiles
 protocol(FTP) :FTP usedtotransfercomputerfilesfrom fromonehost
   onehostoveraTCPͲbasednetwork toanother
   suchasInternet. 

35
  
    
    
5) telnet(terminal Explain:tenet Itisavirtualterminalprotocolwhich Remotely
 network) allowstheusersonalocalhostto accessthe
 remotelyaccessanotherhostasif computeron
theywerelocallyattached. othernetwork



















|.dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 min
protocolisasetofrulesthatgoverndatacommunication.

Ͳ>TCPisconnectionorientedprotocol.

Ͳ>IPhastaskofdeliveringpacketsfromsourcedestinationwhileFTPtransferfilesfromonehosttoanother.

Ͳ>Telnetisusedtoaccesscomputeronothernetwork.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\]: 0 min

*GathermoreinformationabouttheTCP,IP,andFTP&TELNETanddiscussitwithtourclassmates. 

6.eapXJŽWsXhO: Yh`ap_d\]:05min

*TheoryonsettingIPaddress,IPV4,IPV6,SUBNETMASK,CLASSESofIPaddressing.

36
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵk aco:2017(NSQF)  dp\pƨN^W5Z^:4

˼° P:ICTSM iac]:˼° PTj]^Ž

ajDW5Z^:86 Yh`ap_d\]:120i\iWN

_pbWW5Z^:17Ʌ.k 9.ȵ5k Wh\:

_pbWȵ5k Wh\:TheoryonsettingIPaddress(IP4/IP6),SubnetmaskclassesofIPaddressing.

y.ȶ la½Sq]h^Ž:

k /_pbWWhӔSpSh_j\T˜:TostudyTheoryonsettingIPaddress(IP4/IP6),Subnetmask
y..y_pbWWhe°ȱB
classesofIPaddressing.

y..zdhVWs:Blackboard/chalk/duster

y..3d5U[½dˆeƗ]:Datacommunication&networkingbybehrouzaforozoun

k V
z.̆ƨShaWh/ȶ lah½ ȵd 5 hW: Yh`ap_d\]:5min

z..yd\jëh/^ŽƥȻk:Inpreviouschapter,wehavestudiedaboutthevariousprotocolslikeTCP,IP,FTPand
telnet.InthischapterwewillstudyaboutIPaddressindetail.

z..z7‡[̆p^Rh:FirstofallwewillrevisethedefinitionofIPaddressandthenwewillstudyaboutclassesofit
andsubnetmask.

3.iac]^ȩk8S: Yh`ap_d\]:90min

7.W5. k 
e°ȱB ̆ĕs IhajȿkX\hˆeSj ƨXsNeŽƛN

1) InternetProtocol WhatisIP? IPisthetransmission mechanism Connectionless


   UsedbytheTCP/IPprotocols.ITis datagram
   anunreliableandconnectionless protocol.
   datagramprotocol. 
    
2) IP4/IP6 Explainaboutthe PacketsinIPlayerarecalled Thefirstfieldof
  versionofinternet datagram.Thefirstfieldofthe IPdatagram
  protocol. datagramdefinestheversion definesthe
   numberofIPeitheritisIPv4or versionofIP
   IPv6. address.

37
3) ClassesofIP Explainindetail: TheIPaddressisapairof Thedifferentbits
 address ClassesofIP Identifiers(netid,hostid). definestheclass
  address ThedifferentclassesofIP ofIPdatagram.
   addressesare:Ͳ 
   ClassAͲ0ͲnetidͲhostid 
   ClassBͲ1Ͳ0ͲnetidͲhostid 
   ClassCͲ1Ͳ1Ͳ0ͲnetidͲhostid 
   ClassDͲ1Ͳ1Ͳ1Ͳ0Ͳmulticast 
   address 
   ClassEͲ1Ͳ1Ͳ1Ͳ1ͲReservedFor 
   Future 
    
    
    
4) Subnetmask Explainindetail Thesubnetmaskaredependon Differentclasses
 about:Subnet thedifferentclasshavethe havethe
 mask differentSubnetmask. differentsubnet
 SubnetmaskForClassesare:Ͳ mask.
ClassA:Ͳ255.0.0.0
ClassB:Ͳ255.255.0.0
ClassC:Ͳ255.255.255.0

|.dh^h5b/ȶkW^haS½W: Yh`ap_d\]:10min
¾ IPaddressisa32bitaddressthatisusedtodefineyourdeviceinnetwork.
¾ VersionofIPaddressareIPv6&IPv4thataredefinesinfirstfieldofdatagram.
¾ TherearevariousclassesofIPaddressingandsubnetmaskisdecidedonthebasisofclassofIP
address.


5.7\_jD^R7Wpƨahƚ]h]: Yh`ap_d\]:05min

*GathermoreinformationabouttheIPaddressanddetailedinformationaboutclassesofIPaddress. 

6.eapXJŽWsXhO: Yh`ap_d\]:05min

*VLAN,VLANmembership,identifyVLAN,trunkingVLAN,VTP.

38
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 86 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 18 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : VLAN,VLAN membership, identify VLAN, trunking VLAN, VTP.

y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ :ToStudyaboutVLAN,VLANmembership,identify VLAN,
y..y _pbWWh e°ȱB
trunkingVLAN,VTP.
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutTheoryonsettingIPaddress(IP4/IP6),Subnet


maskclassesofIPaddressing.
z..z 7‡[̆p^Rh : in this chapter we are going to learn about 
x VLAN,VLANmembership,identify VLAN, trunkingVLAN,VTP.

























39
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) VirtualLAN Explain:VLAN VLANallow network Network


Administratorstogrouphosts Administration
  togetherevenifthehostsarenot
directlyconnectedtothe
 
samenetworkswitch.Because
  VLANmembershipcanbe
configuredthroughsoftware,this
  cangreatlysimplifynetwork
designanddeployment.
 

 

 
2) Two types of VLANmembership
VLANmembership Explain:VLAN
membership methods exists and they are Static

andDynamic.


 

 
  

3) TrunkingVLANand Explain:Trunking VLANTrunkingProtocol(VTP)is
VTP VLANandVTP aCiscoproprietaryprotocolthat
propagatesthedefinitionofVirtual
LocalAreaNetworks(VLAN)onthe
wholelocalareanetwork.



|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


x VLAN allownetwork Administratorsto group hosts together even if the hosts are not directly
connected to the samenetwork switch. Because VLAN membership can be configured through
software,thiscangreatlysimplifynetworkdesignanddeployment.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] :05 i\iWN

*Explain:VLAN,VLANmembership,identifyVLAN,trunkingVLAN,VTP.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN


*conceptoftranslatorgateways.

 

40
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵk aco:2017(NSQF)  dp\pƨN^W5Z^:4

˼° P:ICTSM iac]:˼°PTj]^Ž

ajDW5Z^:86 Yh`ap_d\]:120i\iWN

_pbWW5Z^:19Ʌ.k 9.ȵ5k Wh\:

_pbWȵ5k Wh\::conceptoftranslatorgateways.

y.ȶ la½Sq]h^Ž:

k /_pbWWhӔSpSh_j\T˜:tostudyaboutconceptoftranslatorgateways…
y..y_pbWWhe°ȱB
y..zdhVWs:blackboard,chalk,duster 
y..3d5U[½dˆeƗ]:ͲWikipedia

k V
z.̆ƨShaWh/ȶ lah½ȵd 5 hW:Yh`ap_d\]:10min

z..yd\jëh/^ŽƥȻk: VLAN,VLANmembership,identifyVLAN,trunkingVLAN,VTP.nowwewilldiscussedabout
conceptoftranslatorgatewayinthischapter
z..z7‡[̆p^Rh:Ͳwhatisgateway?Whatisthemainfunctionuseofgateway?Discussingabouttranslator
gateway..

3.iac]^ȩk8S:Yh`ap_d\]:90min

7.W5. k 
e°ȱB ̆ĕs IhajȿkX\hˆeSj ƨXsNeŽƛN
1) Translator Explainabout Agateway isaprotocolconverter.. 

 gateway translatorgateway Protocol
Agatewaycanacceptsapacket
  converter
formattedforoneprotocol&

convertittoapacketformattedfor

anotherprotocolbefore

Forwardingit


Agatewayisgenerallysoftware
installedwithinarouter.

|.dh^h5b/ȶkW^haS½W:Yh`ap_d\]:10min
¾ Agatewayisbasicallyaprotocolconverteritconvertstheprotocolwhichisconvenientbefore
forwardingit..
5.7\_jD^R7Wpƨahƚ]h]:Yh`ap_d\]:10min
*Gathermoreinformationabouttranslator gateway…

6.eapXJŽWsXhO:Yh`ap_d\]:120min 
*SMTP,TELNET,FTP,HTTP,SNMP.LDA.

41


 

42
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 87 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 20 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : SMTP,TELNET,FTP,HTTP,SNMP,LDAP

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : Tostudyaboutthevariousprotocolslike,SMTP,TELNET,FTP,


y..y _pbWWh e°ȱB
HTTP,SNMP,ANDLDAP.

y..z dhVWs :Blackboard,chalk,duster

y..3 d5U[½ dˆeƗ] : -datacommunicationandnetworkingbehruza.forozon

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :inpreviouschapter,wehavestudiedaboutconceptoftranslatorgateways..inthischapter


wewillstudyaboutvariousprotocols

z.z 7‡[̆p^Rh : :Whatisprotocol?inthischapterwewillstudyaboutvariousprotocols

3. iac] ^ȩk8S :   Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1. Simplemailtransfer Explainabout: Thisprotocolsisaninternet Internet


 protocol(SMTP) SMTP standardforeͲmailtransmission. standardforeͲ
   SMTPbydefaultusesTCPport25. mail.
    
2. TELNET Explainabout: Itisavirtualterminalprotocolwhich Remotely
  TELNET allowstheusersonalocalhostto accessthe
   remotelyaccessanotherhostasif computeron
   theywerelocallyattached. othernetwork.
    
3. FTP(filetransfer Explainindetail FTPisstandardn/wprotocolusedto Transferfiles
 protocol) aboutFTP transfercomputerfilesanotherhost fromonehost
   overatcp–basednetworksuchas toanotherhost.
   internet. 

43
   
4. SNMP(simple Explain:SNMP Snmpisapartofstandard Helpsin
 network  frameworksfornetwork exchangingthe
 management  managementitallowsanadminto management
 protocol)  store&retrievethevaluesinan information
   objectdefinedinanagent. between
    networking
    equipments.
    
    
    
5. LDAP(lightweight Explain: Asthenamesuggests,itisalight Client–server
 directoryaccess LDAP weightclient–server. protocoltor
 protocol)  Protocolforaccessingdirecting accessing
   servicesspecificallyx.500Ͳbased directing
   directoryservices. services.
    
    
    
    
6. HTTP(hypertext Explain: Itisanapplicationprotocolfor Protocolused
 transferprotocols) HTTP distributed,collaborative,hyper fortransfer
 mediainformationsystems. hypertext.
 

 

 



|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

¾ Wehavestudiedabouttheusesofthegivenprotocols.
¾ Thedifferentnetworkusesthedifferentprotocols.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

(1) explain SMTP in detail ?


(2) explain TELNET?
(3) explain HTTP?

6. eap XJŽWs XhO :  Yh`ap_ d\] :05 i\iWN

*Networksecurity.

44
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 1


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 87 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 21 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Networksecurity
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : Tostudyaboutnetworksecurity
y..y _pbWWh e°ȱB
y..z dhVWs :Blackboard,chalk,duster
y..{ d5U[½ dˆeƗ] : www.cisco.com,Wikipedia
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 15 min
z..y d\jëh / ^ŽƥȻk :wehavelearnedaboutvariousprotocolsanditsusesLikeSMTP,TELNET,FTP,HTTP
,SNMP&LDAP.
z..z 7‡[̆p^Rh : Nowadaysthehackersbecamemoreactivesothatwehavetoimproveoursecuritytosave
ourpersonaldataisimportantsotodaywearegoingtostudyaboutnetworksecurity
3. iac] ^ȩk8S :  Yh`ap_ d\] : 75 min

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1 Networksecurity Explainindetail– Networksecurityconsistsofthe Anyactivity
 networksecurity provisionsandpoliciesadoptedbya designedto
 networkadministertoprevent& protocolyour
 monitorunauthorizedaccess, network.
 misuse,notification 
 Ordenialofacomputernetwork 
 andnetworkaccessibleresources. 
 Anetworksecuritysystemusually 
 consistsofmanycomponentswork 
 togetherwhichminimizes 
 maintenance&improvessecurity 
 

|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 15min
¾ Nowadaysthehackersbecamesoactivesothatwehavetoimproveoursecuritytosaveourpersonal
oursecuritytosaveourisimportantpointaboutthis

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 min


*explainnetworksecurityinyourwords?

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 min


x Conceptofdynamichostcontrolprotocol.


45


 

46
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵk aco : 2017(NSQF) dp\pƨN^ W5Z^ : y
˼°P : ICTSM iac] : ˼°P Tj]^Ž
ajD W5Z^ : 87 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ :22 Ʌk.9.ȵk5 Wh\ : DEVEN SIDDHPURA
_pbWȵk5 Wh\ : concept of DHCP.

y. ȶ la½ Sq]h^Ž :
k /_pbWWhӔSpSh_j\T˜:tostudyaboutconceptofDynamicHostControlProtocol.
y..y_pbWWhe°ȱB
y..zdhVWs:BlackBoard,Choke,Duster
y..{d5U[½dˆeƗ]:DataCommunication&NetworkingByBehrouzA.Forouzan

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 15 i\iWN
z..yd\jëh/^ŽƥȻk:InPreviousChapterWehavestudiedaboutNetworkSecurity
z..z7‡[̆p^Rh:whatisDHCPandHowitsWorksandtheUsesOfDHCPwilldiscusseinthischapter.

3. iac] ^ȩk8S : Yh`ap_ d\] : 75 i\iWN

7.W5. k 
e°ȱB ̆ĕs IhajȿkX\hˆeSj ƨXsNeŽƛN
1. Dynamichost WhatistheDHPC? DHCPextendsbootin 2ways.First HelpstoobtainanIP
 controlprotocol. ofall,itallowsacomputerto addressquickly&
 acquirealltheconfiguration Dynamically.
 informationitrequiresinasingle
 message.
 Secondly,DHCPhelpstoobtain
anIPaddressquicklyDynamically.

3typesofaddressallocation
allowedinDHCP:Ͳ
1ͲManualConfiguration

2ͲAutomaticConfiguration

3–DynamicConfiguration
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 15 i\iWN
- ThemainuseofDHCPistoobtainIPaddressquicklyanddynamically.
- 3Typesofaddressallocation:ͲManual,Automatic&DynamicConfiguration.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
- WriteashortnotetheDynamichostControlProtocol?

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

Conceptofinternet&ArchitectureOfInternet.

47


 

48
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵk aco:2017(NSQF)  dp\pƨN^W5Z^:y


˼° P:ICTSM iac]:˼° PTj]^Ž
ajDW5Z^:88 Yh`ap_d\]:120i\iWN
_pbWW5Z^:23 Ʌ.k 9.ȵ5k Wh\:
_pbWȵkWh\:conceptofinternet,Architectureofinternet.
5
y.ȶ la½Sq]h^Ž:
k /_pbWWhӔSpSh_j\T˜:Studyaboutconceptofinternet&ARCHITECTUREOFinternet.
y..y_pbWWhe°ȱB
y..zdhVWs:BlackBoard,Choke,Duster
y..3d5U[½dˆeƗ]:DataCommunication&Networking,By:ͲBehruzA.Forozon

k V
z.̆ƨShaWh/ȶ lah½ ȵd 5 hW:Yh`ap_d\]:10min
z..yd\jëh/^ŽƥȻk:WehavestudiedaboutDHCP&otherprotocolinpreviouschapter.Nowwewillstudy
aboutInternet&itsarchitecture.
z..z7‡[̆p^Rh:NowadaysinternetisadailyuseThings.Wewillstudyindetailinthischapter.

3.iac]^ȩk8S:Yh`ap_d\]:90min

7.W5. k 
e°ȱB ̆ĕs IhajȿkX\hˆeSj ƨXsNeŽƛN
1. Internet Explainaboutthe In1982,TheInternetprotocol Fullyinterconnectted
  conceptof suite(TCP/IP)wasstandardized Network
  Internet. andtheconceptofaword–wide 
   networkoffullyinterconnected 
   YCP/IPnetworkcalledInternet 
   wasintroduced. 
2. Architectureof Explainabout ByDefinition,itisametanetwork
 Internet Architectureof ,aConstantlychangingcollection
  Internet ofThousandsofindividual
  networkinterCommunication
  withacommonprotocol.
 x Functiontoberequired:Ͳ
 x Dataformatting
 x Addressing
 x Routing
 x Forwarding
x ErrorRecovery
|.dh^h5b/ȶkW^haS½W:Yh`ap_d\]:10min
¾ Shortly,theinternetmeansthefullyinterconnectedNetwork.
¾ Dataformatting,Addressing,Routing,Frwrding,ErrorRecoveryarethefunctionofinternetArchitecture.
5.7\_jD^R7Wpƨahƚ]h]:Yh`ap_d\]:05min
Draw&explaininternetArchitecture.
6.eapXJŽWsXhO:Yh`ap_d\]:05min
¾ Conceptofsocialnetworkingsites,videocalling&conferencing.

49


 

50
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵkaco:2017(NSQF)  dp\pƨN^W5Z^:y
˼°P:ICTSM iac]:˼°PTj]^Ž
ajDW5Z^:88 Yh`ap_d\]:120i\iWN
_pbWW5Z^:24 Ʌk.9.ȵk5 Wh\:
_pbWȵk5 Wh\:Concept of Social Networking Sites & video Calling & Conferencing

y.ȶ la½Sq]h^Ž:
k /_pbWWhӔSpSh_j\T˜:1.StudyabouttheconceptofsocialNetworkingSites
y..y_pbWWhe°ȱB
2.VideocallingandConferencing.
y..zdhVWs:BlackBoard,Choke,Duster
y..{d5U[½dˆeƗ]:1:www.google.com
2.www.techopedia.com
k V
z.̆ƨShaWh/ȶ lah½ ȵd 5 hW:Yh`ap_d\]:10i\iWN
z..yd\jëh/^ŽƥȻk:WehavestudiedaboutInternet&It’sarchitectureinpreviouschapter.
z..z7‡[̆p^Rh:ToDays,socialnetworkingsiteisabasicneedofhumanbeing.Wewillstudyaboutit.

3.iac]^ȩk8S:Yh`ap_d\]:90i\iWN

7.W5. k 
e°ȱB ̆ĕs IhajȿkX\hˆeSj ƨXsNeŽƛN
.1 SocialNetworking Explainindetail Asocialnetworkingwebsiteisan Allowsuserstocreate
 Site. aboutconceptof onlineplatformthatallowsusers publicprofile&
  socialnetworking tocreateapublicprofile& internetwithother
  site. internetwithotheruserson useronwebsite.
   website. 
   E.G.Facebook,Twitter,Orkut, 
   MySpace. 
    
 Videocallingand ExplaininDetail VideoCalling:ͲSimplydefinedas VisualCommunication
2 conferencing about:Video avisualcommunicationbetween between2people.
callingand 2People. 
conferencing VideoConferencing:Ͳ Communication
ItImpliessupportformorethan betweenmorethan2
twopartiescommunicating people
simultaneously. simultaneously.
|.dh^h5b/ȶkW^haS½W:Yh`ap_d\]:10i\iWN
Ͳ Socialnetworkingwebsitehavebecomeverybasicneedofhumanbeingnowadays
- Avisualcommunicationbetween2peopleisvideocalling&videoconferencingsupportmorethan2
parties,communicationsimultaneously.
5.7\_jD^R7Wpƨahƚ]h]:Yh`ap_d\]:05i\iWN
- Explainvideocalling&VideoConferencing.
6.eapXJŽWsXhO:Yh`ap_d\]:05i\iWN
x Conceptofvirus&It’sprotectionsusingantivirus,UTMandFirewall

51


 

52
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 1

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 88 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 25 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : conceptofvirus&itsprotectionsusingantivirus,utm&firewall.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : Tostudyabouttheconceptofvirus&itsprotectionsusing


y..y _pbWWh e°ȱB
antivirus,utm&firewall

y..z dhVWs :Blackboard,chalk,duster

y..3 d5U[½ dˆeƗ] : Ͳwww.Google.com


Ͳwebopediacom
ͲWikipedia
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 min

z..y d\jëh / ^ŽƥȻk :inpreviouschapter,wehavestudiedaboutconceptofsocialNetworkingSitesinthis


chapterwewillstudyaboutantivirus.

z..z 7‡[̆p^Rh : :virus&antivirusarebasicproblemoftheinternetuserswewillstudyindetailaboutit.

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 min

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1. virus Explain:virus Acomputervirusisaprogramor Pieceofcode
   pieceofcodethatisloadedonto thatvery
   yourcomputerwithoutyour harmfulfor
   knowledgeandrunsagainstyour computer
   wishes. 
    
    
    
2. antivirus Explain:antivirus Antivirussoftwareisaclassof Actasa
   programthatwillprevent,detect between
   andremediateMalwareinfections trustednetwork
   onindividualcomputingdevices&it &other
   system. untrusted
    network.
   

53
 
   
   Itisanapproachtosecuritymgmt
3. UTM(unifiedthreat Explain:UTM( thatallowsanadministratorto
 management) UnifiedThreat monitor&manageawidevarietyof
  Management) securityrelatedapplications&
   infrastructurecomponentsthrough
   asinglemgmtconsole.
   
   
   
   
4. Firewall Explain:firewall Firewallisanetworksecuritysystem
eitherhardwareorsoftwarebased
thatcontrolsincoming&outgoing
n/wtrafficbasedonasetofrules.





















|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 min

¾ Virusesarethemanmadeprogramthatwilleasilyharmyourcomputer.Antivirusisaprogramthat
detectsviruses&removesit.
¾ Whereastheutm&firewallarealsousedforthesecuritypurpose

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*whatisviruses&antivirus?
WhatisUTM&firewall?

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

x Collaboratingusingwired&WirelessNetworking.

54
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 89 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 26 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Collaborationusingwiredandwirelessnetwork.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutCollaborationusingwiredandwirelessnetwork.


y..y _pbWWh e°ȱB

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterwehavelearnedabouttheconceptofanvirusandantivirus.

z..z 7‡[̆p^Rh :
x Collaboratingusingwirednetwork
x Collaboratingusingwirelessnetwork

3. iac] ^ȩk8S :  Yh`ap_ d\] :90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Collaborationusing Explain: Atypicalsharingsessioninvolves Wirednetwork


 wirednetwork Collaborationusing interactionandinformation 
  wirednetwork interchangebetweenpeople 
   workingatphysicallydisparate 
   locations. 
    
    
    
2) Collaborationusing Explain: Collaboratingusersworkingin 
 wirelessnetwork Collaborationusing dynamicheterogeneous Wireless
  wirelessnetwork environmentsusedevicesofvaried network
   typesandcapabilitieswiththe 
 purposeofaccomplishingmutually 
beneficialactivity.

Wirelessnetworkinghas

55
revolutionizedmobilecomputing.

Wirelessnetworkingmeansthat
mobileuserscansqueezemorework
timeoutoftheirday,andit
significantlyenhancestheirqualityof
life.































|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

x UserDataProfiledescribesthestateofauserinvolvedincollaboration,capturingthepreferences,
capabilitiesandsystemstateofuserenvironment.
x WirelessnetworkingisbetterwithWindowsXP.Forexample,WindowsXPreduceswirelessdeployment
costsviaautomaticconfiguration.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

Gathermoreinformationaboutwiredandwirelessnetworks.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN 

Protectinganetwork,Networkperformancestudyandenhancement.

56
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco:2017(NSQF) dp\pƨN^ W5Z^ :y

˼° P :ICTSM iac] :˼°P Tj]^Ž 

ajD W5Z^ :89 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ :27 Ʌ.k 9.ȵ 5k Wh\:

_pbWȵ 5k Wh\ :Protectinganetwork,networkperformancestudy&enhancement

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ :studyofprotectinganetwork,networkperformancestudy&
y..y _pbWWh e°ȱB
enhancement

y..z dhVWs :blackboard,chok,duster

y..3 d5U[½ dˆeƗ] :Ͳwww.googal.com
ͲWikipedia


k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :

wehavestudiedaboutcollaboratingthewired&wirelessnetwork.wewillstudyabouttheprotectinganetwork
inthischapter

z..z 7‡[̆p^Rh :willstudyaboutprotectinganetworkandenhancementsinprotectinganetwork.

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

   
1) Protectinga Howtoprotectour Ifyouhaveaseverbasednetwork, Protectour
 network network??? it‘scriticallyimportanttoprotect networkby
   yourseverfromhackers,viruses& virusworms&
   othermalicioussoftware.Wecan malicious
   protectournetworkbyantivirus, software.
   firewall,UTMetc. 
    

57
   
    
    
   
2) Network Whatisnetwork Networkperformancerefersto
Measureof
 performance performance??? measuresofservicequalityofa
servicequality
   telecommunicationproductasseen

   bythecustomer.

   

   

   

   

3) enhancement Whatwillbethe Wecanenhanceournetwork
Cloud
enhancementin performancebyusingcloud
computing
network computingasitprovidethe
performance??? transparentservicetousers














|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10i\iWN

¾ Toprotectournetwork,wewillusetheantivirus,firewall&utmetc.
¾ Thenetworkperformancereferstomeasuresofserviceofquality

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

- Whatisnetworkperformance&itsenhancement?.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

Surveillanceusingnetworkdevices,collaborationonnetworkforteamoptimization&supportactivitiesremote
managementofdevices.

58
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 90 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 28 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Surveillanceusingnetworkdevices,collaborationonnetworkforteamoptimizationand


supportactivities,remotemanagementofdevices.
y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutSurveillanceusingnetworkdevices,collaboration


y..y _pbWWh e°ȱB
onnetworkforteamoptimizationandsupportactivities,remotemanagementofdevices.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouschapterwehavelearnedaboutHowtoprotectanetworkandnetwork


performancestudyandenhancement.

z..z 7‡[̆p^Rh : 

x Surveillanceusingnetworkdevices
x Collaborationonnetworkforteamoptimizationandsupportactivities
x Remotemanagementofdevices



59
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Surveillanceusing Explain: Surveillance isthemonitoringof Monitoring
 networkdevices Surveillanceusing thebehavior,activities,orother behavior
  networkdevices changinginformation,usuallyof 
   peopleforthepurposeof 
   influencing,managing,directing,or
   protectingthem. 
    
2) Collaborationon Explain: CollaborationOptimizationServices 
 networkforteam Collaborationon employsacomprehensiveapproach comprehensive
 optimizationand networkforteam towardassessment, approach
 supportactivities optimizationand recommendation,andrefinementof 
  supportactivities yourkeyareasformanagingyour 
   CollaborationSolution 
    
   
SNMPbasedcontrolandmonitoring
3) Remote Explain: ofremotenetworkdevicesisa 
managementof Remote valuabletoolforalmostany 
devices managementof networkadministrator.SNMPallows 
devices youtoreviewstatus,change 
configurationparameters,edituser 
privilegesandcontroloperating
functionsatremoteunitsviaSNMP
commands.

|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

x Surveillanceincludesobservationfromadistancebymeansofelectronicequipment(such
asCCTVcameras)orinterceptionofelectronicallytransmittedinformation(suchasInternettrafficor
phonecalls).

x AuditsandAssessments,OptimizationSupport,OperationsManagement,KnowledgeandLearningare
thebasicservicesprovidedbyteamoptimization.

x SNMPtrapsprovideanincrediblyhelpfulmeanstoalertnetworkmanagerswhenundesirable
conditionsaredetectedatremotesites.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*Surveillanceusingnetworkdevices,collaborationonnetworkforteamoptimizationandsupport
activities,remotemanagementofdevices.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN


*Remotemanagementofdevices.

 

60
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 90 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 29 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Remote management of devices.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : : ToStudyaboutremotemanagementofdevices.


y..y _pbWWh e°ȱB
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon,wikipedia.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Surveillanceusingnetworkdevices.
z..z 7‡[̆p^Rh : in this chapter we are going to learn about
x remotemanagement.
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Remote Explain:Remote Remote Management is managing a Management
managementof managementof computer or a network from a activites.
devices. devices. remotelocation.Itinvolvesinstalling
software and managing all activities
of the systems/network,
workstations,serversorendpointsof
aclient,fromaremotelocation

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


x Remotemanagementdevices(RMD)istheprocessofsupervisingandcontrollingITsystems(suchas
networkdevices,desktops,serversandmobiledevices)bymeansoflocallyinstalledagentsthatcanbe
accessedbyamanagementserviceprovider.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN


*Explain:workingofremotemanagement.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*modernnetworksecuritythreats.

61
 

62
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 1


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 91 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 30 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Mordern Network security threats & the basics of security a n/w.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : Studyaboutmodernnetworksecuritythreats&thebasicsof


y..y _pbWWh e°ȱB
securityanetwork.
y..z dhVWs :Blackboard,chalk,duster
y..3 d5U[½ dˆeƗ] : Ͳwww.google.com
Ͳwebopedia.com
ͲWikipedia

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 min

z..y d\jëh / ^ŽƥȻk :wehavestudiedaboutRemotemanagementofdevices.

z..z 7‡[̆p^Rh : :wewillstudyaboutnetworksecuritythreats&thebasicsofsecurityanetwork.





















63
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 min

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

   
1. Networksecurity Explainindetail: Thebasicsecuritythreatsnowadays Modernthreats
 threats Networksecurity are:Ͳ are:denialof
  threats. _compromisedͲkeyattack service,
   _networkdenialͲofͲserviceattack Evesdropping
   _evesdropping(sniffingsnooping) viruses&
   _identityspooting wormsetc.
   _manͲinͲthe–middle 
   _ReplayAttack 
   _Viruses&Worms 
    
    
    
2. Basicsofnetwork Explainindetail Thereareexactly2keysto Tasksof
security basicsofnetwork informationsecurity: network
security 1)Configurethesystem&network security:
correctly&keepitthatway. protection,
2)Knowthetrafficcominginto&out detection,
ofyournetwork. reaction
¾ Allthetasksthathavetobedo
neinnetworksecuritybreak
downinto3phasesorclasses:
1) Protection
2) Detection
3) Reaction






|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

Wehavestudiedaboutmodernsecuritythreatslikedenialofserviceinthischapter&alsostudiedaboutbasicsof
Networkofsecurity.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

Explainaboutmodernsecuritythreats&howitisspreadedovernetwork.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

x SecureAdministrativeAccessAndLANsecurityconsiderations

64
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco:2017(NSQF) dp\pƨN^ W5Z^ :1

˼° P :ICTSM iac] :˼° P Tj]^Ž 

ajD W5Z^ :91 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ :31 Ʌ.k 9.ȵ 5k Wh\:

_pbWȵ 5k Wh\ :SecureAdministrativeAccessAndLANsecurityconsiderations

y. ȶ la½ Sq]h^Ž :


k / _pbWWh ӔSp Sh_j\T˜: TostudyaboutLANsecurityconsiderations.
y..y _pbWWh e°ȱB

y..z dhVWs :Blackboard,chalk,duster

y..3 d5U[½ dˆeƗ] :www.google.com
ͲWikipedia 


k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10min

z..y d\jëh / ^ŽƥȻk :inpreviouschapterwehavestudiedaboutMordernNetworksecuritythreats&thebasics


ofsecurityan/w.

z..z 7‡[̆p^Rh ::whatarethesecurityconsiderationsforusingLANnetwork.wewillstudyaboutthat.

65
3. iac] ^ȩk8S : Yh`ap_ d\] :90min

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

  
    
1) LANsecurity Explainindetail: TherearevariousLANsecurity Modernthreats
 consideration. LANsecurity considerations,like, are:denialof
 consideration. ¾ Topologyandarchitecture service,
 ¾ Securingroutersand Evesdropping
switches viruses&
¾ Designandaccesslists
wormsetc.
¾ VLANS
¾ Spanningtreeloops.
¾ Documentyournetwork
andkeepitmaintained.
















|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10min

¾ Thenetworksecurityconsiderationareveryfirstthingtokeepinmindforsecuringanetwork,the
basickeytermswehavestudiedinthischapter&gathermoredetailedinformationaboutit.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

x GathermoreinformationaboutLANsecurityconsideration.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

x NetworksecuritydevicesandCryptography

66
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵk aco:2017(NSQF) dp\pƨN^ W5Z^ :1
˼°P :ICTSM iac] :˼°P Tj]^Ž 
ajD W5Z^ :91 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ :32 Ʌk.9.ȵk5 Wh\:
_pbWȵk5 Wh\ :Networksecuritydevices,Cryptography.

y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜: TostudyaboutLANsecurityconsiderations.
y..y _pbWWh e°ȱB
y..z dhVWs :Blackboard,chalk,duster
y..3 d5U[½ dˆeƗ] :www.google.comͲWikipedia 

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10min
z..yd\jëh/^ŽƥȻk:inpreviouslessonwestudiedabtSecureAdministrativeAccessAndLANsecurityconsiderations
z..z7‡[̆p^Rh::whicharethenetworksecuritydevices,ͲCryptography

3. iac] ^ȩk8S :  Yh`ap_ d\] :90min

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Networksecurity Explain:Network TherearevariousLANsecurity Firewalls,
 devices securitydevices considerations,like, antivirus,VPNs,
   x Firewalls antispyware,
   x Antivirus Antispam
   x VPNs 
   x Antispyware 
   x Antispam 
2) Cryptography Explain:Cryptography. Cryptographyisamethodofstoringand Secretdatato
transmittingdatainaparticularformso secretuser
thatonlythoseforwhomitisintended
canreadandprocessit.
Objectives:
x Confidentiality
x Integrity
x NonͲrepudiation
x Authentication
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10min

x Cryptographyisamethodofstoringandtransmittingdatainaparticularformsothatonlythosefor
whomitisintendedcanreadandprocessit.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN

x ExplainNetworksecuritydevicesandCryptography.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN


x WiͲFisecurityconsideration


67


 

68
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco:2017(NSQF) dp\pƨN^ W5Z^ :y

˼° P :ICTSM iac] :˼° P Tj]^Ž 

ajD W5Z^ :91 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ :33 Ʌ.k 9.ȵ 5k Wh\:

_pbWȵ 5k Wh\ :WiͲFisecurityconsideration.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ :TostudyaboutWiͲFisecurityconsideration.
y..y _pbWWh e°ȱB

y..z dhVWs :blackboard,chok,duster

y..3 d5U[½ dˆeƗ] :Ͳwww.google.com
ͲWikipedia

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :wehavestudiedaboutNetworksecuritydevices,Cryptography.

z..z 7‡[̆p^Rh :A consideration on any computer N/W, security is especially inpartanatonwifiwirless
N/Woveropenanconnectionandextractintolikepassword&creditcardnetworksotodaywestudyaboutwifi
securityconsideration.

x Wirelesssecurity
x Wirelesssecurityconsiderations


69
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Wirelesssecurity Whatiswireless Wirelesssecurityistheprevention Protectour


  security? ofunauthorizedaccessor networkby
   computersusingwirelessnetworks. virusworms&
    malicious
    software.
2) WiͲFisecurity Explainindetail: 1.WEP(wiredequivalentprivacy)
 considerations WiͲFisecurity ¾ WebisanoldIEEF802.11
WEB,WPAare
 considerations standardTROM1999which
standardsof
 wasoutdatedin2003by
WiͲFisecurity.
 WPA.

2.WPA(WI–FIprotectedaccess)

¾ Introducedtocorrectthe
iahereutweaknessofWEP
¾
Thecurrentstandardis
WAP2/somehardware
cannotsupportWAP2
withoutfirmwareupgrade
orreplacement.
3.WPS(wiͲfiproctectedsetup)

¾ Securitymethodprevated
on2007
¾ AsurBabletoaddnew
devicestotheirN/Wby
simplypusingabutton
&thentyping8Ͳdigitpinon
clientdevice.

|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

¾ Toprotectournetwork,wewillusetheantivirus,firewall&utmetc.
¾ Don’tuseWEPwhichBeasytocreak
¾ Don’tuseWPA,unlesslegacydevicesanyonenewrequireit.
¾ Don’tuseWPS,whichcaneasilybebruteforced
¾ DouseWPAwithastrangepassphrase
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

- GathermoreinformationabouttheWiͲFisecurityconsiderations.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

ServerConcepts,ServerHardware,InstallationSteps,ConfigurationOfServer

70
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 92 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 34 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : ServerConcepts,ServerHardware,InstallationSteps,Configuration

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ 1.ToStudyaboutServerConcepts,


y..y _pbWWh e°ȱB
2.ToStudyaboutServerHardware,
3.ToStudyaboutInstallationSteps,
4.ToStudyaboutConfiguration

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutWiͲFisecurityconsiderations.

z..z 7‡[̆p^Rh :
x ServerConcepts
x ServerHardware
x InstallationSteps
x Configuration
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) ServerConcepts WhatIsServer? InInformationTechnology,ServerIs 


   aComputerProgramThatProvides 
   ServicesToOtherComputer 
   ProgramsAndTheirUsersInThe 
   SameOrOtherComputers. 
    
2) Serverhardware Whichhardware TheHardwarecomponentsthata HardwareParts
  componentsare TypicalServerComputerComprises RequiredFor
  neededforserver? areSimilarToTheComponentsUsed Servers
  Doallfirstlettersis InLessExpensiveClientComputers. 
  small Motherboard,Processor,Memory, 
   Harddrives,NetworkConnection 
   Video,Powersupply. 

71
   
    
3) InstallationSteps WhatArethesteps Installationsteps: 
   ForInstallingServer? 1) InstallPerl 
   2) DecompressFiles 
   3) CreateFolders 
4) SetAccessPermissions
   
5) MoveFiles
   6) RegisterVirtualDirectory 
   7) SettingForRunningCGI 
   Script 
   8) RegisterDefaultContent 
   Pages 
   9) Confirmation&Access 
ControlSetting
   

   

   

   
ToConfigureAWebServerOrAn
4) Configurationof HowCanWe Configureaweb
ApplicationServerThatUsesBITS
Server ConfigureAServer? server
Protocol,YouMustInstallThe
Insmallletter 
BranchCacheFeatureUsingServer
Manager.









|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

¾ ServerIstheBasicNeedforAllWebBasedApplication.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*WhatIsServer?
*WhichHardwareComponentsAreNeededForServer?
*WhatAreTheStepsForInstallingServer?
*HowCanWeConfigureAServer?
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

*ADSoverview,ADSdatabase,Activedirectorynamespace,Logicalandphysicalelements ofAD.

72
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco:2017(NSQF) dp\pƨN^ W5Z^ :y

˼° P :ICTSM iac] :˼°P Tj]^Ž 

ajD W5Z^ :92 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ :35 Ʌ.k 9.ȵ 5k Wh\:DEVENSIDDHPURA

_pbWȵ 5k Wh\ :Adsoverview,adsdatabase,activedirectingnamespacelogical&physicalelementsad.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ :1.tostudyaboutadsoverview,


y..y _pbWWh e°ȱB
2.tostudyaboutadsdatabase,
3.tostudyaboutactivedirectingnamespace,
4.tostudyaboutlogical&physicalelementsofAD…..
y..z dhVWs :blackboard,chok,duster

y..3 d5U[½ dˆeƗ] :Ͳwww.googal.com
ͲWikipedia
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :inpreviouschapterwehavestudiedaboutserverconcepts,serverhardware,installation


steps&configurationofserver

z..z 7‡[̆p^Rh Ͳ1.adsoverview

2.adsdatabase

3.activedirectingnamespace

4.logical&physicalelementsofad

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1. Adsoverview Giveshortoverview Adsisimplementationofadirecting Implementation


  ofads(active servicethatprovidescentralized ofdirectory
  directingservice) authentication&serviceituses service.
   LDAP. 
    
2 Adsdatabase Giveexplanation Theadsdatabase,thedirecting apsdatabaseuse
  aboutadsdatabase store,inwindows2000serveruses jetblue
   thejetblue–basedesf98&its 
   limitedto1673&2billionobjectsin 
  eachdomain…. 

   

73
   
    
    
3 Explain;active Activedirectorynamespace 
Activedirecting
 directing providesahighlevelabstracting 
namespace
 namespace.. objectmodalthatbasicaround 

  Microsoftactivedirectingservice 
   task 
    
    
4 Logicaland Explain;logical& Thelogicalpartsofadincludes Provideshigh
physicalelements physicalelementsof forests,tress,domains,ous&global levelabstraction
ofad. ad. catalog..thephysicalstructureof
adhelpstomangebetweenservers,
withrespecttodirectorytwo
elements:controllers,sites
















|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

- Basicstudyofactivedirectingservice.
- Implementationofactivedirectingthatprovideauthentication&authorization.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

- Adsoverview
- Adsdatabase
- Activedirectingnamespace
- Logical&physicalelementsofad…..
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

Conceptofdns,dnsnameresolution–hostnames ,netblosnamednsoverview….

74
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 93 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 36 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : ConceptofDNSnameresolutionͲhostname,netBIOSname,DNSoverview.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutConceptofDNSnameresolutionͲhostname,net


y..y _pbWWh e°ȱB
BIOSname,DNSoverview.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutAdsoverview,adsdatabase,activedirecting


namespacelogical&physicalelementsad.

z..z 7‡[̆p^Rh :
x DNSConcept
x DNSnameresolutionͲhostname,NetBIOSname
x DNSoverview

75
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) DNS(Domain WhatIsDNS? Domain Name System (or Service or Server), Onetypeof
 namesystem)  anInternetservicethattranslatesdomain translator
   namesintoIPaddresses. 
    
2) DNSResolution WhatisDNS DNSnameresolutionisnothingbut Resolvinghost
  resolution? resolvinghostnames,suchas names
   www.nixcraft.com,totheircorresponding 
   IPaddresses. 
    
3) Hostnameand Explain:Host Hostnameresolutionmeanssuccessfully Hostname
 netBIOSname nameandnetBIOS mappingahostnametoanIPaddress.A resolution
 resolution nameresolution hostnameisanaliasthatisassignedtoan 
   IPnodetoidentifyitasaTCP/IPhost. 
    
   NetBIOSnameresolutionmeans NetBIOSname
   successfullymappingaNetBIOSnametoan resolution
   IPaddress.ANetBIOSnameisa16Ͳbyte 
   addressthatisusedtoidentifyaNetBIOS 
   resourceonthenetwork. 
    
   DomainNameSystem(DNS)isasystemfor systemfor
4) DNSOverview Explain:DNS namingcomputersandnetworkservices naming
overview thatisorganizedintoahierarchyof computersand
domains.DNSnamingisusedinTCP/IP network
networks,suchastheInternet,tolocate services
computersandserviceswithuserͲfriendly
names.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

DNSissystemfornamingcomputersandnetworkservices.TwotypesofDNSnameresolution:
1)Hostnameresolution
2)NetBIOSnameresolution
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*WhatIsDNS?*WhatisDNSresolution?Explainitstypes. *GivebriefdescriptionofDNSoverview.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

*DHCPoverview,DHCPclientsandleases.

 

76
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 94 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 37 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵk5 Wh\ : DHCPoverview,DHCPclientsandleases.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutDHCPoverview,DHCPclientsandleases.


y..y _pbWWh e°ȱB

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutConceptofDNSnameresolutionͲhostname,net


BIOSname,DNSoverview.

z..z 7‡[̆p^Rh :
x DHCPoverview
x DHCPclients
x leases
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) DHCP(Dynamichost WhatIsDHCP? WhenyoudeployDynamicHost 


 controlprotocol  ConfigurationProtocol(DHCP) 
   serversonyournetwork,youcan 
   automaticallyprovideclient 
   computersandotherTCP/IPbased 
   networkdeviceswithvalidIP 
   addresses. 
    
2) DHCPclients Explain:DHCP WithaDHCPserverinstalledand 
  clients configuredonyournetwork,DHCPͲ 
   enabledclientscanobtaintheirIP
   addressandrelatedconfiguration
   parametersdynamicallyeachtime
   theystartandjoinyournetwork.

77
  
   
   
3) DHCPleaseprocess Explain:DHCPlease ADHCPͲenabledclientobtainsa
 process leaseforanIPaddressfromaDHCP
 server.Beforetheleaseexpires,the
DHCPservermustrenewthelease
fortheclientortheclientmust
obtainanewlease.Leasesare
retainedintheDHCPserver
databaseapproximatelyoneday
afterexpiration.





















|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

Youcanalsoprovidetheadditionalconfigurationparameterstheseclientsanddevicesneed,calledDHCPoptions
thatallowthemtoconnecttoothernetworkresources,suchasDNSservers,WINSservers,androuters.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*WhatIsDHCP?
*Explain:DHCPclients?
*Explain:DHCPleaseprocess?
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
*Remoteaccessoverview,VPNconcepts,RRASpolicies,TCP/IProuting

78
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 95 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 38 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Remoteaccessoverview,VPNconcepts,RRASpolicies,TCP/IProuting.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutRemoteaccessoverview,VPNconcepts,RRAS


y..y _pbWWh e°ȱB
policies,TCP/IProuting

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutDHCP,DHCPclients,DHCPleaseprocess.

z..z 7‡[̆p^Rh :
x Remoteaccessoverview
x VPNconcepts
x RRASpolicies
x TCP/IProuting

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) RemoteAccess WhatIsRemote Remoteaccessclientsconnectto clientsconnectto


 overview accessoverview? remoteaccessserversandare remoteaccess
   transparentlyconnectedtothe servers
   remoteaccessserver,knownas 
   pointͲtoͲpointremoteaccess 
   connectivity. 
    
    
2) VPNconcepts Explain:VPN VPNsconnectprivatenetworks connectprivate
  concepts throughpublicnetworkslikethe networksthrough
   Internetsotheyarecheaper, publicnetworks
   simplerandmoreflexiblethanother 
   waysofconnecting 


79
   
    
3) RRASpolicies Explain:RRAS RoutingandRemoteAccess MicrosoftAPIand
  policies Service(RRAS)isaMicrosoftAPIand serversoftware
   serversoftwarethatmakesit 
   possibletocreateapplicationsto 
   administertheroutingandremote 
   accessservicecapabilitiesofthe 
   operatingsystem,tofunctionasa 
   networkrouter.Developerscanalso 
   useRRAStoimplementrouting 
   protocols. 
    
    
    
    
4) TCP/IProuting Explain:TCP/IP Ingeneralterms,routingisthe routingisthe
routing processofforwardingpackets processof
betweenconnectednetworks.For forwarding
TCP/IPͲbasednetworks,routingis packetsbetween
partofInternetProtocol(IP)andis connected
usedincombinationwithother networks
networkprotocolservicestoprovide
forwardingcapabilitiesbetween
hoststhatarelocatedonseparate
networksegmentswithinalarger
TCP/IPͲbasednetwork.






|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

¾ VPNsalsousestrongencryptiontoprovideprivacyandstrongauthenticationtoguaranteeidentity,so
theyaremoresecurethantraditionalnetworks.
¾ IPisthemailroomoftheTCP/IPprotocol,whereIPdatasortinganddeliverytakeplace.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN


*WhatIsRemoteaccessoverview?
*Explain:VPNconcepts
*Explain:RRASpolicies
*Explain:TCP/IProuting
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
*RRASpolicies.

80
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 95 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 39 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : RRAS policies.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : : ToStudyaboutRRASpolicies.
y..y _pbWWh e°ȱB
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon,wikipedia.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Remoteaccessoverview,VPNconcepts,RRASpolicies,TCP/IProuting.
z..z 7‡[̆p^Rh : in this chapter we are going to learn about
x RRASpolicies.
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) RRASpolicies Explain:RRAS RoutingandRemoteAccess MicrosoftAPI and
policies. Service(RRAS)isaMicrosoftAPIand serversoftware
serversoftwarethatmakesit
possibletocreateapplicationsto
administertheroutingandremote
accessservicecapabilitiesofthe
operatingsystem,tofunctionasa
networkrouter.Developerscanalso
useRRAStoimplementrouting
protocols.

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN



x RoutingandRemoteAccessService(RRAS)isaMicrosoftAPIandserversoftwarethatmakesitpossible
tocreateapplicationstoadministertheroutingandremoteaccessservicecapabilitiesoftheoperating
system,tofunctionasanetworkrouter.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN


*Explain:workingofRRAS.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*IAS&TCP/IPRouting.

81


 

82
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 95 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 40 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : IAS & TCP/IP Routing.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : : ToStudyaboutIAS&TCP/IPRouting..
y..y _pbWWh e°ȱB
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon,wikipedia.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutRRASpolicies.
z..z 7‡[̆p^Rh : in this chapter we are going to learn about IAS & TCP/IP Routing.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) TCP/IProuting Explain:TCP/IP Ingeneralterms,routingisthe routingisthe
 routing processofforwardingpackets processof
  betweenconnectednetworks.For forwarding
  TCP/IPͲbasednetworks,routingis packets
  partofInternetProtocol(IP)andis between
  usedincombinationwithother connected
  networkprotocolservicestoprovide networks.
  forwardingcapabilitiesbetween
  hoststhatarelocatedonseparate
  networksegmentswithinalarger
  TCP/IPͲbasednetwork.
  
IAS Explain:IAS TheIASserverusestheActive Activedirectory
2)
Directorydatabasetostore
authenticationinformationsothat
allIASserverscanbemanagedfrom
asingleconsole.

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


x AroutedefinesapathforsendingpacketsthroughtheInternetnetworktoanaddressonanother
network.Definesagatewaythatcanforwardpacketstoaspecifichostonanothernetwork.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:workingofIAS&TCP/IPRouting.
6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN
*Conceptofuserandgroup,planningSecuritygroupstrategy


83
 

84
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 96 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 41 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Conceptofuserandgroup,planningsecuritygroupstrategy.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutConceptofuserandgroup,planningsecuritygroup
y..y _pbWWh e°ȱB
strategy.
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutIAS&TCP/IPRouting.
z..z 7‡[̆p^Rh : Æ ConceptofuserandgroupÆplanningsecuritygroupstrategy

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Conceptofuserand Explain:Conceptof Inpersonalorbusinesscomputing,a usergroupisa
 group userandgroup usergroupisasetofpeoplewho setofpeople
   havesimilarinterests,goals,or whohave
   concerns.Themembershaveregular similar
   meetingswheretheycansharetheir interests,goals,
   ideas. orconcerns
    
2) planningsecurity Explain:planning Whenyoucreateanewuser,you definethe
groupstrategy securitygroup canaddtheusertoanexisting user's
strategy securitygrouptocompletelydefine permissionsand
theuser'spermissionsandaccess accesslimits
limits.Changingpermissionforthe
groupaffectsallusersinthegroup.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
ƒ Themembersofausergroupliveinthesamegeographicarea,sotheycangettogetherinperson.
However,someusergroupshavemembersdistributedthroughouttheworld,andtheymeetusingInternet
chatrooms,messageboards,ormailinglists.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*Explain:Conceptofuserandgroup
*Explain:planningsecuritygroupstrategy
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
AGDLPProcess&Planninguserauthenticationstrategy


85


 

86
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 96 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 42 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : AGDLP Process & Planninguserauthenticationstrategy.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutPlanninguserauthenticationstrategy.
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Conceptofuserandgroup
x planningsecuritygroupstrategy.
z..z 7‡[̆p^Rh :
x Planninguserauthenticationstrategy

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Planninguser Explain:Planning Oneofthemostfundamental youcanprevent
 authentication userauthentication elementsofanorganization’s attackersand
 strategy strategy securitystrategyisverifyingthe malicioususers
 identityofclientsandgrantingthem fromaccessing
 appropriateaccesstosystem sensitive
 resourcesbasedontheiridentity.By information
 creatinganauthenticationstrategy
 foryourorganization,youcan
preventattackersandmalicious
usersfromaccessingandtampering
withsensitiveinformation

|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN


¾ Designinganauthenticationstrategyinvolvesevaluatingyourexistinginfrastructureandcreating
accounts,establishingameanstosecuretheauthenticationprocess,andestablishingstandardsfor
networkauthenticationandtimesynchronization.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN


*Explain:Planninguserauthenticationstrategy

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN


*PlanningOUstructure,planninggrouppolicystrategy.

87
 

88
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 96 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 43 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : PlanningOUstructure,planninggrouppolicystrategy.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutPlanningOUstructure,planninggrouppolicy


y..y _pbWWh e°ȱB
strategy.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout

x AGDLPProcess&Planninguserauthenticationstrategy.


z..z 7‡[̆p^Rh :

x PlanningOUstructure
x Planninggrouppolicystrategy














89
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) PlanningOU Explain:PlanningOU Therearedifferentwaystodesign OUmodelon


 structure structure OUstructures,butsomeworkbetter userobjectsis
   thanothers.Alloftheuserobjectsin lessimportant
   theStanfordWindowsInfrastructure thanonthe
   areinadifferentdomainthanyour computer
   computerswillbe,soasyou objects
   investigatedifferentdesigns,youwill 
   seethatbasingyourOUmodelon 
   userobjectsislessimportantthan 
   onthecomputerobjects. 
    
   WhenyouplanyourGroupPolicy Whenyouplan
2) Planninggroup Explain:planning design,ensurethatyourActive yourGroup
policystrategy grouppolicystrategy Directorydesignsupportsthe Policydesign,
applicationofGroupPolicy.Then ensurethat
youneedtoclearlydefineyour yourActive
objectivesfordeployingGroup Directorydesign
Policy.Specifically,understandany supportsthe
serviceͲlevelagreementsand applicationof
administrativeissuesthatpertainto GroupPolicy
GroupPolicyandconsideryour
businessrequirementsandhow
GroupPolicycanhelpyouachieve
them.

|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

¾ WhenyouplanyourGroupPolicydesign,ensurethatyourActiveDirectorydesignsupportsthe
applicationofGroupPolicy
¾ ThemostimportantthingtokeepinmindwhendesigningyourOUistheadministrativepurposethatOU
willserve.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN


*Explain:PlanningOUstructure..
*Explain:planninggrouppolicystrategy

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN


*DeployingsoftwarethroughGPO.

90
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 96 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 44 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : DeployingsoftwarethroughGPO.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutDeployingsoftwarethroughGPO.


y..y _pbWWh e°ȱB

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon,www.google.com

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout

x PlanningOUstructure
x Planninggrouppolicystrategy

z..z 7‡[̆p^Rh :

x DeployingsoftwarethroughGPO







91
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) GPO(Group WhatisGPO? GroupPolicyisatoolthatisavailableto allowsfor


 policyobject)  administratorsthatarerunningaWindows centralized
   2000orlaterActiveDirectoryDomain.Itallows management
   forcentralizedmanagementofsettingsonclient ofsettingson
   computersandserversjoinedtothedomainas client
   wellasprovidingarudimentarywaytodistribute computers
   software. 
    
2) Deploying Explain: 1) RightͲclickthenewGPO,andthenclickEdit. Stepsfor
software Deploying 2) InGroupPolicyObjectEditor,clickComputer deploying
throughGPO software Configuration,clickSoftwareSettings,and software
 throughGPO thenclickSoftwareInstallation. throughGPO
  3) OntheActionmenu,pointtoNew,andthen
clickPackage.
 
4) IntheOpendialogbox,typethefull
 
UniversalNamingConvention(UNC)pathof
  thesharedinstallerpackagethatyouwantto
  distributeintheFilenamebox.Typethis
  pathinthefollowingformat:
  \\ServerName\SharedFolder\VPModule.msior
  \\ServerIP\SharedFolder\VPModule.msi
 MakesurethatyouusetheUNCpathofthe
sharedinstallerpackage.
5) SelecttheWindowsInstallerpackage,and
thenclickOpen.
6) IntheDeploySoftwaredialogbox,
clickAssigned,andthenclickOK.Theshared
installerpackagethatyouselectedappears
intherightpaneofGroupPolicyObject
Editor.

|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

¾ Allowsforcentralizedmanagementofsettingsonclientcomputers
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*WhatisGPO?

*Explain:DeployingsoftwarethroughGPO

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN


*IntroductiontoWebserver.

92
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 97 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 45 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : IntroductiontoWebserver.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutIntroductiontoWebserver.
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x DeployingsoftwarethroughGPO
z..z 7‡[̆p^Rh :
x IntroductiontoWebserver
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Introductionto Explain: AWeb server isaprogramthat, AWebserverisa
 Webserver Introductionto usingtheclient/servermodeland programthat,using
  Webserver theWorldWideWeb'sHypertext theclient/servermod
  TransferProtocol(HTTP),serves el
  thefilesthatformWebpagesto 
  Webusers(whosecomputers 
  containHTTPclientsthatforward 
  theirrequests). 
  Webserversoftencomeaspartof 
  alargerpackageofInternetͲand
 intranetͲrelatedprogramsfor
servingeͲmail,downloading
requestsforFileTransferProtocol
(FTP)files,andbuildingand
publishingWebpages.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
¾ EverycomputerontheInternetthatcontainsaWebsitemusthaveaWebserverprogram.Twoleading
Web servers areApache, the most widelyͲinstalled Web server, and Microsoft's Internet Information
Server(IIS).
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN
*Explain:Webserver
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
*IntroductiontoMessagingservices.

93


 

94
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 97 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 46 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : IntroductiontoMessagingservices.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutIntroductiontoMessagingservices.
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x IntroductiontoWebserver
z..z 7‡[̆p^Rh :
x IntroductiontoMessagingservices
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Introductionto Explain:Introduction Messagingprovidesyouwith Messaging
Messagingservices toMessagingservice guaranteedmessagedeliveryanda providea
robust,failͲsafewaytocarryout powerfuland
manyofyourbusinessprocesses. flexible
 mechanismfor
Messagingprovideapowerfuland interprocess
flexiblemechanismforinterprocess communication
communicationbetween
componentsofaserverͲbased
application.

Theyhaveanumberofadvantages
overdirectcallsbetween
components
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
¾ Messaging provide a powerful and flexible mechanism for interprocess communication between
componentsofaserverͲbasedapplication.
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN
*Explain:IntroductiontoMessagingservices
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN *
Conceptofbackupandrecoveryofserver.


95
 

96
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 97 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 47 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Conceptofbackupandrecoveryofserver.
y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutConceptofbackupandrecoveryofserver.


y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x IntroductiontoMessagingservices
z..z 7‡[̆p^Rh :
x Conceptofbackupandrecoveryofserver
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Conceptofbackup Explain:Concept of Abackupisacopyofdata.This TwoType
andrecoveryof backupand copycanincludeimportantpartsof ͲPhysical
server. recoveryofserver. thedatabase,suchasthecontrol ͲLogical
fileanddatafiles.Abackupisa ͲRMAN
safeguardagainstunexpecteddata (recovery
lossandapplicationerrors.Ifyou management)
losetheoriginaldata,thenyoucan
reconstructitbyusingabackup.

Torestoreaphysicalbackupofa
datafileorcontrolfileisto
reconstructitandmakeitavailable
totheOracledatabaseserver.To
recoverarestoreddatafileisto
updateitbyapplyingarchivedredo
logsandonlineredologs,thatis,
recordsofchangesmadetothe
databaseafterthebackupwas
taken.







97





































|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
¾ Ininformation technology, abackup, or the process of backing up, refers to the copying and
archivingofcomputerdatasoitmaybeusedtorestoretheoriginalafteradatalossevent.
¾ IfyouuseRMAN,thenyoucanalsorecoverdatafileswithincrementalbackups,whicharebackups
ofadatafilethatcontainonlyblocksthatchangedafterapreviousincrementalbackup.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] 05 i\iWN


*Explain:Conceptofbackupandrecoveryofserver.

6. eap XJŽWs XhO :  Yh`ap_ d\] 05 i\iWN


*SecurityBaselineandTemplates&AuditPolicy.

98
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 98 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 48 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Security Baseline and Templates & Audit Policy.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : : ToStudyaboutsecuritybaselineandtemplates&auditpolicy.
y..y _pbWWh e°ȱB
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon,wikipedia.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Conceptofbackup&recoveryofserver.
z..z 7‡[̆p^Rh : in this chapter we are going to learn about
x securitybaselineandtemplates&auditpolicy.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs Ihajȿk X \hˆeSj ƨXsN eŽƛN
1) Baselinesecurity Whatisbaseline Asecuritytemplateiscollectionof Collectionof
templet securitytemplet securityconfigurationsettingsthat security
  canbeappliedtoadomain configuration.
  controller,memberserverora
  workstation.
  
2) Auditpolicy Explain:auditpolicy Anauditpolicydefinesaccount Limitsofpolicy
limitsforasetofusersofoneor
moreresources.Itcomprisesrules
thatdefinethelimitsofapolicyand
workflowstoprocessviolationsafter
theyoccur
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x A"SecurityBaseline"definesasetofbasicsecurityobjectiveswhichmustbemetbyanygivenserviceor
system.
x Derogationsfromthebaselinearepossibleandexpected,andmustbeexplicitlymarked.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:Baseline&templates
6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN
*UnderstandingIPsec.


99


 

100
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 98 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 49 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : UnderstandingIPsec.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutUnderstandingIPsec.


y..y _pbWWh e°ȱB

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout

x SecurityBaselineandTemplates&AuditPolicy.

z..z 7‡[̆p^Rh :
x UnderstandingIPsec.

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) UnderstandingIP Explain:IPsec. IPsecprovide


InternetProtocolSecurity(IPSec)
sec. isacollectionprotocolssuitefor securityforapacket
securingInternetProtocol(IP) attheN/Wlevel.
communications
byauthenticatingand
encryptingeachIPpacketofa
communicationsession.
Twomodel
1.Transportmode
¾ itdosedoesnotprefectthe
I&IPheaderitonlyprotect
infocomingfromthe
transportlayer.


101
2.Tunnelmode
¾ itprotectstheoriginalIP
header.
IPSeccanbeusedinprotecting
dataflowsbetweenapairof
hosts(hostͲtoͲhost),betweena
pairofsecuritygateways
(networkͲtoͲnetwork),or
betweenasecuritygatewayand
ahost(networkͲtoͲhost)

















|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

¾ Internet Protocol security (IPSec) uses cryptographic security services to protect communications over
InternetProtocol(IP)networks.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*Explain:UnderstandingIPsec.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

*securityProtocol.

102
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵk aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4
˼°P : ICTSM iac] : ˼°P Tj]^Ž
ajD W5Z^ : 98 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 50 Ʌk.9.ȵk5 Wh\ :
_pbWȵk5 Wh\ : securityProtocol

y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutProtocolsecurity
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutUnderstandingIPsec.
z..z 7‡[̆p^Rh : Protocolsecurity

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) SecurityProtocol Explain:Protocol A security protocolsuitefor
security protocol(cryptographicprotocolor securingInternet
encryptionprotocol)isanabstract Protocol(IP)
orconcreteprotocolthatperforms communications
asecurityͲrelatedfunctionand byauthenticatingand
appliescryptographicmethods encrypting

ͲIPsecdefinestwoprotocol
1.AHͲautheriticationhead
2.EPSͲencapsulatingsecurity
protocol
Ͳitisintransportmode
Ͳprovidessourceauthentication
dataintegrityandprivacy.
Ͳitprovidessourceauthentication
anddataintegritybutnotprivacy.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
¾ Internet Protocol security (IPSec) uses cryptographic security services to protect communications over
InternetProtocol(IP)networks.
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*Explain:Protocolsecurity.

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN


*Planningsecurityforwirelessnetwork.


103
 

104
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 98 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 51 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Planningsecurityforwirelessnetworks
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutPlanningsecurityforwirelessnetworks
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutProtocolsecurity
z..z 7‡[̆p^Rh : Planningsecurityforwirelessnetwork

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Planningsecurityfor Explain:Planning Wirelesssecurityistheprevention Protectour
wirelessnetworks securityforwireless ofunauthorizedaccessor networkby
networks computersusingwireless virusworms&
networks. malicious
1.WEB(wiredequivalentprivacy) software.
¾ WebisanoldIEEF802.11
standardTROM1999which 
wasoutdatedin2003by
WPA.
2.WPA(WI–FIprotectedaccess)
¾ ThecurrentstandardisWAP
2/somehardwarecannot
supportWAP2without
firmwareupgradeor
replacement.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
x WEB,WPAarestandardsofWiͲFisecurity.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN


*Explain:Planningsecurityforwirelessnetworks
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
*managingnetworktraffic,typesofproblemsofinternetconnectivity,typesandworkingofserverservices.

105
 

106
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 99 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 52 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : managingnetworktraffic,typesofproblemsofinternetconnectivity,typesandworking


ofserverservices.
y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutmanagingnetworktraffic,typesofproblemsof


y..y _pbWWh e°ȱB
internetconnectivity,typesandworkingofserverservices.

y..z dhVWs : chalk,duster,markerpen

y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN

z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout

x Planningsecurityforwirelessnetworks

z..z 7‡[̆p^Rh : in this chapter we are going to learn about

x Managingnetworktraffic
x Typesofproblemsofinternetconnectivity
x Typesandworkingofserverservices.











107
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN

1) Managingnetwork Explain:Managing Setofpoliciesandmechanisms Traffic


 traffic networktraffic thatallowanetworktoefficiently management=
   satisfyadiverserangeofservice Connectivity+
   requests Qualityof
   Service

   
    
x Clientisbeingblockedby Problems
2) Typesofproblems Explain:Typesof
afirewall,antivirus
 ofinternet problemsofinternet 
softwareorrouter.
 connectivity connectivity x Clientisbeingblockedby 
   anintegratedrouter 
   software/firewall. 
   x Connectiontotheserver 
   wasblockedforVPN 
networkusers. 
  
x Connectiontoserversis
   
blockedbyyourInternet
   ServiceProvider. 
    
    
3) Typesandworking Explain:Typesand Serverserviceprovidesdeep installation,
ofserverservices workingofserver productknowledgeduringthe configuration,
services installation,configuration, monitoring
monitoring,andcontinual
improvementphasesofsystems
infrastructures.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN

x Trafficmanagement=Connectivity+QualityofService

x Serverservicealsoprovidesserviceforstorageandsoftwareinfrastructure.

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN

*Explain:Managingnetworktraffic.*Explain: Typesofproblemsofinternetconnectivity.
*Explain:typesandworkingofserverservices

6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN

*TypesofProblemsofInternetConnectivity..

 

108
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4

˼° P : ICTSM iac] : ˼° P Tj]^Ž

ajD W5Z^ : 99 Yh`ap_ d\] : 120 i\iWN

_pbW W5Z^ : 53 Ʌ.k 9.ȵ 5k Wh\ :

_pbWȵ 5k Wh\ : Types of Problems of Internet Connectivity.

y. ȶ la½ Sq]h^Ž :

k / _pbWWh ӔSp Sh_j\T˜ : : ToStudyaboutTypesofproblemsofinternetconnectivity.


y..y _pbWWh e°ȱB
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon,wikipedia.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutManagingnetworktraffic.
z..z 7‡[̆p^Rh : in this chapter we are going to learn about Typesofproblemsofinternetconnectivity.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) ToIdentifyInternet Howyouidentify Troubleshootingsteps.
Connection WhatIsininternet x Checkthenetworkicon
Problem. connectivity. (or
  wirelessconnectionsett
ings)toseeifyou
haveInternetaccess.
x Checkforchangesto
proxysettings.
x Checkthenetwork
cablesifyourcomputer
iswiredtotherouter.
x Resetyourrouter.
x Checkyourfirewallor
securitysoftware.

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN


x Checkthenetworkicon,proxysetting,networkcable,firewellandsecuritysoftware.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN


*Explain:troubleshootingstepsinternetconnectionproblem.
6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN
*Types&WorkingOfServerService.

109
 

110
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 99 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 54 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : Types and working of server service
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : : ToStudyabouttypesandworkingofserverservice
y..y _pbWWh e°ȱB
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ dˆeƗ] :DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Typesofproblemsofinternetconnectivity
z..z 7‡[̆p^Rh : in this chapter we are going to learn about
x typesandworkingofserverservice.

3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs Ihajȿk X \hˆeSj ƨXsN eŽƛN
1) Typesandworking Explain:Typesand Serverserviceprovidesdeepproduct installation,
ofserverservices workingofserver knowledge during the installation, configuration,
services configuration, monitoring, and monitoring
continual improvement phases of
systemsinfrastructures.

|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN

x Serverserviceprovidesdeepproductknowledgeduringtheinstallation,configuration,monitoring,and
continualimprovementphasesofsystemsinfrastructures.

5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN



*Explain:workingofserverservices.

6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN

*linuxserverinstallationandconfigurationplan.

111
 

112
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 100 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 55 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ Linuxserverinstallationandconfiguration,configurationplan.

y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutLinuxserverinstallationandconfiguration,
y..y _pbWWh e°ȱB
configurationplan.
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Typesandworkingofserverservice
z..z 7‡[̆p^Rh : Linuxserverinstallationandconfiguration,configurationplan.


3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Linuxserver Explain:Linuxserver Stepsfor
1) Useyumtoinstallthe
 installationand installationand installationand
Sambapackage
 configuration, configuration, configuration
2) Whileloggedonasroot,
 configurationplan. configurationplan.
createthenewdirectory
  
3) Changethepermissions
 
onthenewdirectory
 
4) Navigatetothenew
 
directory
5) Addthreeemptyfilesto
thedirectory
6) AddanewSambauser
7) Createanewsamba
group
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
x SambaisaLinuxserver
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN
*Explain:Linuxserverinstallationandconfiguration,configurationplan.
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
*Publicanddatadirectory,Hostfile.


113
 

114
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 100 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 56 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : publicanddatadirectory,Hostfile.
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutpublicanddatadirectory,Hostfile.
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Linuxserverinstallationandconfiguration,configurationplan.
z..z 7‡[̆p^Rh : Publicanddatadirectory,Hostfile.

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) Publicanddata Explain:Publicand Apublicfolderisafoldercreated Definitionof
 directory datadirectory toshareinformationwithothers. publicanddata
   Adatadirectoryisalist,table, directory
   orindexwhich 
   describesdatastoredina 
   computerorcomputerapplication, 
   suchasadatabase.Such 
   adirectoryincludesinformation 
   suchasthenameofthedata,and 
   itsattributes. 
    
2) Hostfile. Explain:Hostfile. Thehostsfileisacomputer Plaintextfile
 fileusedbyanoperatingsystemto 
 maphostnamestoIPaddresses. 
Thehostsfileisaplaintextfile,
andisconventionallynamedhosts.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
x The hosts file is one of several system facilities that assist in addressing network nodes in a computer
network.
x ThehostsfilecontainslinesoftextconsistingofanIPaddressinthefirsttextfieldfollowed byoneor
morehostnames.
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN
*Explain:Publicanddatadirectory.Æ Explain: Hostfile.
6. eap XJŽWs XhO : Yh`ap_ d\] : 05 i\iWN
SWAT

115


 

116
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵk aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 100 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 57 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵk5 Wh\ : SWAT
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutSWAT
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :Inpreviouschapterswehavelearnedabout
x Publicanddatadirectory,Hostfile.
z..z 7‡[̆p^Rh :
x SWAT

3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) SWAT Explain:SWAT Sambaweb
SambaisafreesoftwarereͲ
  administration
implementationof
tool
theSMB/CIFSnetworkingprotocol
Sambaprovidesfileandprintservicesfor
variousMicrosoftWindowsclientsand
canintegratewithaMicrosoftWindows
Serverdomain,eitherasaDomain
Controller(DC)orasadomainmember.

|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN


x Samba providesfileandprintservicesfor variousMicrosoft Windowsclientsand can integrate with a
MicrosoftWindowsServerdomain,eitherasaDomainController(DC)orasadomainmember

5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN


*Explain:SWAT
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
x passwordauthentication,telnet



117
 

118
CVs‡FD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW

dj_pZdȵ k aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4


˼° P : ICTSM iac] : ˼° P Tj]^Ž
ajD W5Z^ : 100 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 58 Ʌ.k 9.ȵ 5k Wh\ :
_pbWȵ 5k Wh\ : passwordauthentication,telnet
y. ȶ la½ Sq]h^Ž :
k / _pbWWh ӔSp Sh_j\T˜ : ToStudyaboutpasswordauthentication,telnet.
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ dˆeƗ] : DataandcommunicationnetworkingbyBehruzAforozon.

k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW :  Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ŽƥȻk :InpreviouschapterswehavelearnedaboutSWAT
z..z 7‡[̆p^Rh : now a days social web sites have a big market and hackers are also,so we need
protection from them. So in this lesson we are going to study about password authentication.
x passwordauthentication,telnet
3. iac] ^ȩk8S :  Yh`ap_ d\] : 90 i\iWN

7.W5. k
e°ȱB ̆ĕs IhajȿkX \hˆeSj ƨXsN eŽƛN
1) password Explain:password Theuseofpassword Definitionof
 authentication authentication authenticationisfurther Password
   weakenedbysoftwareattacks. authentication
   Passwordauthenticationlogging 
   softwareprogramsareembedded 
   inemailthatareactivatedby 
   clickingonthelinksintheemailor 
   byvisitingafakesitethatlookslike 
   thenormalcommercialsite 
2) Telnet Explain:Telnet Itisavirtualterminalprotocol Sessionlayer
whichallowstheusersonalocal protocol
hosttoremotelyaccessanother
hostasiftheywerelocally
attached.
|. dh^h5b / ȶkW^haS½W :  Yh`ap_ d\] : 10 i\iWN
x Inmostenterprises,theuseofpasswordsistheprimarymeansofauthenticatingauser.Unfortunately,itis
alsotheweakestformofauthentication.
x TelnetisasessionlayerprotocolusedontheInternetorlocalareanetworkstoprovideabidirectional
interactivetextͲorientedcommunicationfacilityusingavirtualterminalconnection.
5. 7\_jD^R 7Wp ƨahƚ]h] :  Yh`ap_ d\] : 05 i\iWN
*Explain:PasswordauthenticationÆ*Explain:Telnet
6. eap XJŽWs XhO :  Yh`ap_ d\] : 05 i\iWN
*SettingupaLANofatleast3PcsusingHUB/Switchandstructuredcabling.

119


 

120

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy