10 Jun 2020034833 PM
10 Jun 2020034833 PM
લે શ ન લાન
િનયામક
રોજગાર અને તાલીમ
ડૉ. વરાજ મહેતા ભવન
ગાંધીનગર
CVsFD Sh_j\ d5ƨTh ………………………. F: TRG :05
_jƨN BY _pbW
˼° P: ICTSM Ʌk.9.ȵk5 Wh\-
dp\pƨN^ W5Z^-4 dj_pZdȵ 5k ac½- 2017(NSQF)
5 DifferencebetweenInternetandInternet. 1Hrs
CommunicationMedia&connectors–unshielded
6 twisted–pair(UPT),shieldedtwistedpair(STP) 2Hrs
1
_pbW Yh`ap_ dj_pZdWs bjEaahWs
_pbWȵk5 Wh\
W5Z^ d\] ajD W5Z^ ajD W5Z^
21 Network security 2Hrs
87
22 Concept of dynamic Host control protocol. 2Hrs
Concept of internet architecture of Internet, DNS Server,
23 Internet Access Techniques, ISPs and examples 2Hrs
(Broadband/ Dialup/ WiFi).
Concept of social networking cites, video calling 88
24 2Hrs
&confrens ing
Concept of virus and its protections using antivirus, UTM
25 and firewall. 2Hrs
2
_pbW Yh`ap_ dj_pZdWs bjEaahWs
_pbWȵk5 Wh\
W5Z^ d\] ajD W5Z^ ajD W5Z^
3
4
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
5
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Computer Explain: Acomputernetworkisasysteminwhichmultiple networking
networking computers are connected to each other to share
Computer informationandresources.
networking
¾ Filescanbestoredonacentralcomputer(the
file server) allowing data to be shared
throughoutanorganization.
¾ Filescanbebackedupmoreeasilywhenthey
areallonacentralfileserverratherthanwhen
Advantagesof Explain: they are scattered across a number of
2) independentworkstations. Advantages
networking
Advantagesof
¾ Networksalsoallowsecuritytobeestablished,
networking
ensuringthatthenetworkusersmayonlyhave
accesstocertainfilesandapplications.
x Explain:Introductiontocomputernetworking
x Explain:Advantagesofnetworking.
*Typesofnetworktopologies:Ring,star,mesh,bus,tree,andhybrid.
6
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x Introductiontocomputernetworking
x Advantagesofnetworking.
z..z 7[̆p^Rh : whenwedoshoping,therearemultiplecompaniesoftheproducts.Eachhaveits advantages,but
wechoosethatonebestofforus.Similarly,computernetworkhasadifferentnetworkwithitsown
benefits.wehavetochoosebatteroneforus.SotodaywergoingtostudyaboutNetworktopology.
x Typesofnetworktopologies:Ring,star,mesh,bus,tree,hybrid.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
7
3) Ringtopology Explain: Intheringnetworktopology,the Ringtopology
ringtopology workstationsareconnectedina
closedloopconfiguration.
meshtopology workstationisconnecteddirectlyto
eachoftheothers.
treetopology ormorestarnetworksconnected
together.
x In communication networks, a topology is a usually schematic description of the arrangement of a network,
including its nodes and connecting lines. There are two ways of defining network geometry: the physical
topologyandthelogical(orsignal)topology.
x Explain:Bustopology
x Explain:Startopology
x Explain:Ringtopology
x Explain:Treetopology
x Explain:Meshtopology
x Explain:Hybridtopology
*Typesofnetworks:LAN,MAN,WAN.
8
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x Typesofnetworktopologies:Ring,star,mesh,bus,tree,hybrid.
z..z 7[̆p^Rh :
x Typesofnetworks:LAN,MAN,WAN.
9
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
x LANscanbebuiltwithrelativelyinexpensivehardware,suchashubs,networkadaptersandEthernet
cables.
x AMANislargerthanaLAN,whichistypicallylimitedtoasinglebuildingorsite.
x AWANcancontainmultiplesmallernetworks,suchasLANsorMANs.
x Explain:LAN
x Explain:MAN
x Explain:WAN
10
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x Typesofnetworks:LAN,MAN,WAN.
z..z 7[̆p^Rh :
x Ethernet,Internet,WiͲFi,Bluetooth,mobile,wiredandwirelessnetworks.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Ethernet Explain:Ethernet Asystemforconnectinganumberof Ethernet
computersystemstoformalocal systemsare
areanetwork,withprotocolsto 10BASEͲTͲ
controlthepassingofinformation transmission
andtoavoidsimultaneous speedsupto10
transmissionbytwoormore Mbps
systems.
2) Internet Explain:Internet Aglobalcomputernetworkproviding usesthe
avarietyofinformationand standard
11
communicationfacilities,consisting Internet
ofinterconnectednetworksusing Protocol
standardizedcommunication (TCP/IP).
protocols.
3) WiͲFi Explain:WiͲFi Afacilityallowingcomputers,smart supportupto30
phones,orotherdevicestoconnect usersarangeof
totheInternetorcommunicatewith 100–150feet
oneanotherwirelesslywithina indoorsand300
particulararea. feetoutdoors.
electronicdevices.
suspendedsoastoturnfreelyinthe
air.
cables. networks.
Awirelessnetworkisanytypeof
computernetworkthat
useswirelessdataconnectionsfor
connectingnetworknodes.
¾ The most commonwired networksuse cables connected to Ethernet ports on thenetworkrouter on one
endandtoacomputerorotherdeviceonthecable'soppositeend.
x Explain:Ethernet,Internet,WiͲFi,andBluetooth,mobile,wiredandwirelessnetworks.
12
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x Ethernet,Internet,WiͲFi,Bluetooth,mobile,wiredandwirelessnetworks.
z..z 7[̆p^Rh :
x Difference:InternetandIntranet
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Difference:Internet Explain: Internet
andIntranet Difference:Internet 1.Internetiswidenetworkof
andIntranet computersandisopenforall.
2.Internetitselfcontainsalarge
numberofintranets.
3.Thenumberofuserswhouse
internetisUnlimited.
4.TheVisitorstrafficisunlimited.
5.Internetcontainsdifferentsource
ofinformationandisavailableforall.
13
Intranet Intranet
1.Intranetisalsoanetworkof
computersdesignedforaspecific
groupofusers.
2.Intranetcanbeaccessedfrom
Internetbutwithrestrictions.
3.Thenumberofusersislimited.
4.Thetrafficallowedisalsolimited.
5.Intranetcontainsonlyspecific
groupinformation.
¾ InternetisawideN/Wopenforallunlimitedusersunlimitedtrafficcontaindifferentsources&available
forall
¾ Interamet:designedforspecificaccessinternetwithrestrictions,limitedusertrafficcontainandspecific
information.
x Explain:Difference:InternetandIntranet
*Communicationmediaandconnector:UTP&STP.
14
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x Communicationmediaandconnector:UTP&STP.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
15
2) STP(Shielded Explain:STP STP,atypeofcoppertelephone Shieldedtwisted
twistedpair): wiringinwhicheachofthetwo pair
copperwiresthataretwisted
togetherarecoatedwithan
insulatingcoatingthatfunctionsasa
groundforthewires.Theextra
coveringinshieldedtwistedpair
wiringprotectsthetransmissionline
fromelectromagnetic
interferenceleakingintooroutof
thecable.STPcablingoftenisused
inEthernetnetworks,especiallyfast
datarateEthernets.
¾ UTPcablesarefoundinmanyEthernetnetworksandtelephonesystems.
¾ ItconsistsofcolorͲcodedcopperwires,butdoesnotincludeanyfoilorbraidingasinsulatortoprotect
againstinterference
¾ STPislesssusceptibletonoiseascomparedtoUTPandthereforereducesthecrosstalkandinterference
x Explain:UTP&STP
16
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
1) ToStudyaboutfiberopticandcoaxialcable
2)TostudyaboutRJͲ45connectorandcolorcodefor568A&568Bcable.
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
17
2) Coaxialcable Explain:Coaxial layer,surroundedbyatubular
cable conductingshield.Manycoaxial
cablesalsohaveaninsulatingouter
sheathorjacket.
3) RJͲ45connector Explain:RJͲ45 ShortforRegisteredJackͲ45,an
eightͲwireconnectorusedcommonly
connector RJͲ11
toconnectcomputersontoalocalͲ
areanetwork(LAN), Exampleiswired
especiallyEthernets. telephone
4) Colorcodefor568A Explain:Colorcode Colorcodeof568ͲAcable:
&568Bcable. for568A&568B Pin WireColor
cable. 1 White/Green
2 Green
3 White/Orange
4 Blue
5 White/Blue
6 Orange
7 White/Brown
8 Brown
Colorcodeof568ͲBcable:
PinWireColor
1 White/Orange
2 Orange
3 White/Green
4 Blue
5 White/Blue
6 Green
7 White/Brown
8 Brown
18
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
_pbWȵ 5k Wh\ : Understanding colour codes of CATS cables 568A &568B convention.
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x Fiberopticsandcoaxialcable.
x colourconventionof568A&568B.
19
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs Ihajȿk X \heSj ƨXsN eƛN
x Provides better internet connectivity by colour code convention 568A & 568B
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:colorcodefor568A&568Bcable.
*Introductiontodatacommunication:analoganddigitalsignal.
20
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
Generally,thedatausabletoapersonorapplicationarenotinaformthatcanbetransmittedovera
network.Forexample,aphotographymustfirstbechangedtoaformthattransmissionmediacanaccept.
Transmissionmediaworkbyconductingenergyalongaphysicalpath.
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs Ihajȿk X \heSj ƨXsN eƛN
21
2) Analogsignal. Explain:Analog An analog or analoguesignal isany
signal continuoussignalforwhichthetime
varyingfeature(variable)of
thesignalisarepresentationof
someothertimevaryingquantity,
i.e.,analogoustoanothertime
varyingsignal.
3) Digitalsignal Explain:Digitalsignal Adigitalsignalisa
physicalsignalthatisa
representationofasequenceof
discretevalues(aquantified
discreteͲtimesignal),forexampleof
anarbitrarybitstream,orofa
digitized(sampledandanalogͲtoͲ
digitalconverted)analogsignal.
x Datacanbeanalogordigital.Analogdataarecontinuousandtakecontinuousvalue.Digitaldatahavediscrete
statesandtakediscretevalues.
x Signalscanbeanalogordigital.Analogsignalscanhaveaninfinitenumberofvaluesinarange;digitalsignals
canhaveonlyalimitednumberofvalues.
22
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x Introductiontodatacommunication:analoganddigitalsignal.
z..z 7[̆p^Rh :
x Typesoftransmissionmodes:simplex,halfduplexandfullduplex.
7.W5. k
e°ȱB ̆ĕs Ihajȿk X \heSj ƨXsN eƛN
23
2) simplexmode Givetheexamplefor InSimplextypeoftransmissionmode e.g.
unidirectionalmode datacanbesentonlythroughone loudspeaker
directioni.e.communicationis e.g.walkieͲ
unidirectional.Wecannotsendamessage talkie
backtothesender.Unidirectional
communicationisdoneinSimplex
Systems.
3) Halfduplexmode Differentbetween Inhalfduplexsystemwecansenddatain e.g.mobile
simplex&half bothdirectionsbutitisdoneoneata phone
duplex. timethatiswhenthesenderissending
thedatathenatthattimewecan’tsend
thesenderourmessage.Thedataissent
inonedirection.
4) Fullduplexmode Infullduplexsystemwecansenddatain
bothdirectionsasitisbidirectional.Data
canbesentinbothdirections
simultaneously.Wecansendaswellas
wereceivethedata.
Transmissionmodemeanstransferringofdatabetweentwodevices.Itisalsocalledcommunicationmode.These
modesdirectthedirectionofflowofinformation.Therearethreetypesoftransmissionmode.Theyare:
x SimplexMode
x HalfduplexMode
x FullduplexMode
x Explain:Typesoftransmissionmodes:simplex,halfduplexandfullduplex.
*OSImodelandfunctionofeachlayer.
24
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
25
Datalinklayer FunctionofDatalink theproceduresandfunctionthat responsiblefor
layer? physicaldevices thedeliveryofa
messagefrom
oneprocessto
another
Networklayer FunctionofNetwork ThedatalinklayerprovideserrorͲ responsiblefor
layer? freetransferofdataframesfrom translation,
onenodetoanotheroverthe compression,
physicallayer,allowinglayersabove andencryption
ittoassumevirtuallyerrorͲfree
Functionof transmissionoverthelink.
Transportlayer? Thenetworklayercontrolsthe
operationofthesubnet,deciding
whichphysicalpaththedatashould
takebasedonnetworkconditions,
priorityofservice,andotherfactors.
Transportlayer FunctionofSession .Thetransportlayerensuresthat responsiblefor
layer? messagesaredeliverederrorͲfree,in providing
sequence,andwithnolossesor servicestothe
duplications.Itrelievesthehigher user
Sessionlayer Functionof layerprotocolsfromanyconcern
Presentationlayer? withthetransferofdatabetween
themandtheirpeers.
Thesessionlayerallowssession
Presentationlayer Functionof establishmentbetweenprocesses
Applicationlayer? runningondifferentstations.
Thepresentationlayerformatsthe
Applicationlayer datatobepresentedtothe
applicationlayer.Itcanbeviewedas
thetranslatorforthenetwork.
Theapplicationlayerservesasthe
windowforusersandapplication
processestoaccessnetwork
services.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x TheOpenSystemsInterconnect(OSI)modelhassevenlayers.Thisarticledescribesandexplainsthem,
beginningwiththe'lowest'inthehierarchy(thephysical)andproceedingtothe'highest'(theapplication).
Thelayersarestackedthisway:
x Application
x Presentation
x Session
x Transport
x Network
x DataLink
x Physical
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
x Explain:OSImodelandfunctionofeachlayer.
x DrawtheOSImodel
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
*Networkcomponents:Modem,firewall,hub
26
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x OSImodelandfunctionofeachlayer.
z..z 7[̆p^Rh :
Networkcomponents:Modem,firewall,hub.
27
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
¾ ActingasabarrierbetweenatrustednetworkandotheruntrustednetworksͲͲsuchastheInternetͲͲor
lessͲtrustednetworksͲͲsuchasaretailmerchant'snetworkoutsideofacardholderdataenvironmentͲͲa
firewallcontrolsaccesstotheresourcesofanetworkthroughapositivecontrolmodel.
x Explain:Networkcomponents:Modem,firewall,hub.
*Explainuseandfunctionof:gateway,repeater,transceiver.
28
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x Explainuseandfunctionof:gateway,repeater,transceiver.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
29
asitisinitsoriginalstrengthovera
oneormoreothercablesegment.
atransceiver
3) Transceiver Explain:transceiver Thetermtransceiverdoesnot getsitsname
necessarilydescribeaseparate
frombeingboth
networkdevicebutratheran
atransmitter
integratedtechnologyembeddedin
devicessuchasnetworkcards. andareceiver
¾ A gateway is an essential feature of mostrouters, although other devices (such as any PC or server) can
functionasagateway.
¾ ThenumberofrepeatersthatcanbeusedintandemisgenerallylimitedbyaparticularLAN
implementation.
x Explain:Explainuseandfunctionof:gateway,repeater,andtransceiver.
*typesofSwitches,AccesspointsAnditsadvantagesand Applications.
30
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
31
Accesspoint Accesspoint accesspointisadevicethatallows Betweenwired
wirelessdevicetoconnecttoa Network&
wirednetworkusingWiͲFiorrelated Devicesor
standard. Peripherals.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ SwitchprovidesbridgingFunctionality&normallyhavebufferfortheeachlink.
¾ AccesspointisadevicethatallowsconnectingtoaWiredNetwork.
*Gathermoreinformationaboutswitchesandaccesspoint.
*IPRoutinginNetwork&RIP,IGRP.
32
˼° P:ICTSM iac]:˼°PTj]^
ajDW5Z^:85 Yh`ap_d\]:120i\iWN
_pbWȵk5 Wh\:IPROUTINGINNETWORK:RIP,IGRP
y.ȶ la½Sq]h^:
k /_pbWWhӔSpSh_j\T:ToStudyaboutiproutinginnetworkRip,igrp.
y..y_pbWWhe°ȱB
y..zdhVWs:chalk,duster,markerpen
y..3d5U[½deƗ]:DataandcommunicationnetworkingbyBehruzAforozon.
k V
z.̆ƨShaWh/ȶ lah½ȵd 5 hW: Yh`ap_d\]:10i\iWN
z..yd\jëh/^ƥȻk:InpreviouschapterwelearnedaboutSwitches,Accesspointtheirtypes,Functions&
Advantages.
z..z7[̆p^Rh:wheninformationflowsfromoneroutertoanotherrouterwewilldeterminethepathfrom
routingprotocolslike:ripigrpetc.
33
3.iac]^ȩk8S:Yh`ap_d\]:90i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX\heSj ƨXsNeƛN
¾ The most used distance – vector routing protocol are: rip& igrp.
*DeterminethemainfunctionsofRIP&IGRP
6.eapXJWsXhO:. Yh`ap_d\]:0i\iWN
*Protocol:TCP,IP,FTP,telnet
34
CVsFDSh_j\d5ƨTh..........................F: TRG : 06
_pbW Ɯ_hW
˼° P:ICTSM iac]:˼°PTj]^
ajDW5Z^:86 Yh`ap_d\]:120i\iWN
_pbWȵk5 Wh\:protocols,TCP/IP/FTP/Telnet
y.ȶ la½Sq]h^:
k /_pbWWhӔSpSh_j\T:Tostudyaboutprotocols,TCP/IP/FTP&Telnet
y..y_pbWWhe°ȱB
y..zdhVWs:Blackboard/chalk/duster
y..3d5U[½deƗ]:Datacommunication&networkingbybehrouzaforozoun
k V
z.̆ƨShaWh/ȶ lah½ȵd 5 hW: Yh`ap_d\]:10 min
z..yd\jëh/^ƥȻk:inpreviouschapterwehavelearnedaboutIPROUTINGINNETWORK:RIP,IGRP
z..z7[̆p^Rh:whatisthebasicfunctionofprotocol&whichprotocolisusedwherearethemaintopicswewill
discussinthischapter.
3.iac]^ȩk8S: Yh`ap_d\]:90min
7.W5. k
e°ȱB ̆ĕs IhajȿkX\heSj ƨXsNeƛN
35
5) telnet(terminal Explain:tenet Itisavirtualterminalprotocolwhich Remotely
network) allowstheusersonalocalhostto accessthe
remotelyaccessanotherhostasif computeron
theywerelocallyattached. othernetwork
|.dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 min
protocolisasetofrulesthatgoverndatacommunication.
Ͳ>TCPisconnectionorientedprotocol.
Ͳ>IPhastaskofdeliveringpacketsfromsourcedestinationwhileFTPtransferfilesfromonehosttoanother.
Ͳ>Telnetisusedtoaccesscomputeronothernetwork.
*GathermoreinformationabouttheTCP,IP,andFTP&TELNETanddiscussitwithtourclassmates.
6.eapXJWsXhO: Yh`ap_d\]:05min
*TheoryonsettingIPaddress,IPV4,IPV6,SUBNETMASK,CLASSESofIPaddressing.
36
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
ajDW5Z^:86 Yh`ap_d\]:120i\iWN
_pbWȵ5k Wh\:TheoryonsettingIPaddress(IP4/IP6),SubnetmaskclassesofIPaddressing.
y.ȶ la½Sq]h^:
k /_pbWWhӔSpSh_j\T:TostudyTheoryonsettingIPaddress(IP4/IP6),Subnetmask
y..y_pbWWhe°ȱB
classesofIPaddressing.
y..zdhVWs:Blackboard/chalk/duster
y..3d5U[½deƗ]:Datacommunication&networkingbybehrouzaforozoun
k V
z.̆ƨShaWh/ȶ lah½ ȵd 5 hW: Yh`ap_d\]:5min
z..yd\jëh/^ƥȻk:Inpreviouschapter,wehavestudiedaboutthevariousprotocolslikeTCP,IP,FTPand
telnet.InthischapterwewillstudyaboutIPaddressindetail.
z..z7[̆p^Rh:FirstofallwewillrevisethedefinitionofIPaddressandthenwewillstudyaboutclassesofit
andsubnetmask.
3.iac]^ȩk8S: Yh`ap_d\]:90min
7.W5. k
e°ȱB ̆ĕs IhajȿkX\heSj ƨXsNeƛN
37
3) ClassesofIP Explainindetail: TheIPaddressisapairof Thedifferentbits
address ClassesofIP Identifiers(netid,hostid). definestheclass
address ThedifferentclassesofIP ofIPdatagram.
addressesare:Ͳ
ClassAͲ0ͲnetidͲhostid
ClassBͲ1Ͳ0ͲnetidͲhostid
ClassCͲ1Ͳ1Ͳ0ͲnetidͲhostid
ClassDͲ1Ͳ1Ͳ1Ͳ0Ͳmulticast
address
ClassEͲ1Ͳ1Ͳ1Ͳ1ͲReservedFor
Future
4) Subnetmask Explainindetail Thesubnetmaskaredependon Differentclasses
about:Subnet thedifferentclasshavethe havethe
mask differentSubnetmask. differentsubnet
SubnetmaskForClassesare:Ͳ mask.
ClassA:Ͳ255.0.0.0
ClassB:Ͳ255.255.0.0
ClassC:Ͳ255.255.255.0
|.dh^h5b/ȶkW^haS½W: Yh`ap_d\]:10min
¾ IPaddressisa32bitaddressthatisusedtodefineyourdeviceinnetwork.
¾ VersionofIPaddressareIPv6&IPv4thataredefinesinfirstfieldofdatagram.
¾ TherearevariousclassesofIPaddressingandsubnetmaskisdecidedonthebasisofclassofIP
address.
5.7\_jD^R7Wpƨahƚ]h]: Yh`ap_d\]:05min
*GathermoreinformationabouttheIPaddressanddetailedinformationaboutclassesofIPaddress.
6.eapXJWsXhO: Yh`ap_d\]:05min
*VLAN,VLANmembership,identifyVLAN,trunkingVLAN,VTP.
38
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k / _pbWWh ӔSp Sh_j\T :ToStudyaboutVLAN,VLANmembership,identify VLAN,
y..y _pbWWh e°ȱB
trunkingVLAN,VTP.
y..z dhVWs :chalk,duster,markerpen
y..{ d5U[½ deƗ] :DataandcommunicationnetworkingbyBehruzAforozon.
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
39
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
*Explain:VLAN,VLANmembership,identifyVLAN,trunkingVLAN,VTP.
40
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
˼° P:ICTSM iac]:˼°PTj]^
ajDW5Z^:86 Yh`ap_d\]:120i\iWN
_pbWȵ5k Wh\::conceptoftranslatorgateways.
y.ȶ la½Sq]h^:
k /_pbWWhӔSpSh_j\T:tostudyaboutconceptoftranslatorgateways…
y..y_pbWWhe°ȱB
y..zdhVWs:blackboard,chalk,duster
y..3d5U[½deƗ]:ͲWikipedia
k V
z.̆ƨShaWh/ȶ lah½ȵd 5 hW:Yh`ap_d\]:10min
z..yd\jëh/^ƥȻk: VLAN,VLANmembership,identifyVLAN,trunkingVLAN,VTP.nowwewilldiscussedabout
conceptoftranslatorgatewayinthischapter
z..z7[̆p^Rh:Ͳwhatisgateway?Whatisthemainfunctionuseofgateway?Discussingabouttranslator
gateway..
3.iac]^ȩk8S:Yh`ap_d\]:90min
7.W5. k
e°ȱB ̆ĕs IhajȿkX\heSj ƨXsNeƛN
1) Translator Explainabout Agateway isaprotocolconverter..
gateway translatorgateway Protocol
Agatewaycanacceptsapacket
converter
formattedforoneprotocol&
convertittoapacketformattedfor
anotherprotocolbefore
Forwardingit
Agatewayisgenerallysoftware
installedwithinarouter.
|.dh^h5b/ȶkW^haS½W:Yh`ap_d\]:10min
¾ Agatewayisbasicallyaprotocolconverteritconvertstheprotocolwhichisconvenientbefore
forwardingit..
5.7\_jD^R7Wpƨahƚ]h]:Yh`ap_d\]:10min
*Gathermoreinformationabouttranslator gateway…
6.eapXJWsXhO:Yh`ap_d\]:120min
*SMTP,TELNET,FTP,HTTP,SNMP.LDA.
41
42
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
43
4. SNMP(simple Explain:SNMP Snmpisapartofstandard Helpsin
network frameworksfornetwork exchangingthe
management managementitallowsanadminto management
protocol) store&retrievethevaluesinan information
objectdefinedinanagent. between
networking
equipments.
5. LDAP(lightweight Explain: Asthenamesuggests,itisalight Client–server
directoryaccess LDAP weightclient–server. protocoltor
protocol) Protocolforaccessingdirecting accessing
servicesspecificallyx.500Ͳbased directing
directoryservices. services.
6. HTTP(hypertext Explain: Itisanapplicationprotocolfor Protocolused
transferprotocols) HTTP distributed,collaborative,hyper fortransfer
mediainformationsystems. hypertext.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ Wehavestudiedabouttheusesofthegivenprotocols.
¾ Thedifferentnetworkusesthedifferentprotocols.
*Networksecurity.
44
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1 Networksecurity Explainindetail– Networksecurityconsistsofthe Anyactivity
networksecurity provisionsandpoliciesadoptedbya designedto
networkadministertoprevent& protocolyour
monitorunauthorizedaccess, network.
misuse,notification
Ordenialofacomputernetwork
andnetworkaccessibleresources.
Anetworksecuritysystemusually
consistsofmanycomponentswork
togetherwhichminimizes
maintenance&improvessecurity
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 15min
¾ Nowadaysthehackersbecamesoactivesothatwehavetoimproveoursecuritytosaveourpersonal
oursecuritytosaveourisimportantpointaboutthis
45
46
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵk aco : 2017(NSQF) dp\pƨN^ W5Z^ : y
˼°P : ICTSM iac] : ˼°P Tj]^
ajD W5Z^ : 87 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ :22 Ʌk.9.ȵk5 Wh\ : DEVEN SIDDHPURA
_pbWȵk5 Wh\ : concept of DHCP.
y. ȶ la½ Sq]h^ :
k /_pbWWhӔSpSh_j\T:tostudyaboutconceptofDynamicHostControlProtocol.
y..y_pbWWhe°ȱB
y..zdhVWs:BlackBoard,Choke,Duster
y..{d5U[½deƗ]:DataCommunication&NetworkingByBehrouzA.Forouzan
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 15 i\iWN
z..yd\jëh/^ƥȻk:InPreviousChapterWehavestudiedaboutNetworkSecurity
z..z7[̆p^Rh:whatisDHCPandHowitsWorksandtheUsesOfDHCPwilldiscusseinthischapter.
7.W5. k
e°ȱB ̆ĕs IhajȿkX\heSj ƨXsNeƛN
1. Dynamichost WhatistheDHPC? DHCPextendsbootin 2ways.First HelpstoobtainanIP
controlprotocol. ofall,itallowsacomputerto addressquickly&
acquirealltheconfiguration Dynamically.
informationitrequiresinasingle
message.
Secondly,DHCPhelpstoobtain
anIPaddressquicklyDynamically.
3typesofaddressallocation
allowedinDHCP:Ͳ
1ͲManualConfiguration
2ͲAutomaticConfiguration
3–DynamicConfiguration
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 15 i\iWN
- ThemainuseofDHCPistoobtainIPaddressquicklyanddynamically.
- 3Typesofaddressallocation:ͲManual,Automatic&DynamicConfiguration.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
- WriteashortnotetheDynamichostControlProtocol?
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
Conceptofinternet&ArchitectureOfInternet.
47
48
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z.̆ƨShaWh/ȶ lah½ ȵd 5 hW:Yh`ap_d\]:10min
z..yd\jëh/^ƥȻk:WehavestudiedaboutDHCP&otherprotocolinpreviouschapter.Nowwewillstudy
aboutInternet&itsarchitecture.
z..z7[̆p^Rh:NowadaysinternetisadailyuseThings.Wewillstudyindetailinthischapter.
3.iac]^ȩk8S:Yh`ap_d\]:90min
7.W5. k
e°ȱB ̆ĕs IhajȿkX\heSj ƨXsNeƛN
1. Internet Explainaboutthe In1982,TheInternetprotocol Fullyinterconnectted
conceptof suite(TCP/IP)wasstandardized Network
Internet. andtheconceptofaword–wide
networkoffullyinterconnected
YCP/IPnetworkcalledInternet
wasintroduced.
2. Architectureof Explainabout ByDefinition,itisametanetwork
Internet Architectureof ,aConstantlychangingcollection
Internet ofThousandsofindividual
networkinterCommunication
withacommonprotocol.
x Functiontoberequired:Ͳ
x Dataformatting
x Addressing
x Routing
x Forwarding
x ErrorRecovery
|.dh^h5b/ȶkW^haS½W:Yh`ap_d\]:10min
¾ Shortly,theinternetmeansthefullyinterconnectedNetwork.
¾ Dataformatting,Addressing,Routing,Frwrding,ErrorRecoveryarethefunctionofinternetArchitecture.
5.7\_jD^R7Wpƨahƚ]h]:Yh`ap_d\]:05min
Draw&explaininternetArchitecture.
6.eapXJWsXhO:Yh`ap_d\]:05min
¾ Conceptofsocialnetworkingsites,videocalling&conferencing.
49
50
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵkaco:2017(NSQF) dp\pƨN^W5Z^:y
˼°P:ICTSM iac]:˼°PTj]^
ajDW5Z^:88 Yh`ap_d\]:120i\iWN
_pbWW5Z^:24 Ʌk.9.ȵk5 Wh\:
_pbWȵk5 Wh\:Concept of Social Networking Sites & video Calling & Conferencing
y.ȶ la½Sq]h^:
k /_pbWWhӔSpSh_j\T:1.StudyabouttheconceptofsocialNetworkingSites
y..y_pbWWhe°ȱB
2.VideocallingandConferencing.
y..zdhVWs:BlackBoard,Choke,Duster
y..{d5U[½deƗ]:1:www.google.com
2.www.techopedia.com
k V
z.̆ƨShaWh/ȶ lah½ ȵd 5 hW:Yh`ap_d\]:10i\iWN
z..yd\jëh/^ƥȻk:WehavestudiedaboutInternet&It’sarchitectureinpreviouschapter.
z..z7[̆p^Rh:ToDays,socialnetworkingsiteisabasicneedofhumanbeing.Wewillstudyaboutit.
3.iac]^ȩk8S:Yh`ap_d\]:90i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX\heSj ƨXsNeƛN
.1 SocialNetworking Explainindetail Asocialnetworkingwebsiteisan Allowsuserstocreate
Site. aboutconceptof onlineplatformthatallowsusers publicprofile&
socialnetworking tocreateapublicprofile& internetwithother
site. internetwithotheruserson useronwebsite.
website.
E.G.Facebook,Twitter,Orkut,
MySpace.
Videocallingand ExplaininDetail VideoCalling:ͲSimplydefinedas VisualCommunication
2 conferencing about:Video avisualcommunicationbetween between2people.
callingand 2People.
conferencing VideoConferencing:Ͳ Communication
ItImpliessupportformorethan betweenmorethan2
twopartiescommunicating people
simultaneously. simultaneously.
|.dh^h5b/ȶkW^haS½W:Yh`ap_d\]:10i\iWN
Ͳ Socialnetworkingwebsitehavebecomeverybasicneedofhumanbeingnowadays
- Avisualcommunicationbetween2peopleisvideocalling&videoconferencingsupportmorethan2
parties,communicationsimultaneously.
5.7\_jD^R7Wpƨahƚ]h]:Yh`ap_d\]:05i\iWN
- Explainvideocalling&VideoConferencing.
6.eapXJWsXhO:Yh`ap_d\]:05i\iWN
x Conceptofvirus&It’sprotectionsusingantivirus,UTMandFirewall
51
52
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1. virus Explain:virus Acomputervirusisaprogramor Pieceofcode
pieceofcodethatisloadedonto thatvery
yourcomputerwithoutyour harmfulfor
knowledgeandrunsagainstyour computer
wishes.
2. antivirus Explain:antivirus Antivirussoftwareisaclassof Actasa
programthatwillprevent,detect between
andremediateMalwareinfections trustednetwork
onindividualcomputingdevices&it &other
system. untrusted
network.
53
Itisanapproachtosecuritymgmt
3. UTM(unifiedthreat Explain:UTM( thatallowsanadministratorto
management) UnifiedThreat monitor&manageawidevarietyof
Management) securityrelatedapplications&
infrastructurecomponentsthrough
asinglemgmtconsole.
4. Firewall Explain:firewall Firewallisanetworksecuritysystem
eitherhardwareorsoftwarebased
thatcontrolsincoming&outgoing
n/wtrafficbasedonasetofrules.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 min
¾ Virusesarethemanmadeprogramthatwilleasilyharmyourcomputer.Antivirusisaprogramthat
detectsviruses&removesit.
¾ Whereastheutm&firewallarealsousedforthesecuritypurpose
*whatisviruses&antivirus?
WhatisUTM&firewall?
x Collaboratingusingwired&WirelessNetworking.
54
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x Collaboratingusingwirednetwork
x Collaboratingusingwirelessnetwork
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
55
revolutionizedmobilecomputing.
Wirelessnetworkingmeansthat
mobileuserscansqueezemorework
timeoutoftheirday,andit
significantlyenhancestheirqualityof
life.
x UserDataProfiledescribesthestateofauserinvolvedincollaboration,capturingthepreferences,
capabilitiesandsystemstateofuserenvironment.
x WirelessnetworkingisbetterwithWindowsXP.Forexample,WindowsXPreduceswirelessdeployment
costsviaautomaticconfiguration.
Gathermoreinformationaboutwiredandwirelessnetworks.
Protectinganetwork,Networkperformancestudyandenhancement.
56
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k / _pbWWh ӔSp Sh_j\T :studyofprotectinganetwork,networkperformancestudy&
y..y _pbWWh e°ȱB
enhancement
y..z dhVWs :blackboard,chok,duster
y..3 d5U[½ deƗ] :Ͳwww.googal.com
ͲWikipedia
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
wehavestudiedaboutcollaboratingthewired&wirelessnetwork.wewillstudyabouttheprotectinganetwork
inthischapter
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Protectinga Howtoprotectour Ifyouhaveaseverbasednetwork, Protectour
network network??? it‘scriticallyimportanttoprotect networkby
yourseverfromhackers,viruses& virusworms&
othermalicioussoftware.Wecan malicious
protectournetworkbyantivirus, software.
firewall,UTMetc.
57
2) Network Whatisnetwork Networkperformancerefersto
Measureof
performance performance??? measuresofservicequalityofa
servicequality
telecommunicationproductasseen
bythecustomer.
3) enhancement Whatwillbethe Wecanenhanceournetwork
Cloud
enhancementin performancebyusingcloud
computing
network computingasitprovidethe
performance??? transparentservicetousers
¾ Toprotectournetwork,wewillusetheantivirus,firewall&utmetc.
¾ Thenetworkperformancereferstomeasuresofserviceofquality
- Whatisnetworkperformance&itsenhancement?.
Surveillanceusingnetworkdevices,collaborationonnetworkforteamoptimization&supportactivitiesremote
managementofdevices.
58
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x Surveillanceusingnetworkdevices
x Collaborationonnetworkforteamoptimizationandsupportactivities
x Remotemanagementofdevices
59
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Surveillanceusing Explain: Surveillance isthemonitoringof Monitoring
networkdevices Surveillanceusing thebehavior,activities,orother behavior
networkdevices changinginformation,usuallyof
peopleforthepurposeof
influencing,managing,directing,or
protectingthem.
2) Collaborationon Explain: CollaborationOptimizationServices
networkforteam Collaborationon employsacomprehensiveapproach comprehensive
optimizationand networkforteam towardassessment, approach
supportactivities optimizationand recommendation,andrefinementof
supportactivities yourkeyareasformanagingyour
CollaborationSolution
SNMPbasedcontrolandmonitoring
3) Remote Explain: ofremotenetworkdevicesisa
managementof Remote valuabletoolforalmostany
devices managementof networkadministrator.SNMPallows
devices youtoreviewstatus,change
configurationparameters,edituser
privilegesandcontroloperating
functionsatremoteunitsviaSNMP
commands.
x Surveillanceincludesobservationfromadistancebymeansofelectronicequipment(such
asCCTVcameras)orinterceptionofelectronicallytransmittedinformation(suchasInternettrafficor
phonecalls).
x AuditsandAssessments,OptimizationSupport,OperationsManagement,KnowledgeandLearningare
thebasicservicesprovidedbyteamoptimization.
x SNMPtrapsprovideanincrediblyhelpfulmeanstoalertnetworkmanagerswhenundesirable
conditionsaredetectedatremotesites.
*Surveillanceusingnetworkdevices,collaborationonnetworkforteamoptimizationandsupport
activities,remotemanagementofdevices.
60
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Surveillanceusingnetworkdevices.
z..z 7[̆p^Rh : in this chapter we are going to learn about
x remotemanagement.
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Remote Explain:Remote Remote Management is managing a Management
managementof managementof computer or a network from a activites.
devices. devices. remotelocation.Itinvolvesinstalling
software and managing all activities
of the systems/network,
workstations,serversorendpointsof
aclient,fromaremotelocation
*modernnetworksecuritythreats.
61
62
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 min
63
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 min
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1. Networksecurity Explainindetail: Thebasicsecuritythreatsnowadays Modernthreats
threats Networksecurity are:Ͳ are:denialof
threats. _compromisedͲkeyattack service,
_networkdenialͲofͲserviceattack Evesdropping
_evesdropping(sniffingsnooping) viruses&
_identityspooting wormsetc.
_manͲinͲthe–middle
_ReplayAttack
_Viruses&Worms
2. Basicsofnetwork Explainindetail Thereareexactly2keysto Tasksof
security basicsofnetwork informationsecurity: network
security 1)Configurethesystem&network security:
correctly&keepitthatway. protection,
2)Knowthetrafficcominginto&out detection,
ofyournetwork. reaction
¾ Allthetasksthathavetobedo
neinnetworksecuritybreak
downinto3phasesorclasses:
1) Protection
2) Detection
3) Reaction
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
Wehavestudiedaboutmodernsecuritythreatslikedenialofserviceinthischapter&alsostudiedaboutbasicsof
Networkofsecurity.
Explainaboutmodernsecuritythreats&howitisspreadedovernetwork.
x SecureAdministrativeAccessAndLANsecurityconsiderations
64
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k / _pbWWh ӔSp Sh_j\T: TostudyaboutLANsecurityconsiderations.
y..y _pbWWh e°ȱB
y..z dhVWs :Blackboard,chalk,duster
y..3 d5U[½ deƗ] :www.google.com
ͲWikipedia
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10min
65
3. iac] ^ȩk8S : Yh`ap_ d\] :90min
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) LANsecurity Explainindetail: TherearevariousLANsecurity Modernthreats
consideration. LANsecurity considerations,like, are:denialof
consideration. ¾ Topologyandarchitecture service,
¾ Securingroutersand Evesdropping
switches viruses&
¾ Designandaccesslists
wormsetc.
¾ VLANS
¾ Spanningtreeloops.
¾ Documentyournetwork
andkeepitmaintained.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10min
¾ Thenetworksecurityconsiderationareveryfirstthingtokeepinmindforsecuringanetwork,the
basickeytermswehavestudiedinthischapter&gathermoredetailedinformationaboutit.
x GathermoreinformationaboutLANsecurityconsideration.
x NetworksecuritydevicesandCryptography
66
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵk aco:2017(NSQF) dp\pƨN^ W5Z^ :1
˼°P :ICTSM iac] :˼°P Tj]^
ajD W5Z^ :91 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ :32 Ʌk.9.ȵk5 Wh\:
_pbWȵk5 Wh\ :Networksecuritydevices,Cryptography.
y. ȶ la½ Sq]h^ :
k / _pbWWh ӔSp Sh_j\T: TostudyaboutLANsecurityconsiderations.
y..y _pbWWh e°ȱB
y..z dhVWs :Blackboard,chalk,duster
y..3 d5U[½ deƗ] :www.google.comͲWikipedia
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10min
z..yd\jëh/^ƥȻk:inpreviouslessonwestudiedabtSecureAdministrativeAccessAndLANsecurityconsiderations
z..z7[̆p^Rh::whicharethenetworksecuritydevices,ͲCryptography
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Networksecurity Explain:Network TherearevariousLANsecurity Firewalls,
devices securitydevices considerations,like, antivirus,VPNs,
x Firewalls antispyware,
x Antivirus Antispam
x VPNs
x Antispyware
x Antispam
2) Cryptography Explain:Cryptography. Cryptographyisamethodofstoringand Secretdatato
transmittingdatainaparticularformso secretuser
thatonlythoseforwhomitisintended
canreadandprocessit.
Objectives:
x Confidentiality
x Integrity
x NonͲrepudiation
x Authentication
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10min
x Cryptographyisamethodofstoringandtransmittingdatainaparticularformsothatonlythosefor
whomitisintendedcanreadandprocessit.
x ExplainNetworksecuritydevicesandCryptography.
67
68
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k / _pbWWh ӔSp Sh_j\T :TostudyaboutWiͲFisecurityconsideration.
y..y _pbWWh e°ȱB
y..z dhVWs :blackboard,chok,duster
y..3 d5U[½ deƗ] :Ͳwww.google.com
ͲWikipedia
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :A consideration on any computer N/W, security is especially inpartanatonwifiwirless
N/Woveropenanconnectionandextractintolikepassword&creditcardnetworksotodaywestudyaboutwifi
securityconsideration.
x Wirelesssecurity
x Wirelesssecurityconsiderations
69
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
¾ Securitymethodprevated
on2007
¾ AsurBabletoaddnew
devicestotheirN/Wby
simplypusingabutton
&thentyping8Ͳdigitpinon
clientdevice.
¾ Toprotectournetwork,wewillusetheantivirus,firewall&utmetc.
¾ Don’tuseWEPwhichBeasytocreak
¾ Don’tuseWPA,unlesslegacydevicesanyonenewrequireit.
¾ Don’tuseWPS,whichcaneasilybebruteforced
¾ DouseWPAwithastrangepassphrase
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
- GathermoreinformationabouttheWiͲFisecurityconsiderations.
ServerConcepts,ServerHardware,InstallationSteps,ConfigurationOfServer
70
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x ServerConcepts
x ServerHardware
x InstallationSteps
x Configuration
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
71
3) InstallationSteps WhatArethesteps Installationsteps:
ForInstallingServer? 1) InstallPerl
2) DecompressFiles
3) CreateFolders
4) SetAccessPermissions
5) MoveFiles
6) RegisterVirtualDirectory
7) SettingForRunningCGI
Script
8) RegisterDefaultContent
Pages
9) Confirmation&Access
ControlSetting
ToConfigureAWebServerOrAn
4) Configurationof HowCanWe Configureaweb
ApplicationServerThatUsesBITS
Server ConfigureAServer? server
Protocol,YouMustInstallThe
Insmallletter
BranchCacheFeatureUsingServer
Manager.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ ServerIstheBasicNeedforAllWebBasedApplication.
*WhatIsServer?
*WhichHardwareComponentsAreNeededForServer?
*WhatAreTheStepsForInstallingServer?
*HowCanWeConfigureAServer?
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
*ADSoverview,ADSdatabase,Activedirectorynamespace,Logicalandphysicalelements ofAD.
72
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
2.adsdatabase
3.activedirectingnamespace
4.logical&physicalelementsofad
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
73
3 Explain;active Activedirectorynamespace
Activedirecting
directing providesahighlevelabstracting
namespace
namespace.. objectmodalthatbasicaround
Microsoftactivedirectingservice
task
4 Logicaland Explain;logical& Thelogicalpartsofadincludes Provideshigh
physicalelements physicalelementsof forests,tress,domains,ous&global levelabstraction
ofad. ad. catalog..thephysicalstructureof
adhelpstomangebetweenservers,
withrespecttodirectorytwo
elements:controllers,sites
- Basicstudyofactivedirectingservice.
- Implementationofactivedirectingthatprovideauthentication&authorization.
- Adsoverview
- Adsdatabase
- Activedirectingnamespace
- Logical&physicalelementsofad…..
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
Conceptofdns,dnsnameresolution–hostnames ,netblosnamednsoverview….
74
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x DNSConcept
x DNSnameresolutionͲhostname,NetBIOSname
x DNSoverview
75
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) DNS(Domain WhatIsDNS? Domain Name System (or Service or Server), Onetypeof
namesystem) anInternetservicethattranslatesdomain translator
namesintoIPaddresses.
2) DNSResolution WhatisDNS DNSnameresolutionisnothingbut Resolvinghost
resolution? resolvinghostnames,suchas names
www.nixcraft.com,totheircorresponding
IPaddresses.
3) Hostnameand Explain:Host Hostnameresolutionmeanssuccessfully Hostname
netBIOSname nameandnetBIOS mappingahostnametoanIPaddress.A resolution
resolution nameresolution hostnameisanaliasthatisassignedtoan
IPnodetoidentifyitasaTCP/IPhost.
NetBIOSnameresolutionmeans NetBIOSname
successfullymappingaNetBIOSnametoan resolution
IPaddress.ANetBIOSnameisa16Ͳbyte
addressthatisusedtoidentifyaNetBIOS
resourceonthenetwork.
DomainNameSystem(DNS)isasystemfor systemfor
4) DNSOverview Explain:DNS namingcomputersandnetworkservices naming
overview thatisorganizedintoahierarchyof computersand
domains.DNSnamingisusedinTCP/IP network
networks,suchastheInternet,tolocate services
computersandserviceswithuserͲfriendly
names.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
DNSissystemfornamingcomputersandnetworkservices.TwotypesofDNSnameresolution:
1)Hostnameresolution
2)NetBIOSnameresolution
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*WhatIsDNS?*WhatisDNSresolution?Explainitstypes. *GivebriefdescriptionofDNSoverview.
*DHCPoverview,DHCPclientsandleases.
76
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x DHCPoverview
x DHCPclients
x leases
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
77
3) DHCPleaseprocess Explain:DHCPlease ADHCPͲenabledclientobtainsa
process leaseforanIPaddressfromaDHCP
server.Beforetheleaseexpires,the
DHCPservermustrenewthelease
fortheclientortheclientmust
obtainanewlease.Leasesare
retainedintheDHCPserver
databaseapproximatelyoneday
afterexpiration.
Youcanalsoprovidetheadditionalconfigurationparameterstheseclientsanddevicesneed,calledDHCPoptions
thatallowthemtoconnecttoothernetworkresources,suchasDNSservers,WINSservers,androuters.
*WhatIsDHCP?
*Explain:DHCPclients?
*Explain:DHCPleaseprocess?
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
*Remoteaccessoverview,VPNconcepts,RRASpolicies,TCP/IProuting
78
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..z 7[̆p^Rh :
x Remoteaccessoverview
x VPNconcepts
x RRASpolicies
x TCP/IProuting
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
79
3) RRASpolicies Explain:RRAS RoutingandRemoteAccess MicrosoftAPIand
policies Service(RRAS)isaMicrosoftAPIand serversoftware
serversoftwarethatmakesit
possibletocreateapplicationsto
administertheroutingandremote
accessservicecapabilitiesofthe
operatingsystem,tofunctionasa
networkrouter.Developerscanalso
useRRAStoimplementrouting
protocols.
4) TCP/IProuting Explain:TCP/IP Ingeneralterms,routingisthe routingisthe
routing processofforwardingpackets processof
betweenconnectednetworks.For forwarding
TCP/IPͲbasednetworks,routingis packetsbetween
partofInternetProtocol(IP)andis connected
usedincombinationwithother networks
networkprotocolservicestoprovide
forwardingcapabilitiesbetween
hoststhatarelocatedonseparate
networksegmentswithinalarger
TCP/IPͲbasednetwork.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ VPNsalsousestrongencryptiontoprovideprivacyandstrongauthenticationtoguaranteeidentity,so
theyaremoresecurethantraditionalnetworks.
¾ IPisthemailroomoftheTCP/IPprotocol,whereIPdatasortinganddeliverytakeplace.
80
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Remoteaccessoverview,VPNconcepts,RRASpolicies,TCP/IProuting.
z..z 7[̆p^Rh : in this chapter we are going to learn about
x RRASpolicies.
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) RRASpolicies Explain:RRAS RoutingandRemoteAccess MicrosoftAPI and
policies. Service(RRAS)isaMicrosoftAPIand serversoftware
serversoftwarethatmakesit
possibletocreateapplicationsto
administertheroutingandremote
accessservicecapabilitiesofthe
operatingsystem,tofunctionasa
networkrouter.Developerscanalso
useRRAStoimplementrouting
protocols.
*IAS&TCP/IPRouting.
81
82
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :InpreviouschapterswehavelearnedaboutRRASpolicies.
z..z 7[̆p^Rh : in this chapter we are going to learn about IAS & TCP/IP Routing.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) TCP/IProuting Explain:TCP/IP Ingeneralterms,routingisthe routingisthe
routing processofforwardingpackets processof
betweenconnectednetworks.For forwarding
TCP/IPͲbasednetworks,routingis packets
partofInternetProtocol(IP)andis between
usedincombinationwithother connected
networkprotocolservicestoprovide networks.
forwardingcapabilitiesbetween
hoststhatarelocatedonseparate
networksegmentswithinalarger
TCP/IPͲbasednetwork.
IAS Explain:IAS TheIASserverusestheActive Activedirectory
2)
Directorydatabasetostore
authenticationinformationsothat
allIASserverscanbemanagedfrom
asingleconsole.
83
84
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :InpreviouschapterswehavelearnedaboutIAS&TCP/IPRouting.
z..z 7[̆p^Rh : Æ ConceptofuserandgroupÆplanningsecuritygroupstrategy
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Conceptofuserand Explain:Conceptof Inpersonalorbusinesscomputing,a usergroupisa
group userandgroup usergroupisasetofpeoplewho setofpeople
havesimilarinterests,goals,or whohave
concerns.Themembershaveregular similar
meetingswheretheycansharetheir interests,goals,
ideas. orconcerns
2) planningsecurity Explain:planning Whenyoucreateanewuser,you definethe
groupstrategy securitygroup canaddtheusertoanexisting user's
strategy securitygrouptocompletelydefine permissionsand
theuser'spermissionsandaccess accesslimits
limits.Changingpermissionforthe
groupaffectsallusersinthegroup.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
Themembersofausergroupliveinthesamegeographicarea,sotheycangettogetherinperson.
However,someusergroupshavemembersdistributedthroughouttheworld,andtheymeetusingInternet
chatrooms,messageboards,ormailinglists.
*Explain:Conceptofuserandgroup
*Explain:planningsecuritygroupstrategy
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
AGDLPProcess&Planninguserauthenticationstrategy
85
86
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Conceptofuserandgroup
x planningsecuritygroupstrategy.
z..z 7[̆p^Rh :
x Planninguserauthenticationstrategy
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Planninguser Explain:Planning Oneofthemostfundamental youcanprevent
authentication userauthentication elementsofanorganization’s attackersand
strategy strategy securitystrategyisverifyingthe malicioususers
identityofclientsandgrantingthem fromaccessing
appropriateaccesstosystem sensitive
resourcesbasedontheiridentity.By information
creatinganauthenticationstrategy
foryourorganization,youcan
preventattackersandmalicious
usersfromaccessingandtampering
withsensitiveinformation
87
88
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x AGDLPProcess&Planninguserauthenticationstrategy.
z..z 7[̆p^Rh :
x PlanningOUstructure
x Planninggrouppolicystrategy
89
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
¾ WhenyouplanyourGroupPolicydesign,ensurethatyourActiveDirectorydesignsupportsthe
applicationofGroupPolicy
¾ ThemostimportantthingtokeepinmindwhendesigningyourOUistheadministrativepurposethatOU
willserve.
90
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x PlanningOUstructure
x Planninggrouppolicystrategy
z..z 7[̆p^Rh :
x DeployingsoftwarethroughGPO
91
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
¾ Allowsforcentralizedmanagementofsettingsonclientcomputers
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*WhatisGPO?
*Explain:DeployingsoftwarethroughGPO
92
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x DeployingsoftwarethroughGPO
z..z 7[̆p^Rh :
x IntroductiontoWebserver
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Introductionto Explain: AWeb server isaprogramthat, AWebserverisa
Webserver Introductionto usingtheclient/servermodeland programthat,using
Webserver theWorldWideWeb'sHypertext theclient/servermod
TransferProtocol(HTTP),serves el
thefilesthatformWebpagesto
Webusers(whosecomputers
containHTTPclientsthatforward
theirrequests).
Webserversoftencomeaspartof
alargerpackageofInternetͲand
intranetͲrelatedprogramsfor
servingeͲmail,downloading
requestsforFileTransferProtocol
(FTP)files,andbuildingand
publishingWebpages.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ EverycomputerontheInternetthatcontainsaWebsitemusthaveaWebserverprogram.Twoleading
Web servers areApache, the most widelyͲinstalled Web server, and Microsoft's Internet Information
Server(IIS).
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:Webserver
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
*IntroductiontoMessagingservices.
93
94
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x IntroductiontoWebserver
z..z 7[̆p^Rh :
x IntroductiontoMessagingservices
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Introductionto Explain:Introduction Messagingprovidesyouwith Messaging
Messagingservices toMessagingservice guaranteedmessagedeliveryanda providea
robust,failͲsafewaytocarryout powerfuland
manyofyourbusinessprocesses. flexible
mechanismfor
Messagingprovideapowerfuland interprocess
flexiblemechanismforinterprocess communication
communicationbetween
componentsofaserverͲbased
application.
Theyhaveanumberofadvantages
overdirectcallsbetween
components
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ Messaging provide a powerful and flexible mechanism for interprocess communication between
componentsofaserverͲbasedapplication.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:IntroductiontoMessagingservices
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN *
Conceptofbackupandrecoveryofserver.
95
96
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x IntroductiontoMessagingservices
z..z 7[̆p^Rh :
x Conceptofbackupandrecoveryofserver
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Conceptofbackup Explain:Concept of Abackupisacopyofdata.This TwoType
andrecoveryof backupand copycanincludeimportantpartsof ͲPhysical
server. recoveryofserver. thedatabase,suchasthecontrol ͲLogical
fileanddatafiles.Abackupisa ͲRMAN
safeguardagainstunexpecteddata (recovery
lossandapplicationerrors.Ifyou management)
losetheoriginaldata,thenyoucan
reconstructitbyusingabackup.
Torestoreaphysicalbackupofa
datafileorcontrolfileisto
reconstructitandmakeitavailable
totheOracledatabaseserver.To
recoverarestoreddatafileisto
updateitbyapplyingarchivedredo
logsandonlineredologs,thatis,
recordsofchangesmadetothe
databaseafterthebackupwas
taken.
97
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ Ininformation technology, abackup, or the process of backing up, refers to the copying and
archivingofcomputerdatasoitmaybeusedtorestoretheoriginalafteradatalossevent.
¾ IfyouuseRMAN,thenyoucanalsorecoverdatafileswithincrementalbackups,whicharebackups
ofadatafilethatcontainonlyblocksthatchangedafterapreviousincrementalbackup.
98
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Conceptofbackup&recoveryofserver.
z..z 7[̆p^Rh : in this chapter we are going to learn about
x securitybaselineandtemplates&auditpolicy.
7.W5. k
e°ȱB ̆ĕs Ihajȿk X \heSj ƨXsN eƛN
1) Baselinesecurity Whatisbaseline Asecuritytemplateiscollectionof Collectionof
templet securitytemplet securityconfigurationsettingsthat security
canbeappliedtoadomain configuration.
controller,memberserverora
workstation.
2) Auditpolicy Explain:auditpolicy Anauditpolicydefinesaccount Limitsofpolicy
limitsforasetofusersofoneor
moreresources.Itcomprisesrules
thatdefinethelimitsofapolicyand
workflowstoprocessviolationsafter
theyoccur
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x A"SecurityBaseline"definesasetofbasicsecurityobjectiveswhichmustbemetbyanygivenserviceor
system.
x Derogationsfromthebaselinearepossibleandexpected,andmustbeexplicitlymarked.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:Baseline&templates
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
*UnderstandingIPsec.
99
100
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x SecurityBaselineandTemplates&AuditPolicy.
z..z 7[̆p^Rh :
x UnderstandingIPsec.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
101
2.Tunnelmode
¾ itprotectstheoriginalIP
header.
IPSeccanbeusedinprotecting
dataflowsbetweenapairof
hosts(hostͲtoͲhost),betweena
pairofsecuritygateways
(networkͲtoͲnetwork),or
betweenasecuritygatewayand
ahost(networkͲtoͲhost)
¾ Internet Protocol security (IPSec) uses cryptographic security services to protect communications over
InternetProtocol(IP)networks.
*Explain:UnderstandingIPsec.
*securityProtocol.
102
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
dj_pZdȵk aco : 2017(NSQF) dp\pƨN^ W5Z^ : 4
˼°P : ICTSM iac] : ˼°P Tj]^
ajD W5Z^ : 98 Yh`ap_ d\] : 120 i\iWN
_pbW W5Z^ : 50 Ʌk.9.ȵk5 Wh\ :
_pbWȵk5 Wh\ : securityProtocol
y. ȶ la½ Sq]h^ :
k / _pbWWh ӔSp Sh_j\T : ToStudyaboutProtocolsecurity
y..y _pbWWh e°ȱB
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ deƗ] : DataandcommunicationnetworkingbyBehruzAforozon.
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :InpreviouschapterswehavelearnedaboutUnderstandingIPsec.
z..z 7[̆p^Rh : Protocolsecurity
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) SecurityProtocol Explain:Protocol A security protocolsuitefor
security protocol(cryptographicprotocolor securingInternet
encryptionprotocol)isanabstract Protocol(IP)
orconcreteprotocolthatperforms communications
asecurityͲrelatedfunctionand byauthenticatingand
appliescryptographicmethods encrypting
ͲIPsecdefinestwoprotocol
1.AHͲautheriticationhead
2.EPSͲencapsulatingsecurity
protocol
Ͳitisintransportmode
Ͳprovidessourceauthentication
dataintegrityandprivacy.
Ͳitprovidessourceauthentication
anddataintegritybutnotprivacy.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
¾ Internet Protocol security (IPSec) uses cryptographic security services to protect communications over
InternetProtocol(IP)networks.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:Protocolsecurity.
103
104
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :InpreviouschapterswehavelearnedaboutProtocolsecurity
z..z 7[̆p^Rh : Planningsecurityforwirelessnetwork
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Planningsecurityfor Explain:Planning Wirelesssecurityistheprevention Protectour
wirelessnetworks securityforwireless ofunauthorizedaccessor networkby
networks computersusingwireless virusworms&
networks. malicious
1.WEB(wiredequivalentprivacy) software.
¾ WebisanoldIEEF802.11
standardTROM1999which
wasoutdatedin2003by
WPA.
2.WPA(WI–FIprotectedaccess)
¾ ThecurrentstandardisWAP
2/somehardwarecannot
supportWAP2without
firmwareupgradeor
replacement.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x WEB,WPAarestandardsofWiͲFisecurity.
105
106
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
x Planningsecurityforwirelessnetworks
z..z 7[̆p^Rh : in this chapter we are going to learn about
x Managingnetworktraffic
x Typesofproblemsofinternetconnectivity
x Typesandworkingofserverservices.
107
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
x Trafficmanagement=Connectivity+QualityofService
x Serverservicealsoprovidesserviceforstorageandsoftwareinfrastructure.
*Explain:Managingnetworktraffic.*Explain: Typesofproblemsofinternetconnectivity.
*Explain:typesandworkingofserverservices
*TypesofProblemsofInternetConnectivity..
108
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :InpreviouschapterswehavelearnedaboutManagingnetworktraffic.
z..z 7[̆p^Rh : in this chapter we are going to learn about Typesofproblemsofinternetconnectivity.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) ToIdentifyInternet Howyouidentify Troubleshootingsteps.
Connection WhatIsininternet x Checkthenetworkicon
Problem. connectivity. (or
wirelessconnectionsett
ings)toseeifyou
haveInternetaccess.
x Checkforchangesto
proxysettings.
x Checkthenetwork
cablesifyourcomputer
iswiredtotherouter.
x Resetyourrouter.
x Checkyourfirewallor
securitysoftware.
109
110
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Typesofproblemsofinternetconnectivity
z..z 7[̆p^Rh : in this chapter we are going to learn about
x typesandworkingofserverservice.
7.W5. k
e°ȱB ̆ĕs Ihajȿk X \heSj ƨXsN eƛN
1) Typesandworking Explain:Typesand Serverserviceprovidesdeepproduct installation,
ofserverservices workingofserver knowledge during the installation, configuration,
services configuration, monitoring, and monitoring
continual improvement phases of
systemsinfrastructures.
x Serverserviceprovidesdeepproductknowledgeduringtheinstallation,configuration,monitoring,and
continualimprovementphasesofsystemsinfrastructures.
*linuxserverinstallationandconfigurationplan.
111
112
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
y. ȶ la½ Sq]h^ :
k / _pbWWh ӔSp Sh_j\T : ToStudyaboutLinuxserverinstallationandconfiguration,
y..y _pbWWh e°ȱB
configurationplan.
y..z dhVWs : chalk,duster,markerpen
y..3 d5U[½ deƗ] : DataandcommunicationnetworkingbyBehruzAforozon.
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Typesandworkingofserverservice
z..z 7[̆p^Rh : Linuxserverinstallationandconfiguration,configurationplan.
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Linuxserver Explain:Linuxserver Stepsfor
1) Useyumtoinstallthe
installationand installationand installationand
Sambapackage
configuration, configuration, configuration
2) Whileloggedonasroot,
configurationplan. configurationplan.
createthenewdirectory
3) Changethepermissions
onthenewdirectory
4) Navigatetothenew
directory
5) Addthreeemptyfilesto
thedirectory
6) AddanewSambauser
7) Createanewsamba
group
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x SambaisaLinuxserver
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:Linuxserverinstallationandconfiguration,configurationplan.
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
*Publicanddatadirectory,Hostfile.
113
114
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Linuxserverinstallationandconfiguration,configurationplan.
z..z 7[̆p^Rh : Publicanddatadirectory,Hostfile.
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) Publicanddata Explain:Publicand Apublicfolderisafoldercreated Definitionof
directory datadirectory toshareinformationwithothers. publicanddata
Adatadirectoryisalist,table, directory
orindexwhich
describesdatastoredina
computerorcomputerapplication,
suchasadatabase.Such
adirectoryincludesinformation
suchasthenameofthedata,and
itsattributes.
2) Hostfile. Explain:Hostfile. Thehostsfileisacomputer Plaintextfile
fileusedbyanoperatingsystemto
maphostnamestoIPaddresses.
Thehostsfileisaplaintextfile,
andisconventionallynamedhosts.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x The hosts file is one of several system facilities that assist in addressing network nodes in a computer
network.
x ThehostsfilecontainslinesoftextconsistingofanIPaddressinthefirsttextfieldfollowed byoneor
morehostnames.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:Publicanddatadirectory.Æ Explain: Hostfile.
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
SWAT
115
116
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :Inpreviouschapterswehavelearnedabout
x Publicanddatadirectory,Hostfile.
z..z 7[̆p^Rh :
x SWAT
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) SWAT Explain:SWAT Sambaweb
SambaisafreesoftwarereͲ
administration
implementationof
tool
theSMB/CIFSnetworkingprotocol
Sambaprovidesfileandprintservicesfor
variousMicrosoftWindowsclientsand
canintegratewithaMicrosoftWindows
Serverdomain,eitherasaDomain
Controller(DC)orasadomainmember.
117
118
CVsFD Sh_j\ d5ƨTh...................... F: TRG: 06
_pbW Ɯ_hW
k V
z. ̆ƨShaWh / ȶ lah½ ȵd 5 hW : Yh`ap_ d\] : 10 i\iWN
z..y d\jëh / ^ƥȻk :InpreviouschapterswehavelearnedaboutSWAT
z..z 7[̆p^Rh : now a days social web sites have a big market and hackers are also,so we need
protection from them. So in this lesson we are going to study about password authentication.
x passwordauthentication,telnet
3. iac] ^ȩk8S : Yh`ap_ d\] : 90 i\iWN
7.W5. k
e°ȱB ̆ĕs IhajȿkX \heSj ƨXsN eƛN
1) password Explain:password Theuseofpassword Definitionof
authentication authentication authenticationisfurther Password
weakenedbysoftwareattacks. authentication
Passwordauthenticationlogging
softwareprogramsareembedded
inemailthatareactivatedby
clickingonthelinksintheemailor
byvisitingafakesitethatlookslike
thenormalcommercialsite
2) Telnet Explain:Telnet Itisavirtualterminalprotocol Sessionlayer
whichallowstheusersonalocal protocol
hosttoremotelyaccessanother
hostasiftheywerelocally
attached.
|. dh^h5b / ȶkW^haS½W : Yh`ap_ d\] : 10 i\iWN
x Inmostenterprises,theuseofpasswordsistheprimarymeansofauthenticatingauser.Unfortunately,itis
alsotheweakestformofauthentication.
x TelnetisasessionlayerprotocolusedontheInternetorlocalareanetworkstoprovideabidirectional
interactivetextͲorientedcommunicationfacilityusingavirtualterminalconnection.
5. 7\_jD^R 7Wp ƨahƚ]h] : Yh`ap_ d\] : 05 i\iWN
*Explain:PasswordauthenticationÆ*Explain:Telnet
6. eap XJWs XhO : Yh`ap_ d\] : 05 i\iWN
*SettingupaLANofatleast3PcsusingHUB/Switchandstructuredcabling.
119
120