---
---
---
In a peer-to-peer (P2P) network, all devices have equal status and can
communicate directly with each other without relying on a central
server. On the other hand, in a client-server network, devices
(clients) request services or resources from a central server. Here's
how you can configure each type of network:
Connect Devices:
Connect all devices (computers, laptops, smartphones, etc.) to the
same network, either wired or wireless.
Assign IP Addresses:
Each device needs a unique IP address within the same subnet. You can
manually assign IP addresses or use DHCP (Dynamic Host Configuration
Protocol) for automatic assignment.
Configure Sharing Settings:
Enable file and printer sharing on each device if needed. This allows
devices to share files and printers directly with each other.
Set Up Firewall Rules:
Verify that devices can communicate with each other by sending test
messages, sharing files, or accessing shared resources.
Client-Server Network Configuration:
Set Up Server:
For larger networks, clients can join a domain managed by the server.
This allows centralized user authentication and management.
Configure Client Applications:
Gather Equipment:
Connect the central device (switch or hub) to power and ensure it's
functioning properly.
Connect Computers to the Central Device:
Take an Ethernet cable and connect one end to a port on the central
device.
Connect the other end of the Ethernet cable to the Ethernet port on a
computer or device.
Repeat this step for each computer or device you want to connect to
the network, ensuring each has its own cable and port on the central
device.
Assign IP Addresses (Optional):
Power on all devices and check if they can communicate with each other
and access resources on the network.
Test connectivity by pinging other devices' IP addresses, accessing
shared folders, or opening web pages if your network has internet
access.
Secure the Network (Optional):
Requirements:
Enable Bluetooth:
Once devices are paired (if required), you can create a network using
Bluetooth:
On one of the devices, go to Bluetooth settings.
Look for an option to create a PAN (Personal Area Network) or similar.
Follow the on-screen instructions to create the network.
Other devices within Bluetooth range should detect and join the
network automatically or with manual confirmation.
Configure Network Settings (if applicable):
Depending on the devices and network type, you may have options to
configure network settings such as network name, security settings,
etc. Follow the device-specific instructions to set these up if
needed.
Test Connectivity:
Verify that devices within the Bluetooth network can communicate with
each other.
Test file sharing, sending messages, accessing shared resources (if
applicable), etc.
Secure the Network (if applicable):
If you want to restrict access to the shared printer, you can set
permissions by clicking the "Security" tab in printer properties and
configuring permissions for specific users or groups.
Access Shared Printer:
On other computers in the network, you can now add the shared printer
by going to Control Panel > Devices and Printers > Add a printer > Add
a network, wireless, or Bluetooth printer. Follow the prompts to
locate and add the shared printer.
Assign IP Addresses:
Ping devices, access external sites, and check DNS resolution for
connectivity testing.
Monitor and Troubleshoot (Optional):
Find the best location for your wireless router:Its optimal placement
is in a central location of your home, free from obstructions that
could cause wireless interference, such as windows, walls, and even
the microwave.
Turn off the modem: Power off the cable or DSL modem from your
Internet service provider before connecting your equipment. Connect
the router to the modem: Plug an ethernet cable (typically provided
with the router) into the router's WAN port and then the other end to
the modem.
Connect your laptop or computer to the router:Plug one end of another
ethernet cable int router1s into your laptop's ethernet port.
Add WPA2 security:This step is essential, You can find this setting
in the wireless security section, where you'll select which type of
encryption to use and then enter a passphrase of at least 8
characters - the more use WPA or mixed mode WPA/WPA2 if you have an
characters and the more complex the password, the better ABAZ is the
latest wireless encryption protocol much more secure than WEP, but
you may need to older wireless adapter in any of your devices. WPA-
AES is the strongest encryption available to date. Change the
wireless network name (SSID). To make it easy for you to identify
your network, choose a descriptive name for your SSID (Service Set
Identifier) in the wireless network information section. they don't
overlap).
Example – If the sender wants to send data unit 1100001 using even
parity to the receiver. sender pass data to Even parity generator.
Even parity generator will count number of 1s in data unit and will
add parity bit.
In the above example, number of 1s in data unit are 3, parity
generator appends a parity bit 1 to this data unit making the total
number of 1s even( i.e 4) which is clear from above figure. Data along
with parity bit is then transmitted across the network. In this case,
11000011 will be transmitted.
At the receiver side, This data is passed to parity checker . parity
checker counts number of 1s in data including parity bit
In this case number of 1’s counted by parity checker are even, so
receiver will accept data.
If the number of 1s counted by parity checker are odd, (e.g. 3 or 5)
then receiver will come to know that there is some error in the data
and receiver rejects such an erroneous data unit.
At the receiver side, the incoming data unit is divided by the same
number (predetermined divisor).
If remainder is zero, the data unit is assumed to be correct and
accepted by receiver.
If remainder is nonzero number indicates that the data unit has been
changed during transmission and rejected by receiver .
The CRC is more powerful than VRC and LRC in detecting errors.
9. write classes of IP addresses and subnetting and supernetting
with example
Class A:
Class A range for first byte is 0-127.
Example: 10.0.0.0
Subnetting:
Subnetting is the process of dividing a larger network into smaller,
manageable segments called subnets.
It helps in improving network performance, security, and management.
Each subnet has its own unique subnet address and range of IP
addresses.
Example:
Consider a network with the IP address 192.168.1.0 and a subnet mask
of 255.255.255.0
(which gives us 256 possible host addresses). By subnetting this
network,
we can create smaller subnets with fewer host addresses each. For
instance:
Subnet 1: 192.168.1.0/28 (which allows for 14 hosts per subnet)
Subnet 2: 192.168.1.16/28
Subnet 3: 192.168.1.32/28 ...and so on.
Supernetting:
Supernetting, also known as route aggregation, is the opposite of
subnetting.
It involves combining multiple smaller networks into a larger network,
which reduces the number of routing table entries and improves routing
efficiency.
Example:
Suppose you have several Class C networks with contiguous IP ranges:
Network 1: 192.168.1.0/24
Network 2: 192.168.2.0/24
Network 3: 192.168.3.0/24
By supernetting these networks, you can create a supernet:
Supernet: 192.168.1.0/23 (combining Network 1 and Network 2)
Supernet: 192.168.1.0/22 (combining Network 1, Network 2, and Network
3)
This reduces routing table entries and simplifies routing within the
network.