0% found this document useful (0 votes)
25 views

Abhi

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Abhi

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

NETWORKING

SIX WEEKS INDUSTRIAL TRAINING REPORT

At

SOLITAIRE INFOSYSTEMS PVT. L. T. D , MOHALI

BACHELOR OF TECHNOLOGY

IN
COMPUTER SCIENCE AND ENGINEERING

SUBMITTED BY
ABHISHEK KUMAR 22-B-CSE-0O4

SCHOOL OF ENGINEERING, DESIGN AND

AUTOMATION

DEPARTMENT OF

COMPUTER SCIENCE AND ENGINEERING

RIMT UNIVERSITY MANDIGOBINDGARH

JUNE - JULY 2024


ACKNOWLEDGEMENT

While presenting this report I would like to express my deep sense of


gratitude to entire Solitaire staff that was indispensable part of my training
giving me unending guidance, inspiration, encouragement and providing me
excellent environment throughout my training at Solitaire Infosys Pvt. LTD.
The training was an extremely productive; enriching experience, not only
technically but also from providing practical skills. I am extremely thankful
to Mr. Sham Sunder who had devoted a lot of time in guiding and
supervising me during my training. I place my gratitude towards Mr. Sham
Sunder for his valuable advice and guidance in carrying out this enjoyable
and productive experience, which provided me a great opportunity to search
new horizons.

ABHISHEK KUMAR
22-B-CSE-004

1
ABSTRACT

The networking course is designed to provide participants with a solid


foundation in networking principles, protocols, and technologies. Over the
duration of the course, participants will be introduced to key concepts such
as network architecture and network design. Through a combination of
theoretical instruction and practical hands-on exercises, participants will
gain the necessary skills to configure, manage, and maintain computer
networks effectively.

The course begins with an introduction to networking fundamentals,


including an overview of network models such as the OSI and TCP/IP
models. Participants will learn about different network topologies, protocols,
cabling and the functions of network devices. As the course progresses,
participants will delve into the intricacies of routing protocols such as RIP,
OSPF, EIGRP.

Network security is a crucial aspect of the course, covering areas such as


virtual private networks (VPNs), DNS server, Email server, NAT, VOIP.
Participants will also gain insights into network design methodologies, IP
addressing, redistribution and subnetting.

By the end of the course, participants will have developed a comprehensive


understanding of networking fundamentals and acquired practical skills to
design, configure computer networks. This knowledge and expertise will
enable them to pursue careers in network administration, engineering, or
security, contributing to the efficient and secure functioning of modern
digital infrastructures.

2
TABLE OF CONTENTS

S.NO. TITLE PAGE


NO.
1. Introduction of networking 4

2. Network & Types 5

3. Ways of transmission in computer network 6

4. Networking Cables 7-8

5. Networking Devices 9-12

6. IP Address 13-14

7. OSI Model 15-17

8. Cisco Packet Tracer 18

9. Networking Devices used in Project 19

10. Implementation of Project 20-22

11. Cisco Router Modes 23

12. Assign IP Address to Switch, Router & PC 24-27

13 Routing Protocols 28-30

14. Redistribution 31-32

15. Server, Email sever, DNS sever 33-35

3
INTRODUCTION

Networking is the backbone of modern communication systems, enabling


devices and computers to connect and share information with each other. It
involves the interconnection of multiple devices, such as computers,
smartphones, servers, and other electronic devices, to form a network that
allows data to be exchanged and accessed.

In simple terms, think of networking as a system of roads connecting


different destinations. Each device, like a computer or a smartphone, is a
destination, and the network is the road system that enables these devices to
communicate and share data.

Networks can be as small as a home or office network, where devices are


connected together to share files and printers, or they can be as vast as the
internet, which connects billions of devices worldwide. The internet is the
largest and most well-known network, allowing people to access websites,
send emails, and engage in various online activities.

Networking relies on protocols, which are a set of rules and standards that
govern how data is transmitted and received across the network. One
commonly used protocol is the Internet Protocol (IP), which assigns unique
addresses to each device on the network, ensuring that data is properly
directed to its intended recipient.

Different types of networks exist, including wired and wireless networks.


Wired networks use physical cables, like Ethernet cables, to connect devices,
while wireless networks use radio waves to transmit data without the need
for physical connections.Overall, networking is all about connecting devices
and enabling them to communicate and share information. It plays a crucial
role in our daily lives, powering the internet, online communication, and
many other applications that rely on the seamless transfer of data between
devices.

4
NETWORK & TYPES

A network refers to a collection of devices (such as computers, servers,


printers, and routers) that are connected together to share resources and
communicate with each other. These devices can be physically connected
using cables or wirelessly connected through Wi-Fi.

There are different types of networks based on their size and geographical
coverage:

Local Area Network (LAN): A LAN is a network that covers a small area,
such as a home, office, or building. It allows devices within this limited space
to share files, printers, and internet connections.

Metropolitan Area Network (MAN): A MAN is a network that spans


across a city or town. It connects multiple LANs together, allowing them to
share resources and communicate with each other.

Wide Area Network (WAN): A WAN is a network that covers a wide


geographical area, such as multiple cities, countries, or even continents. The
Internet is the most well-known example of a WAN, connecting networks
and devices around the world.

Each type of network serves a different purpose and has varying sizes and
coverage areas. LANs are suitable for small-scale networking within a
limited space, MANs connect LANs across a city or town, and WANs enable
connectivity on a global scale.

5
WAYS OF TRANSMISSION IN COMPUTER NETWORK

Ways of transmission in computer networks refer to the methods used to send


and receive data between devices. The ways of transmission in computer
networks: simple mode, half-duplex mode, and full-duplex mode.

Simple Mode: One-way data transmission.


In simple mode, data transmission occurs in only one direction. One device
sends the data, and the other device only receives. Example: Radio or
television broadcast.

Half-Duplex Mode: Two-way data transmission, but not simultaneously.


In half-duplex mode, data transmission can occur in both directions, but not
simultaneously Devices take turns sending and receiving data. When one
device is transmitting, the other device listens and waits for its turn to
transmit. Example: Walkie-talkie conversation, Bluetooth.

Full-Duplex Mode: Two-way simultaneous data transmission.


In full-duplex mode, data transmission can occur simultaneously in both
directions. Both devices can send and receive data simultaneously without
having to wait or take turns. Example: Whatsapp chats, telephone
conversation.

6
NETWORKING CABLES

Networking cables are networking hardware used to connect one network


device to other network devices or to connect two or more computers to share
devices such as printers or scanners. Different types of network cables, such
as coaxial cable and twisted pair cables are used.

COAXIAL CABLE: Coaxial cables have a central copper conductor


that carries the signal. The conductor is surrounded by insulation, which
is then covered by a metallic shield (usually made of aluminum or
copper) to reduce interference. Finally, there is an outer plastic or rubber
covering for protection. Coaxial cables are commonly used for cable
television and broadband internet connections.

TWISTED PAIR CABLE: Twisted pair cables consist of pairs of


copper wires twisted together in a specific pattern. They are widely
used in Ethernet networks and telecommunications systems.
• Shielded Twisted Pair (STP): Shielded Twisted Pair cables have
extra protection against interference. STP cables have an
additional shielding layer around the twisted pairs of copper
wires.
• Unshielded Twisted Pair (UTP): Unshielded Twisted Pair
cables do not have extra protection. They rely on the twisting
of the wire pairs to reduce interface.

7
STRAIGHT-THROUGH CABLE: Used to connect different types of
devices (e.g., computer to switch). Sequence: orange/white, orange,
green/white, blue, blue/white, green, brown/white, brown.

CROSSOVER CABLE: Allows direct connection between similar


devices (e.g., computer to computer). Sequence: Pin 1 is crossed with
Pin 3, and Pin 2 is crossed with Pin 6.

ROLL-OVER CABLE: Primarily used to connect a computer to a


router or network switch for management or configuration purposes.
Sequence: Reverse the pin order of each wire in a cable.

FIBER OPTIC CABLE: Utilizes thin glass or plastic fibers to transmit


data using light signals, offering high-speed and long-distance
communication.

SERIAL CABLE: Connects devices like routers, switches, and modems


to computer serial ports for serial communication.

CONSOLE CABLE: Enables a direct connection between a computer


and networking equipment (e.g., router or switch) for management
and configuration purposes.

8
NETWORKING DEVICES
Network devices, also known as networking hardware, are physical devices
that allow hardware on a computer network to communicate and interact
with one another. For example Repeater, Hub, Bridge, Switch, Routers,
Gateway, etc.
LAN Card:
A LAN card, also known as a network interface card (NIC) or Ethernet card,
is a hardware device that enables a computer to connect to a local area
network (LAN). It provides the physical interface between the computer and
the network, allowing data to be transmitted and received over the network.
The MAC address is indeed stored in the LAN card itself.

REPEATER:
A repeater operates at the physical layer. It is hardware component that is
used to boost up signals and also receive signal and retransmits it at higher
frequency. According to the types of signals that they regenerate, repeaters
can be classified into two categories:
Analog Repeaters: It can only amplify the analog signal.
Digital Repeaters: It can reconstruct a distorted signal.

9
HUB:
A hub is a network device that connects multiple devices in a local area
network (LAN). It operates at the physical layer of the network and is
primarily used for signal distribution. It performs broadcasting and LAN
device which connects computer together and works on half duplex. It does
not understand MAC address. . In HUB, there is 7 to 12 port. The speed is
same as cable speed or connection speed.

In networking, there are primarily three types of hubs:

o Active HUB: It is also known as Multiport Repeater. Power is required


for initiating and it detects error. It also amplifies data and regenerates
the data.
o Passive HUB: It does not require power for initiating and it sends data
as it is.
o Intelligent HUB: It is a manageable hub and power required. It detects
error and correct it upto certain limits.

SWITCH:
A switch is a multiport bridge with a buffer and a design that can boost its
efficiency and performance. A switch is a data link layer device. It is a LAN
device and a central device which is used in network for connecting devices.
The number of ports are more than hub. It has max 24 ports. It understand
MAC address and work on full duplex mode. The speed of switch is double
than connection speed.

10
Based on their configuration types, switches can be categorized into two
main types: o Unmanaged Switch:
Unmanaged switches are the most basic type of switch and are typically used
in small home or office networks. They are plug-and-play devices that
require no configuration or management. Unmanaged switches operate with
default settings and cannot be customized.

o Managed Switch:
Managed switches offer advanced configuration and management
capabilities, making them suitable for larger networks and enterprise
environments. They provide a range of features and options that allow
network administrators to have greater control over the network.

BRIDGE:
A bridge operates at the data link layer. A bridge is a repeater, with add on
the functionality of filtering content by reading the MAC addresses of the
source and destination. It is also used for interconnecting two LANs working
on the same protocol.

GATEWAY:
A gateway, as the name suggests, is a passage to connect two networks that
may work upon different networking models. They work as messenger
agents that take data from one system, interpret it, and transfer it to another
system. Gateways are also called protocol converters and can operate at any
network layer. Gateways are generally more complex than switches or
routers. A gateway is also called a protocol converter.

FIREWALL:
A firewall device is a crucial component of network security that monitors
and filters network traffic based on predefined rules. It acts as a barrier
between networks, preventing unauthorized access and protecting against
threats. Firewalls enforce security policies, perform traffic inspection, and
can include features such as NAT, intrusion detection/prevention, and VPN
support. They play a vital role in enhancing network security and protecting
sensitive data from unauthorized access or malicious activities.

11
ROUTERS:
A router is a network device that forwards information packets
among PC networks. Routers perform traffic routing functions on the
Internet. Data sent over the Internet, such as a website or email, is in
the form of data packets. Data travels through these interfaces in the
network. Ports and interfaces are identified by their name and
number. Different types of Ports are mentioned below:

o Serial Port: A serial port is used for serial communication and is


typically used for connecting to external devices like modems or other
routers. Serial ports are used for wide area network (WAN)
connectivity in older router models. Serial cable is used in it.
o Console Port: The console port provides a direct management
interface for configuring and monitoring the router. It is used to
establish a connection between a computer or terminal and the router
for accessing the command-line interface (CLI) or other management
interfaces. Console cable is used in it. o Fast Ethernet Port: Fast
Ethernet ports are used for connecting devices within a local area
network (LAN). These ports provide fast Ethernet connectivity,
typically at speeds of 100 Mbps. They allow the router to connect to
computers, switches, or other networking devices in the local network.
Straight cable is used in it.
o Auxiliary Port: The auxiliary port, also known as the AUX port, is an
auxiliary communication port that allows external devices, such as
modems or other networking equipment, to connect to the router for
remote management or troubleshooting purposes. Straight cable is
used in it.

12
IP ADDRESS

An IP address is a unique address that identifies a device on the internet or a


local network. IP stands for "Internet Protocol," which is the set of rules
governing the format of data sent via the internet or local network. Typically
assigned by an internet service provider (ISP), an IP address is an online
device address used for communicating across the internet. The internet
needs a way to differentiate between different computers, routers, and
websites.

There are two versions of IP addresses that are commonly used on the
internet: IPv4 and IPv6.

IPv4 IPv6

IPv4 is a 32-bit address. IPv6 is a 128-bit address.


IPv6 is an alphanumeric address that
IPv4 is a numeric address that consists of consists of 8 fields, which are
4 fields which are separated by dot separated by colon.
(.).
IPv4 has 5 different classes of IP address IPv6 does not contain classes of IP
that includes Class A, Class B, Class C, addresses.
Class D, and Class E.

IPv4 has a limited number of IP IPv6 has a large number of IP


addresses. addresses.

In IPv4, the IP address is represented in In IPv6, the representation of the IP


decimal. address in hexadecimal.

IPv4 is broadcasting. On the other hand, IPv6 is


multicasting, which provides
efficient network operations.

13
It consists of 4 octets. It consists of 8 fields, and each field
contains 2 octets. Therefore, the
total number of octets in IPv6 is 16.

It does not provide encryption and It provides encryption and


authentication. authentication.

Types of IP addresses

Private IP addresses: Each device connected to a home network or a


private network carries a private IP address. Private IP addresses are
only used on an internal network.
Public IP addresses: An ISP assigns these addresses, which enable a
router to communicate with the internet or an outside network. Public
IP addresses cover the entire network, meaning multiple devices
sharing the same internet connection will also share the same public
IP address.
Dynamic IP addresses: These IP addresses are constantly changing
and a new dynamic IP address is assigned to a device every time it
connects to the internet.
Static IP addresses: Unlike dynamic IP addresses, static IP addresses
never change once they're assigned by the network. A static IP address
ensures that all websites and email addresses associated with a certain
web server.
In the IPv4 IP address space, there are five classes: A, B, C, D and E.
Each class has a specific range of IP addresses. Primarily, class A, B,
and C are used by the majority of devices on the Internet. Class D and
class E are for special uses.

Class Network Bits Host Bits Range Subnet Mask

Class A 8 24 1-126 255.0.0.0

14
Class B 16 16 128-191 255.255.0.0

Class C 24 8 128-191 255.255.255.0

Used in Used in
Class D multicasting multicasting 224-239 -

Class E Used for research Used for research 240-254 -

OSI MODEL
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer
moves through a physical medium to the software application in another
computer. o OSI consists of seven layers, and each layer performs a
particular network function. o OSI model was developed by the
International Organization for Standardization (ISO) in 1984, and it is
now considered as an architectural model for the inter-computer
communications. o OSI model divides the whole task into seven smaller
and manageable tasks. Each layer is assigned a particular task. o Each
layer is self-contained, so that task assigned to each layer can be
performed independently.

7 Layers of OSI Model

There are the seven OSI layers. Each layer has different functions. A list of
seven layers are given below:

15
• Physical Layer: Deals with the physical transmission of data over the
network.

• Data Link Layer: Manages reliable communication between directly


connected devices.

• Network Layer: Handles addressing and routing of data packets


across multiple networks

• Transport Layer: Ensures reliable delivery of data segments between


endpoints.

• Session Layer: Establishes, manages, and terminates communication


sessions between applications.

• Presentation Layer: Handles data formatting and translation for


different applications.

• Application Layer: Enables direct interaction between user


applications and the network.

16
17
CISCO PACKET TRACER

Cisco Packet Tracer is a software tool developed by Cisco Systems that


allows users to design, configure, and simulate computer networks. It
provides a virtual environment where users can create network topologies by
adding devices such as routers, switches, PCs, and servers. With Packet
Tracer, users can connect these devices, configure their settings, and simulate
network operations.

Packet Tracer is widely used in educational settings, such as classrooms and


network training programs, as it helps students learn and practice networking
concepts. It allows users to visualize and understand how networks work by
providing a hands-on experience in a safe and controlled environment. Users
can experiment with different network configurations, test the functionality
of devices, and simulate network behaviors.

The software supports a range of networking protocols and features,


allowing users to explore various networking scenarios and troubleshoot
network issues. Overall, Cisco Packet Tracer serves as a valuable tool for
learning, testing, and gaining practical experience in the field of computer
networking.

Cisco Packet Tracer is used for projects because it provides a virtual


environment to design, test, and learn about computer networks, allowing
project teams to gain hands-on experience, troubleshoot network issues, and
collaborate effectively without the need for physical equipment.

18
NETWORKING DEVICES USED IN PROJECT

In a networking project using Cisco Packet Tracer, a wide range of devices


can be used to create and simulate network environments. Here are some
common devices used in such projects:

Routers: Routers are essential devices in network projects. They connect


different networks together, handle data routing, and facilitate
communication between devices.

Switches: Switches are used to connect multiple devices within a network,


allowing them to communicate with each other. They enable efficient data
transfer within a local network.

PCs: PCs (Personal Computers) are used to simulate end-user devices in the
network. They can represent workstations, laptops, or any other devices that
connect to the network.

19
IMPLEMENTATION OF PROJECT

Step 1: Download Cisco Packet Tracer and install the setup.

Step 2: After the installation procedure has completed this display (below)
will appear when you run the Cisco Packet Tracer-Start the application.

Step 3:
• From the bottom toolbar, click on router and select router 2811.
Also click on switch and selects 2960 switch.
• Now, click on ‘End Devices’ and select ‘PC’ and then click on the
screen.

20

19
Step 4:
• Connect routers and switches by cable.
• For adding ports in router, click on the router, off the router by
clicking on the button and then add the WIC-2T port into the empty
port (which is black in color) by dragging it from the left section of
the screen. And then again turn on the button by clicking on the same
button.

23
• Now, connect the routers with serial cable.

• Connect the switch with router and PC using straight cable.

• Now, implement cable on the whole network.

22

21
CISCO ROUTER MODES

A router is a layer 3 device used to forward packets from one network to


another. It forwards the packet through one of its ports on the basis of
destination IP address and the entry in the routing table. By using a routing
table, it finds an optimized path between the source and destination
network.
Let’s discuss the Cisco router’s different modes.

Modes of router – There are mainly


5 modes in the router:
1. User execution mode –
As soon as the interface up message appears and press enter, the router>
prompt will pop up. This is called user execution mode. This mode is
limited to some monitoring commands.

2. Privileged mode –
As we type enable to user mode, we enter into Privileged mode where
we can view and change the configuration of the router. Different
commands like show running-configuration, show IP interface brief, etc
can run on this mode which is used for troubleshooting purposes. Here
commands are sh run, sh history, write and so on.

3. Global configuration mode –


As we type configure terminal to the user mode, we will enter into the
global configuration mode. Commands entered in these modes are
called global commands and they affect the running configuration of the
router. In this mode, a different configuration like making a local
database on the router by providing username and password can set
enable and secret password, etc. Here commands can execute with do
such as do sh run, do write.

Configuration –

23
24
ASSIGN IP ADDRESS TO SWITCH, ROUTER AND PC

Assigning the IP address is the first step while creating a network in packet
tracer. Before proceeding with any other configuration, we must assign the
appropriate IP address and design the correct IP addressing scheme for the
network.

• Click on Router, then on CLI.


• Go to the global configuration mode, and type slot/ port or interface
Fast Ethernet 0/0 (or interface fa0/0).
• Now configure an IP address and subnet mask then give “no
shutdown” command.
• Carefully configure IP address with proper interfaces to switch and
router.

24
25
CONFIGURE PC IP ADDRESS
To configure the IP address on a PC, laptop, or server, we have to open the
IP configuration utility provided in the packet tracer.

To assign the static IP address, we will select the static option available and
then we will configure the IP address manually.

If we have configured the devices with the correct IP addresses then we can
further develop our network in the packet tracer.

26
ROUTING PROTOCOLS
Routing is the process of forwarding network traffic from one network
location to another. It involves making decisions about the best path for
data packets to reach their destination based on network topology and
routing protocols.
A routing protocol is a set of rules and algorithms that routers use to
communicate and exchange information about network topology,
reachability, and network conditions. These protocols enable routers to
learn about available paths, make routing decisions, and update their
routing tables to determine the most efficient routes for forwarding data
packets.
In simple terms, routing is like finding the best directions to reach a
destination in a network, and routing protocols are the rules and methods
used by routers to share information and decide the most efficient paths for
data to travel through the network.
RIP (Routing Information Protocol):

• RIP is a distance-vector routing protocol that uses hop count as the metric
to determine the best path.
• It supports small to medium-sized networks and is easy to configure. • RIP
sends routing updates periodically (by default, every 30 seconds) to its
neighboring routers.
• It has a maximum hop count limit of 15, making it suitable for small
networks.

Command use in RIP:

29
OSPF (Open Shortest Path First):

• OSPF is a link-state routing protocol that calculates the shortest path based
on the cost assigned to each link.
• It supports large-scale networks and is widely used in enterprise
environments.
• OSPF routers exchange link-state information, including the state of their
interfaces, with neighboring routers.
• OSPF allows for the use of different metrics, such as bandwidth, delay, and
reliability, for path selection.

Command use in OSPF:

EIGRP (Enhanced Interior Gateway Routing Protocol):

• EIGRP is a hybrid routing protocol that combines features of both distance-


vector and link-state protocols.
• EIGRP uses a composite metric that includes bandwidth, delay, reliability,
and other factors for path calculation.
• It supports automatic summarization and load balancing across multiple
paths.
• EIGRP uses a neighbor discovery process and sends partial or incremental
updates when changes occur in the network.

Command use in EIGRP:

28
29
REDISTRIBUTION

Redistribution in a computer network refers to the process of sharing routing


information between different routing protocols. It is necessary when there
are multiple routing protocols being used in a network, and routers need to
understand how to forward data between them.
Think of routing protocols as languages that routers use to communicate
with each other and exchange information about the best paths to send data.
Redistribution allows routers speaking different "languages" (i.e., different
routing protocols) to understand each other's information.
When redistribution occurs, routers are configured to translate the routing
information from one protocol into another, so that all routers in the network
can have a complete and consistent view of the available paths. This helps
ensure that data is correctly routed to its destination.
Here is a general overview of the redistribution process:
Identify the routing protocols: Determine the routing protocols that are
currently being used within the network and the ones that need to be
redistributed.
Configure redistribution: Configure the routers that will be responsible
for redistributing the routing information. This typically involves
specifying the source routing protocol and the destination routing
protocol for redistribution.
Define redistribution policies: Define policies that determine which
routes should be redistributed and how they should be redistributed.
These policies can include filtering specific routes based on certain
criteria or manipulating metric values.
Enable redistribution: Activate the redistribution process on the
configured routers. This allows the routers to exchange routing
information between the different protocols.
Verify and monitor: Monitor the network to ensure that the
redistribution process is functioning as intended. Verify that the
redistributed routes are being advertised and received correctly by the
routers.

30
CONFIGURE REDISTRIBUTION ON ROUTER

When router’s one interface is operating RIP and other interface is


operating EIGRP and OSPF.

When router’s one interface is operating OSPF and other interface is


given a EIGRP and RIP.

When router’s one interface is operating EIGRP and other interface


is given a OSPF and RIP.

32
3
Server, DNS Server, Email Server
SERVER:

A server is a specialized computer or software application that provides specific services or


resources to other computers, known as clients, within a network. Servers are designed to handle
requests from clients and respond to those requests by providing access to resources such as files,
applications, databases, or computing power.

• Click end devices, select a sever.


• Connect a server to PC, with the help of straight through cable.
• Click on sever and allocate IP address.

DNS SERVER:

A DNS (Domain Name System) server is a crucial component of the internet infrastructure
that translates human-readable domain names into IP addresses, which computers use to
identify each other on the network. Here’s a comprehensive explanation of DNS servers.

• Click end devices, select a sever.


• Connect a server to PC, with the help of straight through cable.
• Click on sever and allocate IP address.
• Set name for all servers with the help of IP address.
EMAIL SERVER:

An email server, also known as a mail server, is a specialized computer or software application
responsible for managing and delivering email messages. It facilitates the sending, receiving,
and storage of email messages over networks, typically the internet or within a private network.
Here's a detailed explanation of email servers.

• Click end devices, select a sever.


• Connect a server to PC, with the help of straight through cable.
• Click on sever and allocate IP address.
• Set email address for all servers with the help of IP address.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy