Peer to Peer (P2P) Network
A peer-to-peer network is one in which two or more PCs share files and access the same Peripheral devices such as printers without requiring a separate server computer or server OS.
It is the simplest form of a network. A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer.
In the P2P network, every connected PC is at once a server and a client. There's no special network operating system residing on a robust machine that supports special server-side applications like directory services.
Lets set up a Peer to Peer Network using Two Pcs
Step 1 : You have to make sure that both computers have IP addresses that are on the same subnet. For example, if you give one computer an IP address of 192.168.0.1, then you should give the second computer an IP of 192.168.0.2
If you used the above IP addresses, you should use a subnet mask of 255.255.255.0. If you use an incorrect subnet mask, the connection will not work. Lastly, the value for the default gateway should be the same on both machines. You can pick which IP address you want to use, but use it on both computers for the default gateway.
You could leave the Default Gateway and Preferred DNS server fields blank as you really don’t have to connect to any device outside the local network.
STEP 2: Use a Crossover Cable to connect two PCs directly through their NIC ports
STEP 3: You should disable the firewall on both computers to ensure that none of the file-sharing ports are being blocked. You can do this by going to Control Panel and then Windows Firewall.
STEP 4: You can check the connection by opening a command prompt (Cick on Start and type in cmd) and trying to ping the other computer. Just type the word ping followed by the IP address of the other computer.
You should now be able to go to My Network Places or Network in Windows Explorer and access the other computer. You’ll also need to setup a shared folder if you want to transfer files.
A Simple Network- Setup & Connectivity Verification
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
An IP address serves two main functions:
1.Host or Network interface identification
2.Location addressing.
There are two versions of IP
1. Internet Protocol version 4 (IPv4)
2. Internet Protocol version 6 (IPv6)
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998.
IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (an octet) of the address.
Classes of IP
Static Vs dynamic IP addresses
IP addresses are assigned in two different ways. They may be dynamically assigned (they can change automatically) or statically assigned (they are intended not to change, and must be changed manually).
Most home networks use dynamic allocation. Your router uses DHCP (Dynamic Host Configuration Protocol) to temporarily assign, or "lease," an IP address to your device.
After a period of time, this lease "expires," and the router renews your old address or assigns you a new one depending on the router configuration.
Subnet and Subnet Mask
Dividing an IP network into blocks of logical addresses is known as subnetting.
A subnet mask is data used for bitwise operations on a network of IP addresses that is divided into two or more groups.
Subnetting can improve security and help to balance overall network traffic.
Every IP address has a corresponding subnet mask. The subnet mask specifies the range of the IP addresses in a group. The subnet mask looks a lot like an IP address. It is made up of four eight-bit numbers separated by periods. These numbers once again range from 0 to 255.
A common example of a subnet mask for Class C IP addresses is 255.255.255.0, the default subnet mask for many computers and network routers. When applied to subnet, a subnet mask shows the routing prefix.
IP Conflict
IP address conflict occurs when two devices on the same local physical or wireless network claim to have the same IP address. The second assignment of an address generally stops the IP functionality of one or both of the devices. Many modern operating systems notify the administrator of IP address conflicts.
Default Gateway
A default gateway serves as an access point or IP router that a networked computer uses to send information to a computer in another network or the internet.
In a home or small office environment, the default gateway is a device, such as a DSL router or cable router, that connects the local network to the Internet.
Various utility software can show the default gateway. On Windows, ipconfig may be used, while on Linux systems, netstat may be used
Preferred DNS Server
The computer on which DNS software runs is called a DNS server. Anytime your computer or its software does not know what IP address goes with a specific domain name especially you are searching on internet (Eg: www.google.com), it requests that information from your preferred DNS server.
If your preferred DNS server is unavailable, your computer requests the same information from the alternate DNS server. If both servers are unavailable, your computer fails to accomplish the things you are trying to do over the Internet.
Your home router is likely set by default to use your ISP's DNS servers. Also there are a number of third-party DNS servers available as well. Two examples are OpenDNS (208.67.220.220 and 208.67.222.222) and Google Public DNS (8.8.8.8 and 8.8.4.4)
How to Set IP in Windows
Step 1: Press Windows Key +R
Enter ncpa.cpl
Step 2: Right Click on Network Adapter and Select Properties
STEP 3: Select TCP/IP V4 and Select Properties
STEP 5: You can see a Window like this & Assign IP address and other values

Diagnostic Tools
Computer operating systems provide various diagnostic tools to examine network interfaces and address configuration. Microsoft Windows provides the command-line interface tools ipconfig and netsh and users of Linux systems may use ifconfig, netstat, route, lanstat, fstat, and iproute2 utilities to accomplish the task.
Tip:
What is a 255.255 255.0 subnet?
A class C network would have a subnet mask of 255.255.255.0 which means that 24 bits are used for the network. In CIDR notation this is designated by a /24 following the IP address. So: IP address 192.168.1.168 subnet mask 255.255.255.0 is written as: 192.168.1.168/24 in CIDR notation.
What is CIDR?
Classless Inter-Domain Routing (CIDR is a method for allocating IP addresses and IP routing.
IP address Assignment
Network Card Configuration: In old model PCs, there was a card called NIC (Network Interface card) which can be added in the PCI slot of the motherboard. Basically, A Network Interface Card (NIC) is a computer hardware component that allows a computer to connect to a network.
This card was in the form of an add-on card which could be added to the motherboard to the extended functionality. Nowadays there is no such card in use as the network module is already integrated on the motherboard or it is called 'on board'.
There are two types of NIC (Network Interface card) one is Internal network card and another is External network card. Internal network cards are of two types. The first type uses the Peripheral Component Interconnect (PCI) connection, while the second type uses Industry Standard Architecture (ISA). The external cards are mostly inserted in the USB port of PCs or the cards which does not require a wired connection.
Internal Network Interface Card :
Installation:
Procedure:
1. Remove the screws of the computer cabin cover
2. Find an unused PCI slot to insert the NIC
3. Remove the Metal slot Protector from the cabin chassis- Note that you have to find out the exact slot protector corresponding to the PCI slot (In the above figure you can see that the unused slots are protected with Metal slot protector)
4. Insert the Network card in the slot
5. Put the screw in the side of metal slot protector
6. Put the screws back in place after placing the cabin cover properly
7. Install the software if the hardware is not plug and play (Auto detected)
8. Insert the Ethernet cable's RJ 45 jack to the socket of NIC and check the connectivity
Network Card Configuration
In most cases, purchasing of Ethernet cables can be quite expensive and the lengths of the available cables will not be with the length which you need. The most common and practical way of Making Ethernet cables is easy with the required category of Ethernet cable and with RJ-45 connectors that are attached to the ends of your preferred cable length.
Components and Tools Required:
Bulk Ethernet Cable :
The commonly used network cables are classified based on the category as Cat 5, Cat 5e, Cat 6, Cat 6a, Cat7 all these have different performance levels, and therefore it is much necessary to buy or select the right cable for the right application.
Registered Jack (RJ) ; RJ45. An 8-pin/8-position plug or jack is commonly used to connect computers onto Ethernet-based local area networks (LAN). Two wiring schemes–T568A and T568B–are used to terminate the twisted-pair cable onto the connector interface. RJ 11 is used in Telephone cable connectors.
Crimping Tool :
A crimping tool is a device used to join two pieces of metal by deforming one or both of them and this causes them to hold each other. The result of the tool's work is called a crimp. A good example of crimping is the process of affixing an RJ 45 connector to the end of an Ethernet cable. RJ 45 Network cables and RJ 11 phone cables are created using these kinds of crimping tools (shown below).
STRAIGHT THROUGH and CROSSOVER
There are two kinds of Ethernet cables you can make, Straight Through and Crossover.
STRAIGHT THROUGH Ethernet cables are the standard cable used for almost all purposes, and are often called "patch cables". It is highly recommended you duplicate the color order as shown on the left. Note how the green pair is not side-by-side as are all the other pairs. This configuration allows for longer wire runs.
CROSSOVER CABLES - The purpose of a Crossover Ethernet cable is to directly connect one computer to another computer (or device) without going through a router, switch or hub.
Crimping Procedure:
1.Cut the plastic sheath about 1 inch (2.5 cm) from the
end of the cable. The crimping tool has a razor blade
that will do the trick with practice.
2.Unwind and pair similar colors
3. Pinch the wires between your fingers and straighten them out as shown. The color order is important to get correct.
4. Use side cutter / Cutter in Crimping tool itself to make a straight cut across the 8 wires to
shorten them to 1/2 Inch (1.3 cm) from the cut sleeve to
the end of the wires.
5. Carefully push all 8 colored wires into the connector. Note
the position of the blue plastic sleeve. Also, note how the
wires go all the way to the end.
6. Carefully place the connector into the Ethernet Crimper and cinch down on the handles tightly. The copper splicing tabs on the connector will pierce into each of the eight wires.
7. For Straight Through cable, repeat all steps and wire color order on the other end of the cable. For a Crossover cable, the other end will have a different color order as shown by the crossover diagram above. (Color Standard diagram).
Note the Following Wrong Ways of Crimping:
Lets Watch a Video- How to Crimp:
The outcome of this Session:
Familiarized the Crimping process and done hands-on training.
How to make an Ethernet Cable- Using Crimping
Subscribe to:
Comments (Atom)

























