Set Up Computer Network
Set Up Computer Network
Set Up Computer Network
Submitted by
October 2, 2019
Acknowledgement
This Capstone project would not have been possible if not for my Instructor, whose constant
encouragement, dedication, and commitment enabled me to successfully complete this amazing
accomplishment. It is a great pleasure to thank everybody who helped by showing me
unwavering support throughout the process. I would also like to thank all of my close friends for
their support as well as my parents and brothers for their patience and understanding while I
perused our goal. Finally I would like to thank all of my classmates for whom sharing this
experience with was an honor, and truly one of the greatest chapters of my life.
Dedication
We dedicate this study to my fellow students who will encounter this study, we hope this study
will help you a little. This study may be incomplete but we hope this will help and ease you.
Abstract
Computer Networks have become an essential tool in many aspects: human communication,
gathering, exchange and sharing of information, distributed work environments, access to
remote resources (data and computing power) and many more. Networks are complicated
interconnections of computer systems and peripherals designed to achieve the goal of sharing
digital information. A computer network consists of two or more computers that are linked
together in order to share resources such as printers, files, or electronic communications. These
computers may be linked through a network cable, router, switch or telephone line.
LO2 Set network configuration
Bus Topology
All devices are connected to a central cable, called the bus or backbone. Bus networks
are relatively inexpensive and easy to Install for small networks.
Ring Topology
All devices are connected to one another in the shape of a closed loop, so that each
device is connected directly to two other devices, one on either side of it.
Star Topology
All devices are connected to a central hub. Star networks are relatively easy to install and
manage, but bottlenecks can occur because all data must pass through the hub.
Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It consists of
groups of star-configured workstations connected to a linear bus backbone cable.
The OSI model was created to promote communication between devices of various
vendors. It also promotes communication between disparate hosts such as hosts using
different operating platforms (Windows, OSX, Linux, etc.). you are very unlikely to ever
work on a system that uses protocols conforming to the OSI reference model. But it is
essentially to know the model and its terminology because other models such as the
TCP/IP model are often compared to the OSI reference model. Hence the discussion on
this model will be limited compared to the discussion on the TCP/IP model. The OSI
reference model, like most other network models, divides the functions, protocols, and
devices of a network into various layers. The layered approach provides many benefits,
OSI reference model has seven such layers that can be divided into two groups. The
upper layers (Layers 7, 6 and 5) define how applications interact with the host interface,
with each other, and the user. The lower four layers (Layers 4, 3, 2 and 1) define how
data is transmitted between hosts in a network. Figure 1-7 shows the seven layers and
asummary of their functions.
The Open System Interconnect (OSI) is an open standard for all communication
systems.The OSI model defines a networking framework to implement protocols in seven
layers.
Physical Layer
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the
network at the electrical and mechanical level. It provides the hardware means of sending
and receiving data on a carrier, including defining cables, cards and physical aspects.
Examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
At this layer, data packets are encoded and decoded into bits. It furnishes transmission
protocol knowledge and management and handles errors in the physical layer, flow
control and frame synchronization. The data link layer is divided into two sub layers: The
Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. Examples
include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
Network Layer
This layer provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error handling, congestion
control and packet sequencing. Examples include AppleTalk DDP, IP, IPX.
Transport Layer
This layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data
transfer.Examples include SPX, TCP, UDP.
Session Layer
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. Examples include NFS, NetBios names,
RPC, SQL.
Presentation Layer
Application Layer
This layer supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered,
and any constraints on data syntax are identified. Everything at this layer is application-
specific. This layer provides application services for file transfers, e-mail, and other
network software services. Examples include WWW browsers, NFS, SNMP, Telnet,
HTTP, FTP
Ethernet is the most used networking technology for LANs today. It defines wiring and
signaling for the Physical layer of the OSI model. For the Data Link layer, it defines
frame formats and protocols. Ethernet is described as IEEE 802.3 standard. It uses Carrier
Sense Multiple Access with Collision Detection (CSMA/CD) access method and supports
speeds up to 100 Gbps. It can use coaxial, twisted pair and fiber optic cables. Ethernet
uses frames to with source and destination MAC addresses to deliver data. The term
Ethernet LAN refers to a combination of computers, switches, and different kinds of
cable that use Ethernet standard to communicate over the network. It is far the mose
popular LAN technology today. If you want to know about what is Ethernet, you must be
aware of advanced technologies like Arduino development board, Raspberry pi and
many more. Ethernet is a standard communication protocol embedded in software and
hardware devices. It is used for building a local area network. The local area network is a
computer network that interconnects a group of computers and shares the information
through cables or wires. Ethernet networks can also be wireless. Rather than using
Ethernet cable to connect the computers, wireless NICs use radio waves for two-way
communication with a wireless switch or hub. It consists of Ethernet ports, wireless
NICs, switches and hubs. Wireless network technology can be more flexible to use, but
also require extra care in configuring security.
There are several types of Ethernet networks, such as Fast Ethernet, Gigabit Ethernet, and
Switch Ethernet. A network is a group of two or more computer systems connected
together.
Peer-to-peer (P2P) computing or networking is a distributed application architecture that
partitions tasks or workloads between peers. Peers are equally privileged, equipotent
participants in the application. They are said to form a peer-to-peer network of nodes. In
its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are
connected and share resources without going through a separate server computer. A P2P
network can be an ad hoc connection—a couple of computers connected via a Universal
Serial Bus to transfer files. A P2P network also can be a permanent infrastructure that
links a half-dozen computers in a small office over copper wires. Or a P2P network can
be a network on a much grander scale in which special protocols and applications set up
direct relationships among users over the Internet. In effect, every connected PC is at
once a server and a client. There's no special network operating system residing on a
robust machine that supports special server-side applications like directory services
(specialized databases that control who has access to what). In a P2P environment, access
rights are governed by setting sharing permissions on individual machines. The biggest
difference between these two types of networks is one uses network cables and one uses
radio frequencies. A wired network allows for a faster and more secure connection and
can only be used for distances shorter than 2,000 feet. A wireless network is a lot less
secure and transmission speeds can suffer from outside interference. Although wireless
networking is a lot more mobile than wired networking the range of the network is
usually 150-300 indoors and up to 1000 feet outdoors depending on the terrain.
Wired Networks
The term 'wired' usually refers to a physical medium such as cables. These cables are of
various kinds like twisted pair, copper and fiber optics. In a wired local area network
(LAN), the networking devices are connected through Ethernet cables. Each device like
laptops, desktops, etc., has an inbuilt Ethernet card through which the data flows. A
router is a networking device used to connect a wired network. For a smaller LAN, a
single router is sufficient whereas for a larger network, multiple routers and switches are
used.
Wireless Networks
A wireless network usually refers to wireless mediums like infrared rays, electromagnetic
rays, etc. The wireless devices have sensors or antennae. The wireless networks do not
make use of a physical medium or wires for voice and data communication. The wireless
networks use Wireless Access Points or wireless routers for connectivity. The wireless
access points enable connectivity between devices with Bluetooth or WI-FI and the wired
network. In certain cases, WAPs are integrated inside the wireless routers; the standalone
wireless access points get connected to routers using an Ethernet connection (wired
connection). Most of the home networks require only one wireless router having an
inbuilt WAP, offering WI-FI access throughout your house. In places like schools,
colleges and offices, multiple wireless access points are used as these environments have
multiple devices and a wider coverage area.
In com
p uting,
a share
d
resource, or network share, is a computer resource made available from one host to other
hosts on a computer network It is a device or piece of information on a computer that can
be remotely accessed from another computer, typically via a local area network or an
enterprise intranet, transparently as if it were a resource in the local machine. Network
sharing is made possible by inter process communication over the network. Some
examples of shareable resources are computer programs, data, storage devices,
and printers. E.g. shared file access (also known as disk sharing and folder sharing),
shared printer access, shared scanner access, etc. The shared resource is called a shared
disk, shared folder or shared document. The term file sharing traditionally means shared
file access, especially in the context of operating systems and LAN and Intranet services,
for example in Microsoft Windows documentation.Though, as BitTorrent and similar
applications became available in the early 2000s, the term file sharing increasingly has
become associated with peer-to-peer file sharing over the Internet. Shared file and printer
access require an operating system on the client that supports access to resources on a
server, an operating system on the server that supports access to its resources from a
client, and an application layer (in the four or five layer TCP/IP reference model) file
sharing protocol and transport layer protocol to provide that shared access. Modern
operating systems for personal computers include distributed file systems that support file
sharing, while hand-held computing devices sometimes require additional software for
shared file access.
LO3 Set Router, WIFI, WAP and Repeater
Maintaining correct routing tables on all computers in a large internet is a difficult task;
network configuration is being modified constantly by the network managers to meet
changing needs. Mistakes in routing tables can block communication in ways that are
excruciatingly tedious to diagnose.
The physical setup for a wireless access point is pretty simple: You take it out of the box,
put it on a shelf or on top of a bookcase near a network jack and a power outlet, plug in
the power cable, and plug in the network cable. The software configuration for an access
point is a little more involved, but still not very complicated. It’s usually done via a Web
interface. To get to the configuration page for the access point, you need to know the
access point’s IP address. Then, you just type that address into the address bar of a
browser from any computer on the network.
Multifunction access points usually provide DHCP and NAT services for the networks
and double as the network’s gateway router. As a result, they typically have a private IP
address that’s at the beginning of one of the Internet’s private IP address ranges, such as
192.168.0.1 or 10.0.0.1. Consult the documentation that came with the access point to
find out more.
Basic configuration options
When you access the configuration page of your wireless access point on the Internet,
you have the following configuration options that are related to the wireless access point
functions of the device. Although these options are specific to this particular device, most
access points have similar configuration options
SSID: The Service Set Identifier used to identify the network. Most access points have
well-known defaults. You can talk yourself into thinking that your network is more
secure by changing the SSID from the default to something more obscure, but in reality,
that only protects you from first-grade hackers. By the time most hackers get into the
second grade, they learn that even the most obscure SSID is easy to get around. So leave
the SSID at the default and apply better security measures.
Allow broadcast SSID to associate? Disables the access point’s periodic broadcast of the
SSID. Normally, the access point regularly broadcasts its SSID so that wireless devices
that come within range can detect the network and join in. For a more secure network,
you can disable this function. Then, a wireless client must already know the network’s
SSID in order to join the network.
Channel: Lets you select one of 11 channels on which to broadcast. All the access points
and computers in the wireless network should use the same channel. If you find that your
network is frequently losing connections, try switching to another channel. You may be
experiencing interference from a cordless phone or other wireless device operating on the
same channel.
DHCP configuration
You can configure most multifunction access points to operate as a DHCP server. For
small networks, it’s common for the access point to also be the DHCP server for the
entire network. In that case, you need to configure the access point’s DHCP server. To
enable DHCP, you select the Enable option and then specify the other configuration
options to use for the DHCP server.
Larger networks that have more demanding DHCP requirements are likely to have a
separate DHCP server running on another computer. In that case, you can defer to the
existing server by disabling the DHCP server in the access point.
Appendices
References
https://www.dummies.com/programming/networking/configuring-a-wireless-access-
point/
https://www.ligowave.com/how-to-set-up-an-access-point
http://www.rfc-editor.org/rfc/rfc1180.txt
https://en.wikipedia.org/wiki/Router_(computing)?
fbclid=IwAR0Lr5vlCZ4019_CCCIZqGa7yzsjDoAwN3Q9qOEpnwOfEuMciP4IabwfS_
w
https://www.asc.upenn.edu/news-events/news/study-finds-linkage-between-social-
network-structure-and-brain-activity?
fbclid=IwAR2o3qTRwjvfCiOK1XL43J6ciIe8vJS2vJUnmfU3XPrPwBszX43gxkUk1a8
https://study.com/academy/lesson/routing-in-wireless-networks-access-point-
process.html?
fbclid=IwAR270krUMBXa0rhLdoRvy2c1tDV4ZeE2LrRUXE_k2VTfsJ4xbxoUv0d0w9I
https://www.freeccnastudyguide.com/study-guides/ccna/ch1/1-3-osi-reference-model/?
fbclid=IwAR1Jp5d_1CYKmZChvgbDsbrh12AfzH6HdLnvqwJAA02tLFU1LBPD3ADU
XMw
https://study-ccna.com/ethernet/?fbclid=IwAR1QbAv6KAri-
bOLGWavAE8fZrHqr8HeJ6ft47_UDTYkgxQh8t6LK_7rbB4
https://www.elprocus.com/what-is-ethernet-and-different-types-of-ethernet-networks/?
fbclid=IwAR0SgNXH-Gt3WfHsFFgEusKDwK-d8Po11dmDG9uf-
VA8kJfMuAk2IKJviTQ