0% found this document useful (0 votes)
121 views19 pages

Set Up Computer Network

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 19

Set up Computer Network

ACLC College of Mandaue

Submitted by

Capasilan, Jay Michael

Quirante , John Llyod

October 2, 2019
Acknowledgement

This Capstone project would not have been possible if not for my Instructor, whose constant
encouragement, dedication, and commitment enabled me to successfully complete this amazing
accomplishment. It is a great pleasure to thank everybody who helped by showing me
unwavering support throughout the process. I would also like to thank all of my close friends for
their support as well as my parents and brothers for their patience and understanding while I
perused our goal. Finally I would like to thank all of my classmates for whom sharing this
experience with was an honor, and truly one of the greatest chapters of my life.
Dedication

We dedicate this study to my fellow students who will encounter this study, we hope this study
will help you a little. This study may be incomplete but we hope this will help and ease you.
Abstract

Computer Networks have become an essential tool in many aspects: human communication,
gathering, exchange and sharing of information, distributed work environments, access to
remote resources (data and computing power) and many more. Networks are complicated
interconnections of computer systems and peripherals designed to achieve the goal of sharing
digital information. A computer network consists of two or more computers that are linked
together in order to share resources such as printers, files, or electronic communications. These
computers may be linked through a network cable, router, switch or telephone line.
LO2 Set network configuration

 Networking fundamentals teaches computer science students the building blocks of


modern network design. Typically you will learn about the many different types of
networks, networking concepts, network architecture, network communications and
network design. Computer networking fundamentals are outlined in a clear and easy-to-
follow format you can access at your convenience. Just a few of the topics covered in the
lessons include types of computer networks, client-server networks and network
architecture. Our self-paced and mobile-friendly format make it easy for you to work on
your own schedule at any time using your tablet, smartphone or computer. 
 Network topology refers to the shape or the arrangement of the different elements in a
computer network (i.e. links and nodes).  Network Topology defines how different nodes
in a network are connected to each other and how they communicate is determined by the
network's topology. Topologies are either physical or logical. There are four principal
topologies used in LANs.

Bus Topology
All devices are connected to a central cable, called the bus or backbone. Bus networks
are relatively inexpensive and easy to Install for small networks.

Ring Topology
All devices are connected to one another in the shape of a closed loop, so that each
device is connected directly to two other devices, one on either side of it.
Star Topology
All devices are connected to a central hub. Star networks are relatively easy to install and
manage, but bottlenecks can occur because all data must pass through the hub.
Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It consists of
groups of star-configured workstations connected to a linear bus backbone cable.
 The OSI model was created to promote communication between devices of various
vendors. It also promotes communication between disparate hosts such as hosts using
different operating platforms (Windows, OSX, Linux, etc.). you are very unlikely to ever
work on a system that uses protocols conforming to the OSI reference model.  But it is
essentially to know the model and its terminology because other models such as the
TCP/IP model are often compared to the OSI reference model. Hence the discussion on
this model will be limited compared to the discussion on the TCP/IP model. The OSI
reference model, like most other network models, divides the functions, protocols, and
devices of a network into various layers. The layered approach provides many benefits,
OSI reference model has seven such layers that can be divided into two groups. The
upper layers (Layers 7, 6 and 5) define how applications interact with the host interface,
with each other, and the user. The lower four layers (Layers 4, 3, 2 and 1) define how
data is transmitted between hosts in a network. Figure 1-7 shows the seven layers and
asummary of their functions.

The 7 Layers of the OSI Model

The Open System Interconnect (OSI) is an open standard for all communication
systems.The OSI model defines a networking framework to implement protocols in seven
layers.

Physical Layer 

This layer conveys the bit stream - electrical impulse, light or radio signal -- through the
network at the electrical and mechanical level. It provides the hardware means of sending
and receiving data on a carrier, including defining cables, cards and physical aspects.
Examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.

Data Link Layer 

At this layer, data packets are encoded and decoded into bits. It furnishes transmission
protocol knowledge and management and handles errors in the physical layer, flow
control and frame synchronization. The data link layer is divided into two sub layers: The
Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. Examples
include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
Network Layer

This layer provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error handling, congestion
control and packet sequencing. Examples include AppleTalk DDP, IP, IPX.

Transport Layer

This layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data
transfer.Examples include SPX, TCP, UDP.

Session Layer

This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. Examples include NFS, NetBios names,
RPC, SQL.

Presentation Layer

This layer provides independence from differences in data representation (e.g.,


encryption) by translating from application to network format, and vice versa. This layer
formats and encrypts data to be sent across a network, providing freedom from
compatibility problems. Examples include encryption, ASCII, EBCDIC, TIFF, GIF,
PICT, JPEG, MPEG, MIDI.

Application Layer

This layer supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered,
and any constraints on data syntax are identified. Everything at this layer is application-
specific. This layer provides application services for file transfers, e-mail, and other
network software services. Examples include WWW browsers, NFS, SNMP, Telnet,
HTTP, FTP
 Ethernet is the most used networking technology for LANs today. It defines wiring and
signaling for the Physical layer of the OSI model. For the Data Link layer, it defines
frame formats and protocols. Ethernet is described as IEEE 802.3 standard. It uses Carrier
Sense Multiple Access with Collision Detection (CSMA/CD) access method and supports
speeds up to 100 Gbps. It can use coaxial, twisted pair and fiber optic cables. Ethernet
uses frames to with source and destination MAC addresses to deliver data. The term
Ethernet LAN refers to a combination of computers, switches, and different kinds of
cable that use Ethernet standard to communicate over the network. It is far the mose
popular LAN technology today. If you want to know about what is Ethernet, you must be
aware of advanced technologies like  Arduino development board, Raspberry pi and
many more.  Ethernet is a standard communication protocol embedded in software and
hardware devices. It is used for building a local area network. The local area network is a
computer network that interconnects a group of computers and shares the information
through cables or wires. Ethernet networks can also be wireless. Rather than using
Ethernet cable to connect the computers, wireless NICs use radio waves for two-way
communication with a wireless switch or hub. It consists of Ethernet ports, wireless
NICs, switches and hubs. Wireless network technology can be more flexible to use, but
also require extra care in configuring security.

There are several types of Ethernet networks, such as Fast Ethernet, Gigabit Ethernet, and
Switch Ethernet. A network is a group of two or more computer systems connected
together.
 Peer-to-peer (P2P) computing or networking is a distributed application architecture that
partitions tasks or workloads between peers. Peers are equally privileged, equipotent
participants in the application. They are said to form a peer-to-peer network of nodes. In
its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are
connected and share resources without going through a separate server computer. A P2P
network can be an ad hoc connection—a couple of computers connected via a Universal
Serial Bus to transfer files. A P2P network also can be a permanent infrastructure that
links a half-dozen computers in a small office over copper wires. Or a P2P network can
be a network on a much grander scale in which special protocols and applications set up
direct relationships among users over the Internet. In effect, every connected PC is at
once a server and a client. There's no special network operating system residing on a
robust machine that supports special server-side applications like directory services
(specialized databases that control who has access to what). In a P2P environment, access
rights are governed by setting sharing permissions on individual machines. The biggest
difference between these two types of networks is one uses network cables and one uses
radio frequencies. A wired network allows for a faster and more secure connection and
can only be used for distances shorter than 2,000 feet. A wireless network is a lot less
secure and transmission speeds can suffer from outside interference. Although wireless
networking is a lot more mobile than wired networking the range of the network is
usually 150-300 indoors and up to 1000 feet outdoors depending on the terrain.

Wired Networks
The term 'wired' usually refers to a physical medium such as cables. These cables are of
various kinds like twisted pair, copper and fiber optics. In a wired local area network
(LAN), the networking devices are connected through Ethernet cables. Each device like
laptops, desktops, etc., has an inbuilt Ethernet card through which the data flows. A
router is a networking device used to connect a wired network. For a smaller LAN, a
single router is sufficient whereas for a larger network, multiple routers and switches are
used.

Wireless Networks
A wireless network usually refers to wireless mediums like infrared rays, electromagnetic
rays, etc. The wireless devices have sensors or antennae. The wireless networks do not
make use of a physical medium or wires for voice and data communication. The wireless
networks use Wireless Access Points or wireless routers for connectivity. The wireless
access points enable connectivity between devices with Bluetooth or WI-FI and the wired
network. In certain cases, WAPs are integrated inside the wireless routers; the standalone
wireless access points get connected to routers using an Ethernet connection (wired
connection). Most of the home networks require only one wireless router having an
inbuilt WAP, offering WI-FI access throughout your house. In places like schools,
colleges and offices, multiple wireless access points are used as these environments have
multiple devices and a wider coverage area.
 In com
p uting,
a share
d
resource, or network share, is a computer resource made available from one host to other
hosts on a computer network It is a device or piece of information on a computer that can
be remotely accessed from another computer, typically via a local area network or an
enterprise intranet, transparently as if it were a resource in the local machine. Network
sharing is made possible by inter process communication over the network. Some
examples of shareable resources are computer programs, data, storage devices,
and printers. E.g. shared file access (also known as disk sharing and folder sharing),
shared printer access, shared scanner access, etc. The shared resource is called a shared
disk, shared folder or shared document. The term file sharing traditionally means shared
file access, especially in the context of operating systems and LAN and Intranet services,
for example in Microsoft Windows documentation.Though, as BitTorrent and similar
applications became available in the early 2000s, the term file sharing increasingly has
become associated with peer-to-peer file sharing over the Internet. Shared file and printer
access require an operating system on the client that supports access to resources on a
server, an operating system on the server that supports access to its resources from a
client, and an application layer (in the four or five layer TCP/IP reference model) file
sharing protocol and transport layer protocol to provide that shared access. Modern
operating systems for personal computers include distributed file systems that support file
sharing, while hand-held computing devices sometimes require additional software for
shared file access.
LO3 Set Router, WIFI, WAP and Repeater

 A router  is a networking device that forwards data packets between computer networks.


Routers perform the traffic directing functions on the Internet. Data sent through the
internet, such as a web page or email, is in the form of data packets. A packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork (e.g. the Internet) until it reaches its destination node.
A router is connected to two or more data lines from different IP networks. When a data
packet comes in on one of the lines, the router reads the network address information in
the packet header to determine the ultimate destination. Then, using information in
its routing table or routing policy, it directs the packet to the next network on its journey.
Routers are also often distinguished on the basis of the network in which they operate. A
router in a local area network (LAN) of a single organisation is called an interior router.
A router that is operated in the Internet backbone is described as exterior router. While a
router that connects a LAN with the Internet or a wide area network (WAN) is called
a border router, or gateway router.
When a IP packet travels through a large internet it may go through many IP-routers
before it reaches its destination. The path it takes is not determined by a central source
but is a result of consulting each of the routing tables used in the journey. Each computer
defines only the next hop in the journey and relies on that computerto send the IP packet
on its way.

Maintaining correct routing tables on all computers in a large internet is a difficult task;
network configuration is being modified constantly by the network managers to meet
changing needs. Mistakes in routing tables can block communication in ways that are
excruciatingly tedious to diagnose.
 The physical setup for a wireless access point is pretty simple: You take it out of the box,
put it on a shelf or on top of a bookcase near a network jack and a power outlet, plug in
the power cable, and plug in the network cable. The software configuration for an access
point is a little more involved, but still not very complicated. It’s usually done via a Web
interface. To get to the configuration page for the access point, you need to know the
access point’s IP address. Then, you just type that address into the address bar of a
browser from any computer on the network.

Multifunction access points usually provide DHCP and NAT services for the networks
and double as the network’s gateway router. As a result, they typically have a private IP
address that’s at the beginning of one of the Internet’s private IP address ranges, such as
192.168.0.1 or 10.0.0.1. Consult the documentation that came with the access point to
find out more.
Basic configuration options

When you access the configuration page of your wireless access point on the Internet,
you have the following configuration options that are related to the wireless access point
functions of the device. Although these options are specific to this particular device, most
access points have similar configuration options

Enable/Disable: Enables or disables the device’s wireless access point functions.

SSID: The Service Set Identifier used to identify the network. Most access points have
well-known defaults. You can talk yourself into thinking that your network is more
secure by changing the SSID from the default to something more obscure, but in reality,
that only protects you from first-grade hackers. By the time most hackers get into the
second grade, they learn that even the most obscure SSID is easy to get around. So leave
the SSID at the default and apply better security measures.

Allow broadcast SSID to associate? Disables the access point’s periodic broadcast of the
SSID. Normally, the access point regularly broadcasts its SSID so that wireless devices
that come within range can detect the network and join in. For a more secure network,
you can disable this function. Then, a wireless client must already know the network’s
SSID in order to join the network.
Channel: Lets you select one of 11 channels on which to broadcast. All the access points
and computers in the wireless network should use the same channel. If you find that your
network is frequently losing connections, try switching to another channel. You may be
experiencing interference from a cordless phone or other wireless device operating on the
same channel.

WEP — Mandatory or Disable: Lets you use a security protocol called wired equivalent


privacy.

DHCP configuration

You can configure most multifunction access points to operate as a DHCP server. For
small networks, it’s common for the access point to also be the DHCP server for the
entire network. In that case, you need to configure the access point’s DHCP server. To
enable DHCP, you select the Enable option and then specify the other configuration
options to use for the DHCP server.

Larger networks that have more demanding DHCP requirements are likely to have a
separate DHCP server running on another computer. In that case, you can defer to the
existing server by disabling the DHCP server in the access point.
Appendices

References

https://www.dummies.com/programming/networking/configuring-a-wireless-access-
point/

https://www.ligowave.com/how-to-set-up-an-access-point

http://www.rfc-editor.org/rfc/rfc1180.txt
https://en.wikipedia.org/wiki/Router_(computing)?
fbclid=IwAR0Lr5vlCZ4019_CCCIZqGa7yzsjDoAwN3Q9qOEpnwOfEuMciP4IabwfS_
w

https://www.asc.upenn.edu/news-events/news/study-finds-linkage-between-social-
network-structure-and-brain-activity?
fbclid=IwAR2o3qTRwjvfCiOK1XL43J6ciIe8vJS2vJUnmfU3XPrPwBszX43gxkUk1a8

https://study.com/academy/lesson/routing-in-wireless-networks-access-point-
process.html?
fbclid=IwAR270krUMBXa0rhLdoRvy2c1tDV4ZeE2LrRUXE_k2VTfsJ4xbxoUv0d0w9I

https://www.freeccnastudyguide.com/study-guides/ccna/ch1/1-3-osi-reference-model/?
fbclid=IwAR1Jp5d_1CYKmZChvgbDsbrh12AfzH6HdLnvqwJAA02tLFU1LBPD3ADU
XMw

https://study-ccna.com/ethernet/?fbclid=IwAR1QbAv6KAri-
bOLGWavAE8fZrHqr8HeJ6ft47_UDTYkgxQh8t6LK_7rbB4

https://www.elprocus.com/what-is-ethernet-and-different-types-of-ethernet-networks/?
fbclid=IwAR0SgNXH-Gt3WfHsFFgEusKDwK-d8Po11dmDG9uf-
VA8kJfMuAk2IKJviTQ

You might also like