Accowenting and Finance
Accowenting and Finance
Accowenting and Finance
Learning Guide # 4
Unit of Competence: Administer Network Hardware
This learning guide is developed to provide you the necessary information regarding the following
content coverage and topics –
• A Computer network is any collection of independent computers that communicate with one
another over a shared network medium.
• A System in which a number of independent Computers are linked together to share data or
information and peripherals such as hard disks and printers.
Advantage of Networking:
- Share Documents
- Exchange e-mail messages
- Live audio and video broadcast
- Using one device for many computers like printer
- Sharing external memory like Hard disk.
- Security.
Categorizing Network
1. Peer-to-Peer Networking:
Peer-to-Peer (or P2P) network is a simpler network in which each workstation has equivalent
capabilities and responsibilities. In other word a pure peer-to-peer file transfer network does not have
Peer-to-Peer computer network is a network that relies on computing power at the edges of a
connection, there is no hierarchy among the computers.
2. Client-Server Network
In the environment with more than 10 users, a peer to peer network will not adequate. There need
comes to use a dedicated computer which optimized (increase) the service of network to clients
quickly and ensure the security of files. Therefore, there will be one or more server computers which
serve other station (client) computers to optimized network system. A dedicated computer with
software that carries out some task on behalf of users.
What is Server?
Server is a dedicated computer that provide resources to Network users or Client computers.
Types of Server:
- File and Printer server
- Mail server
- Communication server
- Directory service server
- Application server
- Fax server
- Backup Server
Date: January -2015 Page 4 of 24
Compiled By: ICT Trainer
Category by Its Coverage
The term topology, or more specifically, network topology, refers to the arrangement or physical
layout of computers, cables, and other components on the network. “Topology” is the standard term
that most network professionals use when they refer to the network’s basic design. In addition, the
term “topology” you will find several other terms that are used to define a network’s:
Physical design
Diagram
Map
1. Bus Topology
It is often referred to as a “linear bus” because the computers are connected in a straight line.
This is the simplest and most common method of networking computers.
In a bus topology, all computers are connected to a shared communication line, called a trunk
or a backbone.
The computers are connected to the backbone using T-connectors.
Both ends of the backbone use terminators in order to prevent reflection of signals.
If the terminator is missing or is deliberately removed, the data transmissions are disrupted.
There is no central device or any special configuration.
Advantages
2. Star Topology
In a star topology, computers (also called nodes) connect to each other through a central
device, called a hub or a switch
A star network is a local area network (LAN) in which all nodes (workstations or other devices)
are directly connected to a common central Hub or Switch.
Every workstation is indirectly connected to each other through the central Hub or Switch.
Advantages
A star network is easy to implement.
It can be easily expanded without affecting
the network operation
Failure of a single node or the connecting
cable does not affect the entire network’s
operation.
It is easy to isolate nodes in order to
troubleshoot problems.
Disadvantages
Failure of the central device (hub or switch)
can bring down the entire network.
The length of cable required is much more
than ring and bus networks because each node is connected separately.
Cable length from the central device can be a limiting factor, depending on the type of cable
used.
3. Ring Topology
In a ring topology, each computer is connected to its neighboring computer to form a logical
ring.
Data travels in the ring in a circular fashion
from one computer to another, forming a
logical ring.
Advantages
A ring network is relatively easy to install.
There are fewer collisions because only
one computer transmits at a time.
4. Mesh Topology
In a mesh topology, all computers in the network are connected to every other computer,
forming a mesh of connections.
Each computer makes a point-to-point connection to every other computer.
If suppose, N number of devices are connected with each other in mesh topology, then
total number of dedicated links required to connect them is NC2 i.e. N(N-1)/2.
In the Figure 1, there are 6 devices connected to each other, hence total number of links
required is 6*5/2 = 15.
Advantages
A mesh network is highly reliable because
of redundant multiple paths between
computers.
The failure of a single computer or a cable
fault does not affect network operations.
Computers can be added or removed without affecting the network.
Disadvantages
It is difficult to install and troubleshoot.
It is very expensive because of the length of cable required to make multiple redundant
connections.
Only a limited number of computers can be connected in a mesh topology.
5. Hybrid Topology
It is combination of any two or more network
topologies. These instances can occur where two
basic network topologies, when connected
together, can still retain the basic network
character, and therefore not be a hybrid network.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications – feel free to ask
your teacher.
Note: Satisfactory rating –points above / Unsatisfactory - below points. You can ask you
teacher for the copy of the correct answers
Transmission Media is the physical path between the transmitter and the receiver in a data
communication system.
A. Wire/Guided Transmission Media uses a "cabling" system that guides the data signals along a
specific path. The data signals are bound by the "cabling" system. Guided Media is also known as
Bound Media. Cabling is meant in a generic sense in the previous sentences and is not meant to be
interpreted as copper wire cabling only.
B. Wireless/Unguided Transmission Media consists of a means for the data signals to travel but
nothing to guide them along a specific path. The data signals are not bound to a cabling media and
as such are often called Unbound Media.
Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.
The oldest, least expensive and most commonly used transmission media.
Unshielded twisted-pair
(UTP)
Shielded twisted-pair
(STP) cable.
Unshielded Twisted Pair (UTP):- is the most popular and is generally the best option for school
networks. The quality of UTP may vary from telephone-grade wire to high-speed cable. The cable has
four pairs of wire inside the jacket. Each pair is twisted with a different number of twists per inch to
help eliminate interference from adjacent pairs and other electrical devices.
Uses a woven copper braid jacket and higher quality protective jacket. Also uses foil wrap b/n
and around the wire pairs
Much less susceptible to interference and supports higher transmission rates than UTP
shielding makes it somewhat harder to install
same 100 meters limit as UTP
uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs.
telephone’s 4 wires)
2. Coaxial Cable
Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other
conductor woven around it providing a shield. An insulating protective coating called a jacket covers
the outer conductor.
The outer shield protects the inner conductor from outside electrical signals. The distance between
the outer conductor (shield) and inner conductor plus the type of material used for insulating the inner
conductor determine the cable properties or impedance. Typical impedances for coaxial cables are
75 ohms for Cable TV, 50 ohms for Ethernet Thinnet and Thickens. The excellent control of the
impedance characteristics of the cable allow higher data rates to be transferred than Twisted Pair
cable.
3. Optical Fiber
An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is
easier to install, but cannot carry the light pulses for as long a distance as glass.
Date: January -2015 Page 10 of 24
Compiled By: ICT Trainer
Two types of optical fiber are commonly available: single-mode and multimode.
Multimode fiber (MMF) has a larger core than single-mode. This larger core allows hundreds
of light rays to flow through the fiber simultaneously.
Single-mode fiber (SMF), on the other hand, has a small core that allows only a single light
beam to pass. The light transmissions in single-mode fiber pass through the core in a direct
line, like a flashlight beam.
The numerous light beams in multimode fiber bounce around inside the core, inching toward
their destination. Because light beams bounce within the core, the light beams slow down,
reduce in strength, and take some time to travel along the cable.
For this reason, single-mode fiber's speed and distance are superior to those of multimode.
Single-mode fiber is used for long runs because it can transmit data 50 times further than
multimode fiber and at a faster rate. For example, single-mode fiber might be used on an
organization’s corporate campus between buildings.
Multimode fiber provides high bandwidth at high speeds over medium distances (up to about
3000 feet) but can be inconsistent for very long runs.
Cabling system
Rolled Cable
you can use a rolled Ethernet cable to connect a host to a router console serial communication
(com) port.
To complete our examination of networking on a physical level, this chapter looks at the network
devices used to create networks.
Hubs
Switches
Bridges
Repeaters
Routers
Gateways
CSU/DSU
Wireless access points (WAPs)
Modems
Network interface cards (NICs)
Transceivers
Firewalls
Hub
Hubs are simple network devices, and their simplicity is reflected in their low cost.
Small hubs with four or five ports (often referred to as workgroup hubs) provide everything
needed to create a small network.
Most hubs are referred to as either active or passive.
Active regenerate a signal before forwarding it to all the ports on the device and requires a
power supply.
Passive hubs, which today are seen only on older networks, do not need power and they don't
regenerate the data signal
Switch
On the surface, a switch looks much like a hub. Despite their similar appearance, switches
are far more efficient than hubs and are far more desirable for today's network environments.
As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple
switches are often interconnected to create larger networks.
Rather than forwarding data to all the connected ports, a switch forwards data only to the port on
which the destination system is connected.
It looks at the Media Access Control (MAC) addresses of the devices connected to it to
determine the correct port. A MAC address is a unique number that is stamped into every NIC.
By forwarding data only to the system to which the data is addressed, the switch decreases
the amount of traffic on each network link dramatically.
Collisions occur on the network when two devices attempt to transmit at the same time. Such
collisions cause the performance of the network to degrade. By channeling data only to the
Date: January -2015 Page 16 of 24
Compiled By: ICT Trainer
connections that should receive it, switches reduce the number of collisions that occur on the
network.
Switches can also further improve performance over the performance of hubs by using a
mechanism called full-duplex. On a standard network connection, the communication between
the system and the hub is said to be half-duplex.
Switching Methods
Cut-through
the switch begins to forward the packet as soon as it is received.
No error checking is performed on the packet,
so the packet is moved through quickly.
the switch can propagate errors
30 times faster than store-and-forward switching
Store-and-forward
the switch waits to receive the entire packet before beginning to forward it.
also performs basic error checking.
Fragment-free
works by reading only the part of the packet that enables it to identify fragments of a
transmission.
On some managed switches, you can select the switching method you want to use.
Hubs and switches have two types of ports: medium dependent interface (MDI) or uplink port
and medium dependent interface crossed (MDI-X).
Uplink port allows you to connect two hubs and switches to create larger networks.
Bridges
Bridges are networking devices that connect networks.
Sometimes it is necessary to divide networks into subnets to reduce the amount of traffic on
each larger subnet or for security reasons.
Once divided, the bridge connects the two subnets and manages the traffic flow between
them. Today, network switches have largely replaced bridges.
Repeater
Repeaters are usually used to strengthen signals going long distances.
A repeater amplifies the signal it receives on one port before it transmits it on other ports.
Because the repeater does not check on the contents of the data it receives or retransmits,
frames that are corrupted by noise and other factors can also be repeated.
The development of the hub replaced the repeater for all practical purposes, because it
performs the same functions, and can include additional features.
Routers
Routers are network devices that literally route data around the network.
By examining data as it arrives, the router can determine the destination address for the data;
then, by using tables of defined routes, the router determines the best way for the data to
continue its journey.
Unlike bridges and switches, which use the hardware-configured MAC address to determine
the destination of the data, routers use the software-configured network address to make
decisions.
This approach makes routers more functional than bridges or switches, and it also makes them
more complex because they have to work harder to determine the information.
Gateways
The term gateway is applied to any device, system, or software application that can perform
the function of translating data from one format to another.
Actually, the term gateway refers more to a network role than a network device.
For example, a router that can route data from an IPX network to an IP network is, technically,
a gateway.
Another example of a gateway involves the Systems Network Architecture (SNA) gateway,
which converts the data format used on a PC to that used on an IBM mainframe or
minicomputer. A system that acts as an SNA gateway sits between the client PC and the
mainframe and translates requests and replies from both directions.
The definition of gateways is vague, it's because there is no definite answer. The function of a
gateway is very specific, but how the gateway functionality is implemented is not.
Transceivers
The term transceiver does not necessarily describe a separate network device but rather an
integrated technology embedded in devices.
transceiver = transmitter and a receiver
device that receives data, converts it, and then sends it to another location
RF transceivers, fiber-optic transceivers, Ethernet transceivers, are examples
can also be used in pairs to insert a fiber segment into copper networks
IP Terminology
Bit A bit is one digit, either a 1 or a 0.
Byte A byte is 7 or 8 bits, depending on whether parity is used.
Octet An octet, made up of 8 bits, is just an ordinary 8-bit binary number.
Network address This is the designation used in routing to send packets to a remote network
for example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.
You can depict an IP address using one of three methods:
Dotted-decimal, as in 172.16.30.56
Binary, as in 10101100.00010000.00011110.00111000
Hexadecimal, as in AC.10.1E.38
Private IP Addresses
Subnet Masks
A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the
network ID portion of the IP address from the host ID portion of the IP address.
The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
The 1s in the subnet mask represent the positions that refer to the network or subnet
addresses.