0% found this document useful (0 votes)
41 views19 pages

Administrate Net Work and Hard Warw

This document provides an overview of network administration topics, including: 1. It defines what a computer network is and lists advantages of networking such as sharing documents and printers. 2. Networks can be categorized by relationship (peer-to-peer, client-server), coverage (LAN, MAN, WAN), and topology (bus, star, ring, mesh, hybrid). 3. Specific network types are described, such as peer-to-peer having no dedicated server and client-server having a centralized server for resources.

Uploaded by

AbdissaTadese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views19 pages

Administrate Net Work and Hard Warw

This document provides an overview of network administration topics, including: 1. It defines what a computer network is and lists advantages of networking such as sharing documents and printers. 2. Networks can be categorized by relationship (peer-to-peer, client-server), coverage (LAN, MAN, WAN), and topology (bus, star, ring, mesh, hybrid). 3. Specific network types are described, such as peer-to-peer having no dedicated server and client-server having a centralized server for resources.

Uploaded by

AbdissaTadese
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

NekemteTVET College

Web Development and Database AdministrationLevel II


LEARNING MODULE 02
TVET-PROGRAMME TITLE: Web Development and Database Administration Level II
Module Title: Administrating Network and Hardware Peripherals
Module Code: EIS WDDBA2 M02 0322

LEARNING OUTCOMES
At the end of the module the trainee will be able to:
LO1. Confirm requirements of client
LO2. Obtain required peripherals
LO3. Connect hardware peripherals
LO4. Install peripherals to a network
LO5. Configure peripheral services
LO6. Administer and support peripheral services
LO7. Maintain peripherals and fix common problems
LO8. Use and maximize operating system
TTLM Development Manual Date: 7-3-2023 G.C Page 1 of 19
Author: Instructors Terefe F.
LO9. Support input and output devices

This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics –
 What is computer network?
 Categorizing network
 Network transmission media
*Your teacher will evaluate your output either satisfactory or unsatisfactory. Ifunsatisfactory, your teacher shall
advice you on additional work. But if satisfactoryyou can proceed to the next topic.
What is computer network?
• A Computer network is any collection of independent computers that communicate with one another
over a shared network medium.
• A System in which a number of independent Computers are linked together to share data or information
and peripherals such as hard disks and printers.
When computers and other devices connected together is called a Network.
- The concept of connected computers sharing resources such like files and/or peripheral devices (Printer,
Scanner) is called Networking.
Advantage of Networking:
- Share Documents
- Exchange e-mail messages
- Live audio and video broadcast
- Using one device for many computers like printer
- Sharing external memory like Hard disk.
- Security.
Categorizing Network
Categorizing network by Functional Relationship:
1. Peer-to-Peer
2. Client-Server
Categorizing network by Its Coverage:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3. WAN (Wind Area Network)
Categorizing network by Network Topology:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Hybrid Topology
Category by Functional Relationship:
1. Peer-to-Peer Networking:
Peer-to-Peer (or P2P) network is a simpler network in which each workstation has equivalent capabilities and
responsibilities. In other word a pure peer-to-peer file transfer network does not have the notion of clients or
servers, but only equal peer nodes that simultaneously function as both "clients" and "servers“.
TTLM Development Manual Date: 7-3-2023 G.C Page 2 of 19
Author: Instructors Terefe F.
Peer-to-Peer computer network is a network that relies on computing power at the edges of a connection, there
is no hierarchy among the computers.
Advantages of a peer-to-peer network
 Less initial capital – no need for a dedicated server
 No need for system administration (administrator)
 Setup – an operating system (such as windows XP) already in place may only need to be configured for
peer-to-peer operations.
 The way security established – users can set their own security and shared resources can exist on any
computer rather than a centralized server only.
Disadvantages of a peer-to-peer network
 Decentralized – no central repository for the files and application.
 Security – does not provide the security available on a client/server network.
2. Client-Server Network
In the environment with more than 10 users, a peer to peer network will not adequate. There need comes to use
a dedicated computer which optimized (increase) the service of network to clients quickly and ensure the
security of files. Therefore, there will be one or more server computers which serve other station (client)
computers to optimized network system. A dedicated computer with software that carries out some task on
behalf of users.
What is Server?
 Server is a dedicated computer that provide resources to Network users or Client computers.
Advantages of server-based network
 Centralized – resources and data security are controlled through the server
 Scalability – any or all elements can be replaced individually as need increase.
 Flexibility – new technology can be easily integrated into system
 Interoperability – all components (client/network/server) work together
 Accessibility – server can be accessed remotely and across multiple platforms.
Disadvantages of server-Based computer networks
 Expensive – requires initial investment in dedicated server
 Maintenance – large networks will require a staff to ensure efficient operations
 Dependence- when a server goes down, operations will cease across the network.
 Server may fail- incase the server failed, the entire network goes down
Types of Server:
- File and Printer server - Application server
- Mail server - Fax server
- Communication server - Backup Server
- Directory service server
Category by Its Coverage
1. LAN (Local Area Network)
 A Local Area Network (LAN) is a network that is confined (restricted) to a relatively small area. It is
generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN
computers more than aA kilometer apart.
 When using Ethernet the computers are usually wired to a hub or to a switch.
2. MAN (Metropolitan Area Network):
 Is a network that interconnects users with computer resources in a geographic area or region larger than
that covered by even a large local area network (LAN) but smaller than the area covered by a wide area
network (WAN).
 The term is applied to the interconnection of networks in a city or town into a single larger network.
3. WAN (Wide Area Networks)

TTLM Development Manual Date: 7-3-2023 G.C Page 3 of 19


Author: Instructors Terefe F.
 Often a network (LAN) is located in multiple physical places. Wide area networking combines multiple
LANs that are geographically separate. This is accomplished by connecting the different LANs using
services such as dedicated leased phone lines, dial-up phone lines, satellite links, and data packet carrier
services.
 Wide area networking can be as simple as a modem and remote access server for employees to dial into,
or it can be as complex as hundreds of branch offices globally linked using special routing protocols and
filters to minimize the expense of sending data sent over vast distances. Example Internet.

Categorizing network by Network Topology:


The term topology, or more specifically, network topology, refers to the arrangement or physical layout of
computers, cables, and other components on the network. “Topology” is the standard term that most network
professionals use when they refer to the network’s basic design. In addition, the term “topology” you will find
several other terms that are used to define a network’s:
 Physical design
 Diagram
 Map
1. Bus Topology
 It is often referred to as a “linear bus” because the computers are connected in a straight line. This is the
simplest and most common method of networking computers.
 BookIn a bus topology, all computers are connected to a shared communication line, called a trunk or a
backbone.
 The computers are connected to the backbone using T-connectors.
 Both ends of the backbone use terminators in order to prevent reflection of signals.
 If the terminator is missing or is deliberately removed, the data transmissions are disrupted.
 There is no central device or any special configuration.
Advantages
 A bus network is the cheapest of all topologies.
 No special configuration is required.
 It is easy to install, and no special equipment is
needed for installation.
 It needs less cable length than do other topologies.
Disadvantages
 A break in cable or a missing terminator can
bring down the entire network.
 It is not possible to add or remove computers
without disrupting the network.
 It is difficult to troubleshoot and administer.
 Addition of more computers degrades performance.
2. Star Topology
 In a star topology, computers (also called nodes) connect to each other through a central device, called a
hub or a switch
 A star network is a local area network (LAN) in which all nodes (workstations or other devices) are
directly connected to a common central Hub or Switch.
 Every workstation is indirectly connected to each other through the central Hub or Switch.
Advantages
 A star network is easy to implement.
 It can be easily expanded without affecting
the network operation
 Failure of a single node or the connecting
cable does not affect the entire network’s
TTLM Development Manual Date: 7-3-2023 G.C Page 4 of 19
Author: Instructors Terefe F.
operation.
 It is easy to isolate nodes in order to
troubleshoot problems.
Disadvantages
 Failure of the central device (hub or switch)
can bring down the entire network.
 The length of cable required is much more
than ring and bus networks because each node is connected separately.
 Cable length from the central device can be a limiting factor, depending on the type of cable used.
3. Ring Topology
 In a ring topology, each computer is connected to its neighboring computer to form a logical ring.
 Data travels in the ring in a circular fashion
from one computer to another, forming a
logical ring.
Advantages
 A ring network is relatively easy to install.
 There are fewer collisions because only
one computer transmits at a time.
Disadvantages
 A break-in cable or a faulty computer can
bring down the entire network.
 It is not as efficient as a star network.
 It is difficult to troubleshoot a ring network.
 The addition or removal of computers can disrupt network operation
4. Mesh Topology
 In a mesh topology, all computers in the network are connected to every other computer, forming a
mesh of connections.
 Each computer makes a point-to-point connection to every other computer.
Two types of mesh topology
 In the full mesh topology, each node (workstation or other device) is
connected directly to each of the others.
 In the partial mesh topology, some nodes are connected to all the
others, but some of the nodes are connected only to those other nodes
with which they exchange the most data.
Advantages
 A mesh network is highly reliable because of redundant multiple paths between computers.
 The failure of a single computer or a cable fault does not affect network operations.
 Computers can be added or removed without affecting the network.
Disadvantages
 It is difficult to install and troubleshoot.
 It is very expensive because of the length of cable required to make multiple redundant connections.
 Only a limited number of computers can be connected in a mesh topology.
5. Hybrid Topology
It is combination of any two or more network topologies.
These instances can occur where two
basic network topologies, when connected together,can still
retain the basic network character, and therefore not be a
hybrid network.
Network Transmission Media

TTLM Development Manual Date: 7-3-2023 G.C Page 5 of 19


Author: Instructors Terefe F.
Transmission Media is the physical path between the transmitter and the receiver in a data communication
system.
There are 2 basic categories of Transmission Media:
A. Wire/Guided
B. Wireless/Unguided.
A. Wire/Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path.
The data signals are bound by the "cabling" system. Guided Media is also known as Bound Media. Cabling is
meant in a generic sense in the previous sentences and is not meant to be interpreted as copper wire cabling
only.
B. Wireless/UnguidedTransmission Media consists of a means for the data signals to travel but nothing to guide
them along a specific path. The data signals are not bound to a cabling media and as such are often called
Unbound Media.
Commonly there are three types of guided transmission cable:-
1. Twisted Pair Cable
2. Coaxial Cable
3. Optical fiber cable
1. Twisted pair cable
Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.
The oldest, least expensive and most commonly used transmission media.
Two types of twisted-pair cable:-
 Unshielded twisted-pair(UTP)
 Shielded twisted-pair(STP) cable.

Unshielded Twisted Pair (UTP):- is the most popular and is generally the best option for school networks. The
quality of UTP may vary from telephone-grade wire to high-speed cable. The cable has four pairs of wire inside
the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from
adjacent pairs and other electrical devices.
 It is the most commonly used cable types in LANs.
 It is made up of four twisted pairs enclosed in a plastic jacket.
 Depending on the bandwidth offered there are seven types of UTP cables such as Cat-1,Cat-2,cat-3,cat-4,cat-
5,cat-6 and cat-7
 The Most commonly used UTP cables are category-5 cables and its bandwidth is 1000Mbps.

Shielded Twisted Pair (STP) cable


 Uses a woven copper braid jacket and higher quality protective jacket. Also uses foil wrap b/n and
around the wire pairs
 Much less susceptible to interference and supports higher transmission rates than UTP
 shielding makes it somewhat harder to install
 same 100 meters limit as UTP
 uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs. telephone’s
4 wires)

2. Coaxial Cable
Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other conductor
woven around it providing a shield. An insulating protective coating called a jacket covers the outer conductor.
The outer shield protects the inner conductor from outside electrical signals. The distance between the outer
conductor (shield) and inner conductor plus the type of material used for insulating the inner conductor
determine the cable properties or impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV,
TTLM Development Manual Date: 7-3-2023 G.C Page 6 of 19
Author: Instructors Terefe F.
50 ohms for Ethernet Thinnet and Thicknet. The excellent control of the impedance characteristics of the cable
allow higher data rates to be transferred than Twisted Pair cable.

3. Optical Fiber
An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric layer
of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is easier to install, but cannot
carry the light pulses for as long a distance as glass.

Two types of optical fiber are commonly available: single-mode and multimode.
 Multimode fiber (MMF) has a larger core than single-mode. This larger core allows hundreds of light
rays to flow through the fiber simultaneously.
 Single-mode fiber (SMF), on the other hand, has a small core that allows only a single light beam to
pass. The light transmissions in single-mode fiber pass through the core in a direct line, like a flashlight
beam.
 The numerous ligt beams in multimode fiber bounce around inside the core, inching toward their
destination. Because light beams bounce within the core, the light beams slow down, reduce in strength,
and take some time to travel along the cable.
For this reason, single-mode fiber's speed and distance are superior to those of multimode.
 Single-mode fiber is used for long runs because it can transmit data 50 times further than multimode
fiber and at a faster rate. For example, single-mode fiber might be used on an organization’s corporate
campus between buildings.
 Multimode fiber provides high bandwidth at high
speeds over medium distances (up to about 3000
feet) but can be inconsistent for very long runs.

LAN cables and connectors

Cable Type Maximum Maximum Advantages Disadvantages Connector


Speed Cable length used
STP 100Mbps 185m Resistant to EMI Expensive D-shell
connector
Utp 100Mbps 185m Inexpensive Not resistant to EMI RJ-45
Easy to install connector
Resistant to physical
stress
Coaxial 10Mbps 185m, 500m or 10 km Easy to install Not resistant to physical BNC
Less sensitive to EMI stress Connector
than UTP/STP Expensive compared to T-connector
UTP Terminator
Optical Fiber 155Mbps- 10km depending on the Resistant to EMI Expensive SMA connector
TTLM Development Manual Date: 7-3-2023 G.C Page 7 of 19
Author: Instructors Terefe F.
1000Mbps fiber type High data transfer rate Difficult to install

Cabling system
Two cables at each work area:
• Voice:
– Unshielded twisted-pair, UTP cable.
• Data:
– Shielded twisted-pair, STP cable.
– Unshielded twisted-pair, UTP cable.
– Fiber-optic cable.
– Coaxial cable.
Three types of Ethernet cables are available:
• Straight-through cable
• Crossover cable
• Rolled cable
Making Ethernet 10Base-T cables:
– Straight-thru cable: PC-to-HUB.
– Crossover cable: PC-to-PC.
• Making console cables:
– Rollover cable:
Serial port-to-console port of Cisco equipment

10Base-T: NIC network port 10Base-T: HUB network port

10Base-T: T568-B
10Base-T: T568-A

TTLM Development Manual Date: 7-3-2023 G.C Page 8 of 19


Author: Instructors Terefe F.
10Base-T: Straight-Through cable

10Base-T: Crossover cable

The straight-through cable is used to connect


 Host to switch or hub
 Router to switch or hub

The crossover cable can be used to connect


TTLM Development Manual Date: 7-3-2023 G.C Page 9 of 19
Author: Instructors Terefe F.
 Switch to switch
 Hub to hub
 Host to host
 Hub to switch
 Router direct to host

Rolled Cable
 you can use a rolled Ethernet cable to connect a host to a router console serial communication (com)
port.

Networking Components and Devices


To complete our examination of networking on a physical level, this chapter looks at the network devices used
to create networks.
 Hubs
 Switches
 Bridges
 Repeaters
 Routers
 Gateways
 Wireless access points (WAPs)
 Modems
 Network interface cards (NICs)
 Firewalls
Hub
 Hubs are simple network devices, and their simplicity is reflected in their low cost.
 Small hubs with four or five ports (often referred to as workgroup hubs) provide everything needed to
create a small network.
 Most hubs are referred to as either active or passive.
 Active regenerate a signal before forwarding it to all the ports on the device and requires a power
supply.
 Passive hubs, which today are seen only on older networks, do not need power and they don't regenerate
the data signal

TTLM Development Manual Date: 7-3-2023 G.C Page 10 of 19


Author: Instructors Terefe F.
The basic function of a hub is to take data from one of the connected devices and forward it to all the other ports
on the hub. The method of sending data to all systems regardless of the intended recipient is referred to as
broadcasting.

Switch
 On the surface, a switch looks much like a hub. Despite their similar appearance, switches are far more
efficient than hubs and are far more desirable for today's network environments.
 As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple switches are
often

 Interconnected to create larger networks.

Rather than forwarding data to all the connected ports, a switch forwards data only to the port on which the
destination system is connected.
 It looks at the Media Access Control (MAC) addresses of the devices connected to it to determine the
correct port. A MAC address is a unique number that is stamped into every NIC. By forwarding data
only to the system to which the data is addressed, the switch decreases the amount of traffic on each
network link dramatically.

TTLM Development Manual Date: 7-3-2023 G.C Page 11 of 19


Author: Instructors Terefe F.
 Collisions occur on the network when two devices attempt to transmit at the same time. Such collisions
cause the performance of the network to degrade. By channeling data only to the connections that should
receive it, switches reduce the number of collisions that occur on the network.
 Switches can also further improve performance over the performance of hubs by using a mechanism
called full-duplex. On a standard network connection, the communication between the system and the
hub is said to be half-duplex.

Switching Methods
Cut-through
 the switch begins to forward the packet as soon as it is received.
 No error checking is performed on the packet,
 so the packet is moved through quickly.
 the switch can propagate errors
 30 times faster than store-and-forward switching
Store-and-forward
 The switch waits to receive the entire packet before beginning to forward it.
 Also performs basic error checking.
Fragment-free
 Works by reading only the part of the packet that enables it to identify fragments of a
transmission.
 On some managed switches, you can select the switching method you want to use.
Working with Hubs and Switches
 Hubs and switches have two types of ports: medium dependent interface (MDI) or uplink port and
medium dependent interface crossed (MDI-X).
 Uplink port allows you to connect two hubs and switches to create larger networks.

Bridges
 Bridges are networking devices that connect networks.
 Sometimes it is necessary to divide networks into subnets to reduce the amount of traffic on each larger
subnet or for security reasons.
 Once divided, the bridge connects the two subnets and manages the traffic flow between them. Today,
network switches have largely replaced bridges.

TTLM Development Manual Date: 7-3-2023 G.C Page 12 of 19


Author: Instructors Terefe F.
 A bridge functions by blocking or forwarding data, based on the destination MAC address written into
each frame of data.
 If the bridge believes the destination address is on a network other than that from which the data was
received, it can forward the data to the other networks to which it is connected.
 If the address is not on the other side of the bridge, the data is blocked from passing. Bridges "learn" the
MAC addresses of devices on connected networks by "listening" to network traffic and recording the
network from which the traffic originates.
 The advantages of bridges are simple and significant. By preventing unnecessary traffic from crossing
onto other network segments, a bridge can dramatically reduce the amount of network traffic on a
segment.

Repeater
 Repeaters are usually used to strengthen signals going long distances.
 A repeater amplifies the signal it receives on one port before it transmits it on other ports.
 Because the repeater does not check on the contents of the data it receives or retransmits, frames that are
corrupted by noise and other factors can also be repeated.
 The development of the hub replaced the repeater for all practical purposes, because it performs the
same functions, and can include additional features.
Routers
 Routers are network devices that literally route data around the network.
 By examining data as it arrives, the router can determine the destination address for the data; then, by
using tables of defined routes, the router determines the best way for the data to continue its journey.
 Unlike bridges and switches, which use the hardware-configured MAC address to determine the
destination of the data, routers use the software-configured network address to make decisions.
 This approach makes routers more functional than bridges or switches, and it also makes them more
complex because they have to work harder to determine the information.

 A router is used to provide connectivity across wide area network (WAN) links and route information
between two LAN segments.

TTLM Development Manual Date: 7-3-2023 G.C Page 13 of 19


Author: Instructors Terefe F.
 The figure below shows a router with two LAN ports (marked AUI 0 and AUI 1) and two WAN ports
(marked Serial 0 and Serial 1). This router is capable of routing data between two LAN segments and
two WAN segments.

Modems
 Modem is a contraction of the terms modulator and demodulator.
 Modems perform a simple function: They translate digital
signals from a computer into analog signals that can travel
across conventional phone lines.
 Modems provide a relatively slow method of
communication. In fact, the fastest modem available on the
market today has a maximum speed of 56Kbps.
 available as
o internal devices that plug into PCI/ISA slots
o external devices that plug into serial or USB ports;
o PCMCIA cards designed for use in laptops
Network Interface Cards (NICs)
 NICs are the mechanisms by which computers connect to a
network.

TTLM Development Manual Date: 7-3-2023 G.C Page 14 of 19


Author: Instructors Terefe F.
 NICs come in all shapes and sizes, and they come in prices to suit all budgets.
 Known as network card, network adapter, and LAN adapter, etc.
 When buying one consider
o Network compatibility – Ethernet/Token Ring
o Bus compatibility – PCI/ ISA /PCI-e
o Port compatibility – UTP/ Fibre
o Hardware compatibility – Easy to install / Recognized by many OS’s
Wireless Access Point (WAP)
 Are a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals.
 Depending on the size of the network, one or
more WAPs may be required. Additional WAPs
are used to allow access to more wireless clients
and to expand the range of the wireless network.
 Communication depends on
o Distance between the client and the WAP
o Environmental conditions

Firewall
 a hardware or software system that is used to separate one computer or network from another one.
 The most common type is used to protect a computer or an entire network from unauthorized access
from the Internet.
 can also be used to control the flow of data to and from multiple networks within the same organization.
Firewalls
 can be programmed to filter data packets based on the information that is contained in the packets.

Summary of the three classes of networks

Network Address Range: Class A


 0xxxxxxx
 00000000 = 0
TTLM Development Manual Date: 7-3-2023 G.C Page 15 of 19
Author: Instructors Terefe F.
 01111111 = 127
Network Address Range: Class B
 10000000 = 128
 10111111 = 191
Network Address Range: Class C
 11000000 = 192
 11011111 = 223
Network Address Ranges: Classes D and E
 The addresses between 224 to 255 are reserved for Class D and E networks.
 Class D (224–239) is used for multicast addresses and Class E (240–255) for scientific purposes
Private IP Addresses

Subnet Masks
 A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the network ID
portion of the IP address from the host ID portion of the IP address.
 The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
 The 1s in the subnet mask represent the

IP Addressing

IP addresses are divided into classes to define the large, medium,


and small networks. Class A addresses are assigned to larger
networks. Class B addresses are used for medium-sized networks,
and Class C for small networks. The first step in determining
which part of the address identifies the network and which part
identifies the host is identifying the class of an IP address

positions that refer to the network or subnet addresses.


TTLM Development Manual Date: 7-3-2023 G.C Page 16 of 19
Author: Instructors Terefe F.
SELF CHECK QUESTIONS
Instruction I: Choose the best Answer
1. A device that used to connect all nodes in star topology in one place is
A. Repeater B. Hub C. Switch D. B&C
2. The type of network cable that commonly used in TV system
A. UTP B. Coaxial C. fiber optics D. all
3. Terminator in a bus topology is used for
A. to transmit the signal on networks B. Connect all nodes to each other
C. Stop the signal on bouncing over the back bone & make the main cable free
D. all
4. _________ Is a network adopter that is used to connect PC to N/W.
A. NIC B. Bridges C. Repeaters D. none
5. Is device that can be used to connect N/Ws that use differenttechnologies (LANs, MANs
& WANs)
A. Bridges B. Repeaters C. Routers D. Switches
6. Which one of the following is the function of NIC?
A. Prepare data from the computer for the network cable
B.Send the data to another computer
C.Control the flow of data b/n computer & cabling system
D.all of the above
7_______cable is good for very high speed, high capacity data transmission.
A. Coaxial cable B. Twisted Pair cable C. Fiber optic cableD.all
8. Which net work device can amplify or regenerate the weak signal
A. Bridge B. Switch C. Repeater D. all
9. Which one of the following net work device used to connect different net work that uses
the same net work protocol?
A. Switch B. Bridge C.HUB D.repeater
10.Which type of cable arrangement is used to connect similar devices?
A. Cross over B. Rollover C. Straight trough D. All
11. A device that are used to connect RJ45 with UTP cable
A. Cable Cutter B. Crimper C.cable taster D. all
12. How many wires are there in cat- 5e UTP Cable?
A.2 Pairs B.4 Pairs C. 8 wires D.B &C
13. Which one of the following is false?
A.In a peer to peer net work configuration two PCs can have the same type of IP
Address
TTLM Development Manual Date: 7-3-2023 G.C Page 17 of 19
Author: Instructors Terefe F.
B. In a peer to peer net work two PCs must use the same type of work group name.
C. Both PCs have equal right to access a net work
D. All
SELF CHECK QUESTIONS
Instruction I: Choose the best Answer
1._______is a computer that provide shared resources for a net work users.
A. Client B. Server C. Media D. all
2. Which net work type has no geographical limitation?
A.LAN B.WAN C.MAN D. None
3. Which of the following one is not the use of computer Net Work?
A. Sharing file B. Sharing printerC. Sharing hard disk D. Process data
4.____ is the arrangement or the physical layout of computer, cables and other component on the net work.
A. Topology B. Protocol C.IP addresses D. None
5._____topology connects computers on a single circle of cable.
A .Bus B. Ring C. Star D. Mesh

Instruction II Match column “A” with Column “B”


Column “A” Column “B”
_____1. Server based net work A. Centralized device in star Topology
_____2. 255.255.255.0 B. The sub net mask of Class C
_____3. Peer to peer net work C. The standard type of net work
_____4. 192.168.100.1 D. a node acts as both client and server
_____5. HUB E. Class C IP Address
F. Class B IP address
G. The sub net mask of class A
Answer for Instruction 1
Multiple choices
1. B
2. B
3. D
4. A
5. B

Answer for Instruction 2


Matching
1. C
2. B
3. D
4. E
5. A

TTLM Development Manual Date: 7-3-2023 G.C Page 18 of 19


Author: Instructors Terefe F.
TTLM Development Manual Date: 7-3-2023 G.C Page 19 of 19
Author: Instructors Terefe F.

You might also like