Administrate Network and Hardware Peripherals-1
Administrate Network and Hardware Peripherals-1
INFORMATION
TECHNOLOGY SUPPORT
SERVICE
Level II
Information Sheet
Unit of Competence: Administer Network
Hardware
• A Computer network is any collection of independent computers that communicate with one
another over a shared network medium.
• A System in which a number of independent Computers are linked together to share data or
information and peripherals such as hard disks and printers.
Advantage of Networking:
- Share Documents
- Exchange e-mail messages
- Live audio and video broadcast
- Using one device for many computers like printer
- Sharing external memory like Hard disk.
- Security.
Categorizing Network
1. Peer-to-Peer Networking:
Peer-to-Peer computer network is a network that relies on computing power at the edges of a
connection, there is no hierarchy among the computers.
2. Client-Server Network
In the environment with more than 10 users, a peer to peer network will not adequate. There need
comes to use a dedicated computer which optimized (increase) the service of network to clients
quickly and ensure the security of files. Therefore, there will be one or more server computers which
serve other station (client) computers to optimized network system. A dedicated computer with
software that carries out some task on behalf of users.
What is Server?
Server is a dedicated computer that provide resources to Network users or Client computers.
The term topology, or more specifically, network topology, refers to the arrangement or physical
layout of computers, cables, and other components on the network. “Topology” is the standard term
that most network professionals use when they refer to the network’s basic design. In addition, the
term “topology” you will find several other terms that are used to define a network’s:
Physical design
Diagram
Map
1. Bus Topology
It is often referred to as a “linear bus” because the computers are connected in a straight line.
This is the simplest and most common method of networking computers.
In a bus topology, all computers are connected to a shared communication line, called a trunk
or a backbone.
The computers are connected to the backbone using T-connectors.
Both ends of the backbone use terminators in order to prevent reflection of signals.
If the terminator is missing or is deliberately removed, the data transmissions are disrupted.
There is no central device or any special configuration.
Advantages
A bus network is the cheapest of all topologies.
No special configuration is required.
It is easy to install, and no special equipment is
needed for installation.
It needs less cable length than do other topologies.
Disadvantages
Date: 24-2012 E.C Page 4 of 25
Compiled By: – Tewodros Aklilu, IT Trainer
A break in cable or a missing terminator can
bring down the entire network.
It is not possible to add or remove computers
without disrupting the network.
It is difficult to troubleshoot and administer.
Addition of more computers degrades performance.
2. Star Topology
In a star topology, computers (also called nodes) connect to each other through a central
device, called a hub or a switch
A star network is a local area network (LAN) in which all nodes (workstations or other devices)
are directly connected to a common central Hub or Switch.
Every workstation is indirectly connected to each other through the central Hub or Switch.
Advantages
A star network is easy to implement.
It can be easily expanded without affecting
the network operation
Failure of a single node or the connecting
cable does not affect the entire network’s
operation.
It is easy to isolate nodes in order to
troubleshoot problems.
Disadvantages
Failure of the central device (hub or switch)
can bring down the entire network.
The length of cable required is much more
than ring and bus networks because each node is connected separately.
Cable length from the central device can be a limiting factor, depending on the type of cable
used.
3. Ring Topology
In a ring topology, each computer is connected to its neighboring computer to form a logical
ring.
Data travels in the ring in a circular fashion
from one computer to another, forming a
logical ring.
Advantages
A ring network is relatively easy to install.
There are fewer collisions because only
one computer transmits at a time.
Disadvantages
A break-in cable or a faulty computer can
bring down the entire network.
It is not as efficient as a star network.
It is difficult to troubleshoot a ring network.
Date: 24-2012 E.C Page 5 of 25
Compiled By: – Tewodros Aklilu, IT Trainer
The addition or removal of computers can disrupt network operation
4. Mesh Topology
In a mesh topology, all computers in the network are connected to every other computer,
forming a mesh of connections.
Each computer makes a point-to-point connection to every other computer.
Advantages
A mesh network is highly reliable because
of redundant multiple paths between
computers.
The failure of a single computer or a cable
fault does not affect network operations.
Computers can be added or removed without affecting the network.
Disadvantages
It is difficult to install and troubleshoot.
It is very expensive because of the length of cable required to make multiple redundant
connections.
Only a limited number of computers can be connected in a mesh topology.
5. Hybrid Topology
It is combination of any two or more network
topologies. These instances can occur where two
basic network topologies, when connected
together, can still retain the basic network
character, and therefore not be a hybrid network.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications – feel free to ask
your teacher.
Transmission Media is the physical path between the transmitter and the receiver in a data
communication system.
A. Wire/Guided Transmission Media uses a "cabling" system that guides the data signals along a
specific path. The data signals are bound by the "cabling" system. Guided Media is also known as
Bound Media. Cabling is meant in a generic sense in the previous sentences and is not meant to be
interpreted as copper wire cabling only.
B. Wireless/Unguided Transmission Media consists of a means for the data signals to travel but
nothing to guide them along a specific path. The data signals are not bound to a cabling media and
as such are often called Unbound Media.
Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.
The oldest, least expensive and most commonly used transmission media.
Unshielded twisted-pair
(UTP)
Shielded twisted-pair
(STP) cable.
Unshielded Twisted Pair (UTP):- is the most popular and is generally the best option for school
networks. The quality of UTP may vary from telephone-grade wire to high-speed cable. The cable has
four pairs of wire inside the jacket. Each pair is twisted with a different number of twists per inch to
help eliminate interference from adjacent pairs and other electrical devices.
Uses a woven copper braid jacket and higher quality protective jacket. Also uses foil wrap b/n
and around the wire pairs
Much less susceptible to interference and supports higher transmission rates than UTP
shielding makes it somewhat harder to install
same 100 meters limit as UTP
uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs.
telephone’s 4 wires)
2. Coaxial Cable
Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other
conductor woven around it providing a shield. An insulating protective coating called a jacket covers
the outer conductor.
The outer shield protects the inner conductor from outside electrical signals. The distance between
the outer conductor (shield) and inner conductor plus the type of material used for insulating the inner
conductor determine the cable properties or impedance. Typical impedances for coaxial cables are
75 ohms for Cable TV, 50 ohms for Ethernet Thinnet and Thicknet. The excellent control of the
impedance characteristics of the cable allow higher data rates to be transferred than Twisted Pair
cable.
An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is
easier to install, but cannot carry the light pulses for as long a distance as glass.
Two types of optical fiber are commonly available: single-mode and multimode.
Multimode fiber (MMF) has a larger core than single-mode. This larger core allows hundreds
of light rays to flow through the fiber simultaneously.
Single-mode fiber (SMF), on the other hand, has a small core that allows only a single light
beam to pass. The light transmissions in single-mode fiber pass through the core in a direct
line, like a flashlight beam.
The numerous light beams in multimode fiber bounce around inside the core, inching toward
their destination. Because light beams bounce within the core, the light beams slow down,
reduce in strength, and take some time to travel along the cable.
For this reason, single-mode fiber's speed and distance are superior to those of multimode.
Single-mode fiber is used for long runs because it can transmit data 50 times further than
multimode fiber and at a faster rate. For example, single-mode fiber might be used on an
organization’s corporate campus between buildings.
Multimode fiber provides high bandwidth at high speeds over medium distances (up to about
3000 feet) but can be inconsistent for very long runs.
Cabling system
1: White Orange
1: White Green
2: Orange
2: Green
3: White Green
3: White Orange
4: Blue
4: Blue
5: White Blue
5: White Blue
6: Green
6: Orange
7: White Brown
7: White Brown
8: Brown
8: Brown
you can use a rolled Ethernet cable to connect a host to a router console serial communication
(com) port.
To complete our examination of networking on a physical level, this chapter looks at the network
devices used to create networks.
Hubs
Switches
Bridges
Repeaters
Routers
Gateways
CSU/DSU
Wireless access points (WAPs)
Modems
Network interface cards (NICs)
Transceivers
Firewalls
Hub
Hubs are simple network devices, and their simplicity is reflected in their low cost.
Small hubs with four or five ports (often referred to as workgroup hubs) provide everything
needed to create a small network.
Most hubs are referred to as either active or passive.
The basic function of a hub is to take data from one of the connected devices and forward it to all the
other ports on the hub. The method of sending data to all systems regardless of the intended
recipient is referred to as broadcasting.
Switch
On the surface, a switch looks much like a hub. Despite their similar appearance, switches
are far more efficient than hubs and are far more desirable for today's network environments.
As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple
switches are often interconnected to create larger networks.
Rather than forwarding data to all the connected ports, a switch forwards data only to the port on
which the destination system is connected.
It looks at the Media Access Control (MAC) addresses of the devices connected to it to
determine the correct port. A MAC address is a unique number that is stamped into every NIC.
By forwarding data only to the system to which the data is addressed, the switch decreases
the amount of traffic on each network link dramatically.
Switching Methods
Cut-through
the switch begins to forward the packet as soon as it is received.
No error checking is performed on the packet,
so the packet is moved through quickly.
the switch can propagate errors
30 times faster than store-and-forward switching
Store-and-forward
the switch waits to receive the entire packet before beginning to forward it.
also performs basic error checking.
Fragment-free
works by reading only the part of the packet that enables it to identify fragments of a
transmission.
On some managed switches, you can select the switching method you want to use.
Hubs and switches have two types of ports: medium dependent interface (MDI) or uplink port
and medium dependent interface crossed (MDI-X).
Uplink port allows you to connect two hubs and switches to create larger networks.
A bridge functions by blocking or forwarding data, based on the destination MAC address
written into each frame of data.
If the bridge believes the destination address is on a network other than that from which the
data was received, it can forward the data to the other networks to which it is connected.
If the address is not on the other side of the bridge, the data is blocked from passing. Bridges
"learn" the MAC addresses of devices on connected networks by "listening" to network traffic
and recording the network from which the traffic originates.
The advantages of bridges are simple and significant. By preventing unnecessary traffic from
crossing onto other network segments, a bridge can dramatically reduce the amount of
network traffic on a segment.
Repeater
Repeaters are usually used to strengthen signals going long distances.
A repeater amplifies the signal it receives on one port before it transmits it on other ports.
Because the repeater does not check on the contents of the data it receives or retransmits,
frames that are corrupted by noise and other factors can also be repeated.
The development of the hub replaced the repeater for all practical purposes, because it
performs the same functions, and can include additional features.
Routers
Routers are network devices that literally route data around the network.
By examining data as it arrives, the router can determine the destination address for the data;
then, by using tables of defined routes, the router determines the best way for the data to
continue its journey.
Date: 24-2012 E.C Page 17 of 25
Compiled By: – Tewodros Aklilu, IT Trainer
Unlike bridges and switches, which use the hardware-configured MAC address to determine
the destination of the data, routers use the software-configured network address to make
decisions.
This approach makes routers more functional than bridges or switches, and it also makes them
more complex because they have to work harder to determine the information.
A router is used to provide connectivity across wide area network (WAN) links and route
information between two LAN segments.
The figure below shows a router with two LAN ports (marked AUI 0 and AUI 1) and two WAN
ports (marked Serial 0 and Serial 1). This router is capable of routing data between two LAN
segments and two WAN segments.
Gateways
The term gateway is applied to any device, system, or software application that can perform
the function of translating data from one format to another.
Actually, the term gateway refers more to a network role than a network device.
For example, a router that can route data from an IPX network to an IP network is, technically,
a gateway.
Another example of a gateway involves the Systems Network Architecture (SNA) gateway,
which converts the data format used on a PC to that used on an IBM mainframe or
minicomputer. A system that acts as an SNA gateway sits between the client PC and the
mainframe and translates requests and replies from both directions.
The definition of gateways is vague, it's because there is no definite answer. The function of a
gateway is very specific, but how the gateway functionality is implemented is not.
Date: 24-2012 E.C Page 18 of 25
Compiled By: – Tewodros Aklilu, IT Trainer
Modems
Modem is a contraction of the terms modulator and demodulator.
Modems perform a simple function: They translate digital signals from a computer into analog
signals that can travel across conventional phone lines.
Modems provide a relatively slow method of communication. In fact, the fastest modem
available on the market today has a maximum speed of 56Kbps.
available as
o internal devices that plug into PCI/ISA slots
o external devices that plug into serial or USB ports;
o PCMCIA cards designed for use in laptops
Transceivers
The term transceiver does not necessarily describe a separate network device but rather an
integrated technology embedded in devices.
transceiver = transmitter and a receiver
device that receives data, converts it, and then sends it to another location
RF transceivers, fiber-optic transceivers, Ethernet transceivers, are examples
can also be used in pairs to insert a fiber segment into copper networks
IP Terminology
Bit A bit is one digit, either a 1 or a 0.
Byte A byte is 7 or 8 bits, depending on whether parity is used.
Octet An octet, made up of 8 bits, is just an ordinary 8-bit binary number.
Network address This is the designation used in routing to send packets to a remote network
for example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.
You can depict an IP address using one of three methods:
Dotted-decimal, as in 172.16.30.56
Binary, as in 10101100.00010000.00011110.00111000
Hexadecimal, as in AC.10.1E.38
Private IP Addresses
Subnet Masks
A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the
network ID portion of the IP address from the host ID portion of the IP address.
The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
The 1s in the subnet mask represent the positions that refer to the network or subnet
addresses.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications – feel free to ask
your teacher.
Note: Satisfactory rating –points above / Unsatisfactory - below points. You can ask you
teacher for the copy of the correct answers