Net.s Setting Up A Small
Net.s Setting Up A Small
Home
Managing ICT
Funding
Resources
Briefing Papers
Graphics Software
.
.
| | Hits: 76123
1. Planning
2. Physical Installation
3. Configuration
Planning,
The most important stage in installing and using a network is the planning. From the type of connection used
through to the way the network is used, the planning is a key element. Developing the correct knowledge and the
right practices when installing the network can save time in the future when trouble shooting problems.Shared
internet resources and office resources e.g. printers can dramatically reduce the running costs of an
organisation.
Physical Installation,
This stage requires a lot of thought, employing the correct technology is essential for the networks smooth
operation. There are many devices available advertising many features, but come at a high price. The main
consideration in the Physical layer is the connection between machines its correct term is Topology. Wired /
Wireless.
Wireless Vs Wired
Wired
Facts:
Benefits:
1. Speed
2. Reliability
3. Ease of Troubleshooting
4. Cost Effective
Negative
Wired installations can be tricky sometimes due to planning or building restrictions; normally wired networks are
installed where reliability and speed are paramount. Expanding the networks can also be problematic with these
sorts of networks, Making sure there is redundant systems in these networks are essential for troubleshooting
and expansion. Wired networks are normally employed for fixed or static computers as the physical installation is
not normally altered after instillation.
There is also Ethernet over Power to consider, this system uses the copper wiring of tradition electrical outlets to
connect systems together, there is a speed reduction but is still very reliable. Should be considered in systems
where planning or building restrictions are in force, Considered by many as a good wireless alternative.
Tip: Always build in redundancy into the networks if you can run a single cable between the main area’s of a
network you could consider doubling the cable so you have built in a good back up system, especially useful
where re plastering or any holes are to be drilled.
Wireless
Advantages:
1.We
Flexible
use alocation
single session cookie for the proper functioning of this website. No personal details
2.are
Speed of Installation
stored. If you register on a course or log in we use additional cookies ACCEPT COOKIES
are stored. If you register on a course or log in we use additional cookies ACCEPT COOKIES
But... DECLINE COOKIES
1. Connectivity reliability
2. Trouble Shooting
3. Security
4. Speed
5. Maintenance
Wireless systems main advantage is that the system does not require physical network connection, Very handy
for temporary network locations, E.g. Meeting rooms or visitor locations, Correctly secured these can be very
effective solutions, some buildings restrict the use of wireless networks by simply how they are built, sometimes
the signal cannot penetrate the fabric of the building, testing these types of networks are essential to the
installation process.
Each system has huge benefits and risks, considering the technology to be used can be subjected to differing
factors, most effective networks employ the three types of network devices in there use and deliver a high
performance over a single connection type.
Technology,
Connectivity, the only word used to describe the technology aim of networking and the correct physical layer of
any network. The most important thing is to do a simple assessment of the type of connection you need. Also
required is the technology that will connect everything together.
Router,
This device comes in two main types and this is dependant on the type of internet that you have installed. If your
internet connection is supplied through the phone line, this is called ADSL; you will require a router with an added
interface called a modem commonly displayed on the boxes ad Modem/Router. The other type is a Cable
connection and this will have been installed with its own connection installed by the Broadband Supplier, E.g.
Virgin / Karoo (Kingston).The router sub divides and splits the internet to all the systems on your network,
allowing you to share your connection with others in the office through a single connection.
Network Switch
This device allows the computers to connect to the network and share data between each other and all devices
on the network, these come in connection sizes 4,8,16,24 ect. These numbers relate to the amount physical
connections available for devices on your network, remember this is any device so routers, printers and other
switches should be taken in consideration when working out how many ports you require, in this document were
using 1x 4 port switch and 1 x 8 port switch.
The other thing you should be aware other than the amount of the connections on the front/rear of the switch, is
the speed of the switch, this relates to how fast the network will react to the data to be sent and received. The
Speeds are commonly 3 types 10 t-Base, 100 T-Base and 1000 t-Base / 1Gbit (1 gigabit) the number relates to the
speed of the data, 10 the slowest and 1000 the fastest.
Understanding the way that data moves is not essential for the basic network but may become handy when
troubleshooting the networks, there are many different configurations for your machines and the possibilities are
endless.
Print Server
This type of devices are very versitle and will allow a non network printer to attach to your network without having
to pass through a PC eliminating the need for security issues and also for reliability, if a printer is connected to
the network via a pc then this is potentially a weak link in the network. If the PC fails the printer is off line until it is
serviced or if there is a lot of pc’s printing at the same time the host PC to the printer will slow affecting
productivity.
There are two main types, Parallel or USB so that they can connect to the type of printer you already are using.
Patch Cable
A patch cable is the network cable that fits between a device and a socket either a wall socket or another device.
Hey are made up from a pair of plastic RJ45 plugs joined together with CAT5e patch cable. Coloured variants are
available and can make diagnosis easier if employed correctly for example. Re cables for the N.A.S device and
Blue Cables for the Computers etc.
Configuration
Once the network has been physically connected the devices need to know where each other are and the
language they need to speak to communicate with each other, The network standard language uses a protocol
called TCP/IP. This allows the computers to convert the data into a language that can be transferred easily and
quickly by slicing the data into bite sized chunks called Packets. Also within this protocol there is an address this
is called the IPAddress. Its format would look like below
192.168.1.1
This number will identify the device on the network, all devices has to have its own address on the network, this
would be like the houses on a street each having a post code relating them to an area and a house number for
individuality within the street so that the post man knows the location and address in which to deliver post. Each
part of the address has a function, the first parts of the address allow you to identify the network uniquely,
192.168.1 is the post code of the network and the .1 relates to the address of the device. Each device must have
a unique number.
Manual Assigning of Networking Addresses is when you have to work out the addresses for your network and
input them into all the devices manually, it’s a bit more time consuming and not as fast to configure new devices,
also it relies heavily on documentation for a network to be repaired fast.
Manual configured networks are easier to trouble shoot and easier to set up than automatically assigned network
addresses. The main advantage is that your network is under more strict control and only by knowing a correct
free address; a network device can be joined. Also makes wireless networks more secure.
We use a single session cookie for the proper functioning of this website. No personal details
are stored. If you register on a course or log in we use additional cookies ACCEPT COOKIES
DECLINE COOKIES
Image Created with Network Notepad. You can down load it free from here
http://http://www.networknotepad.com/download.html
The N.A.S has a gigabit device fitted within it to allow the maximum speed because there will be a lot of
computers and devices drawing data from this device as it will be the central storage. The printer attached to the
N.A.S is a photocopier with a USB connection connected directly to the N.A.S.
The wireless router is positioned in the far office because it will give a stronger signal to the meeting room for the
two laptops and will boost efficiency and also the reliability of the system.
Computer room
1 x Internet Port,
1 x Broadband Router,
1 x Backbone,
1 x N.A.S,
1We
x Photocopier,
use a single session cookie for the proper functioning of this website. No personal details
1 x Desktop Pc,
are stored.
1 x Power If you
Over register
Ethernet on a course or log in we use additional cookies ACCEPT COOKIES
Adapter,
1 x 8 Port Gigabit Switch
DECLINE COOKIES
Office One
2 x Desktop Pc’s
1 x Usb Printer
1 x Print Server
1 x Wireless Access Point (Router)
1 x 4 port Gigabit Switch
Reception
1 x Desktop Pc
1 x Power Over Ethernet Adapter
Meeting Room
2 x Wireless Laptops
The backbone connects the computer room switch to the switch in Office One, allowing the network to extend
between different parts of the building, where the backbone exists the network is classed as one network.
Configuration
Configuration the network can be made easier if the IP addresses are kept in ranges for devices, and locations.
Example we have chosen the range of 200 – 254 for the computer room, 100-199 for the main office, 10 -50 for
the reception area and 50 -99 for the wireless adapters.
Once the IPAddress has been configured on the device then the network location is sealed for that device, this
allows the administrator of the network to know where the devices are at all times
You can find out if the device is online by clicking start and then run, type CMD, once a black window appears and
a flashing white cursor c:> type Ping and the IPAddress you want to check. E.g. C:> Ping 192.168.1.204
Office One
2 x Desktop Pc’s 192.168.1.100
192.168.1.110
1 x Usb Printer
1 x Print Server 192.168.1.198
1 x Wireless Access Point (router) 192.168.1.199
1 x 4 port Gigabit Switch
Reception
1 x Desktop Pc 192.168.1.10
1 x Power Over Ethernet Adapter
Meeting Room
2 x Wireless Laptops 192.168.1.50
192.168.1.60
Benefits of a network
File Sharing
Sharing files with one or more computer can be beneficial in group working situations, also for central
storage and backup.
Productivity
We use a single session cookie for the proper functioning of this website. No personal details
Productivity is enhanced when a group of computer are networked, faster responses to group working
are stored. If you register on a course or log in we use additional cookies ACCEPT COOKIES
documents and files are possible.Shared
DECLINE COOKIES
Resources
Networked resource can be computers, their hard drives printers and network attached storage, this can be
beneficial where printers and storage are limited or in some cases can be counter productive (Several
printers with Several Cartridges that need replacing).
Wireless Access
Networks are breaking free of wired networks and going wireless; this allows a certain amount of freedom
when using devices as Wireless Laptops, P.D.A’s, printers, camera’s and many other new devices. This can
allow network systems and resources to be in places never planned for network access or places where a
Temporary office is required.
A network is a beneficial and highly productive system to employ into any organisation but there are as with
anything the risks lets have a look at them in a bit more detail. Decisions are important and a strategy is to
be applied to any situation where a network would or could be implemented.
Risks of a network
Security
Opening your personal computer onto a network, there are many things that are required to be considered
before you plug the cable in, Access control, access rights and making sure you know everything you want to
be secure remains that way. Firewalls, Constraint shared folders; permissions can help with access control.
Internet Violations
The Internet is a fantastic resource but also can be deadly enemy, making sure appropriate measures to
protect your company and its data is very important to everyone, if you imagine your network is joined to
every other network in the world and on this network there can be people of different skill levels and people
with malicious intent. We would like to state that the internet is a safe and secure place to work but it is not
the case, firewalls and protection previously stated are good places to start, not sharing folders and
resources unnecessarily, and using appropriate passwords also helps.
Wireless Access
Wireless Networks can be a hazard if not secured and managed properly, as these routers / access points
can sometimes have a range over 300 meters. Unknown Access to your network can easily happen, if your
internet gateway is vulnerable and someone accesses it even though you may be unaware, they could
download sensitive data from your network or get access through your network to the internet and access
materials that are unsolicited or even hack another network from yours, these kind of violations are less
common but still a risk.
TCP/IP
The Transmission Control Protocol / Internet Protocol Suite (commonly known as TCP/IP) is the set of
communications protocols used for the Internet and other similar networks. These protocols tell the
computer and network devices how to communicate with each other, it also sets limits and settings for the
network.
Router
A router is a networking device whose software and hardware are usually tailored to the tasks of routing and
forwarding information. For example, on the Internet, information is directed to various paths by routers.
Routers generally contain a specialized operating system, RAM, and one or more processors, as well as two
or more network interfaces.
Switch
Network switch is a computer networking device that connects network segments. Connecting the
networking devices and allowing them to communicate with each other directly.
WEP / WPA-PSK
Wireless Equivalent Privacy / Wi-Fi Protected Access - Pre-shared key are both systems that encrypt data
with a specific password, when the data is traveling wirelessly from one network point to anther, each piece
of data is in itself encrypted so that it cannot be intercepted or accessed unless the password is present.
WPA-PSK is used more commonly than the WEP system, due to the WEP being limited to a smaller
algorithm.
Download
For £5 per stick, Virtual Riders will encrypt your sticks for you.
Contact Us
Virtual Riders. The not for profit brand of Thornwood Services Ltd.
We use a single session cookie for the proper functioning of this website. No personal details
are stored. If you register on a course or log in we use additional cookies ACCEPT COOKIES
DECLINE COOKIES