0% found this document useful (0 votes)
63 views62 pages

Set Up Computer Networks CSS 5

CSS 5- Grade 12 ICT reviewer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views62 pages

Set Up Computer Networks CSS 5

CSS 5- Grade 12 ICT reviewer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

SET-UP

COMPUTER
NETWORKS
“Network Concepts”
1. Have knowledge about network concepts
2. Identify the different components of network
3. Identify the different types of network

Before installing network cable you should have


knowledge about the Networking Concepts.
What is Computer Network?
- Two or more computers connected together
through a communication media form a computer
network.
- The computers are connected in a network to
exchange information and data. The computers
connected in a network can also use resources of
other computers.
Computer Network
Components
There are different components of a network. Following are the
basic components of network.

1. Server - Powerful computers that provides services to


the other computers on the network.

2. Client - Computer that uses the services that a server


provides the client is less powerful than server.

3. Media - A physical connection between the devices on a


network
Computer Network Components
4. Network Adopter - Network adopter or network interface card
(NIC) is a circuit board with the components necessary for
sending and receiving data. It is plugged into one of the
available slots on the Pc and transmission cable is attached to
the connector on the NIC.

5. Resources - Anything available to a client on the network is


considered a resource printers, data, fax devices and other
network devices and information are resources.
Computer Network Components
6. User - Any person that uses a client to
access resources on the network.

7. Protocols - These are written rules used for


communications. They are the languages that
computers use to talk to each other on a
network.
Different Types of
Computer Network
Local Area Network (LAN)
- Supplies networking
capability to a group of
computers in close proximity
to each other such as in an
office building, a school, or
a home. A LAN is useful for
sharing resources like files,
printers, games or other
applications.
Metropolitan Area Network (MAN)
Is a computer network
that usually spans a city
or a large campus, A MAN
usually interconnects a
number of (LANs) using a
high-capacity backbone
technology, such as fiber-
optical links.
Wide Area Network (WAN)
Is a network that covers a broad
area (i.e., any telecommunications
network that links across
metropolitan, regional, or national
boundaries) using private or
public network transports,
Business and government entities
utilize WANs to relay data among
employees, clients, buyers, and
suppliers from various
geographical locations.
Wide Area Network (WAN)
In essence, this mode of
telecommunication allows a
business to effectively carry out
its daily function regardless of
location. The Internet can be
considered a WAN as well, and
is used by businesses,
governments, organizations,
and individuals for almost any
purpose imaginable.
Storage Area Network (SAN)
Is a high-speed sub
network of shared storage
devices, A storage device
is a machine that
contains nothing but a
disk or disks for storing
data.
Virtual Private Network (VPN)
Technology included in
Windows Server 2003 helps
enable cost-effective, secure
remote access to private
networks. VPN allows
administrators to take
advantage of the Internet to
help provide the functionality
and security of private WAN
connections at a lower cost.
Virtual Private Network (VPN)
In Windows Server 2003, VPN is
enabled using the Routing and
Remote Access service. VPN is part
of a comprehensive network
access solution that includes
support for authentication and
authorization services, and
advanced network security
technologies.
“Network Topology”
1. Learn the Different Network Topology
2. Draw Network Topology
Network topology is the diagram that you
will follow in installing network cables.
What is Network Topology?
- Physical and logical network layout of
computer Network.
Physical – actual layout of the computer
cables and other network devices.
Logical – the way in which the network
appears to the devices that use it.
COMMON
TOPOLOGIES:
BUS TOPOLOGY
Uses a trunk or backbone to which all
of the computers on the network
connect.
- Systems connect to this backbone
using T connectors or taps.
BUS TOPOLOGY
BUS TOPOLOGY
RING TOPOLOGY
1. Logical ring
- Meaning that data travels in circular fashion from
one computer to another on the network.
2. Token Ring
- Has multi-station access unit (MSAU), equivalent
to hub or switch. MSAU performs the token
circulation internally
RING TOPOLOGY
RING TOPOLOGY
STAR TOPOLOGY
- All computers/devices connect to a
central device called hub or switch.
- Each device requires a single cable
point -to point connection between the
device and hub.
- Most widely implemented - Hub is the
single point of failure
STAR TOPOLOGY
STAR TOPOLOGY
MESH TOPOLOGY
- Each computer connects to every other.
- High level of redundancy.
- Rarely used.
◦ - Wiring is very complicated
◦- Cabling cost is high
◦- Troubleshooting a failed cable is tricky
◦- A variation hybrid mesh – create point to point connection
between specific network devices, often seen in WAN
implementation.
MESH TOPOLOGY
MESH TOPOLOGY
WIRELESS NETWORKING
- Do not require physical cabling
- Particularly useful for remote access for
laptop users
- Eliminate cable faults and cable breaks.
- Signal interference and security issue.
WIRELESS NETWORKING
WIRELESS NETWORKING
“Network OHS & 5s Principles”
1. Learn the Network Occupation Health
and Safety
2. Learn the Network 5s Principles
Before installing network cables we must
practice Network OHS & 5s Principles to
ensure our safety during the training.
OHS Policies and
Procedures
Occupational health and safety
(OHS)
It refers to the legislation, policies,
procedures and activities that aim
to protect the health, safety and
welfare of all people at the
workplace.
Occupational health and safety
(OHS)
Every worker has a right to healthy and safe
work and to a work environment that enables
them to live a socially and economically
productive life. Safety practices should be
learned early and always adhered to when
working with any electrical device including
personal computers and peripherals.
Personal safety while working with
PC’s
Here are some safety precautions to take before
working with any computer devices:
Before doing anything, listen to your trainer’s
instruction to prevent accidents or any unwanted
events that may occur on your workplace.
Be sure not to mix electronic components and
water.
Personal safety while working with
PC’s
Avoid playing or running while inside the room.
Always wear personal protective equipment's
(PPE) like coverall, shoes with rubber sole, anti-
static wrist strap, etc.
Ask for assistance from your trainer when it
comes on dealing with tools & equipment's.
Personal safety while working with
PC’s
Applying safety measure when
handling tools and equipment are
necessary to avoid certain damages.
Be sure to use the tools and
equipment's properly to avoid
accidents.
5S methodology
Manufacturing companies are all familiar
with the 5S methodology to organize the
workspace for efficiency and effectiveness.
5S is the name of a workplace organization
method that uses a list of five Japanese
words: seiri, seiton, seiso, seiketsu, and
shitsuke.
5S methodology
Amazingly, transliterated or translated
into English, they all start with the
letter S: sort, set, shine, standardize,
sustain. (Credit goes to Hiroyuki Hirano
and his overall approach to production
systems)
5S methodology
The obvious benefit of 5S methodology
is improved productivity. This
methodology can be applied to any
workplace – and for our purpose we
can discuss it to improve your
Computer Network environment.
1. SORT
Sorting helps you to use a red tag method
that will get rid of all the different processes
or items that you don’t need. Throughout
the years, your organization may have
acquired software and hardware that may
be either used partially, or not used at all.
1. SORT
I bet you have some old boxes and bundles
of cables and trinkets that you don’t know
what to do with. Some of them you probably
don’t even know what they are for! This is
also a good time to do an inventory of your
software, to make sure that all of your
copies are licensed and up-to-date.
1. SORT
Perhaps you can donate your old or unused
computers, or discard old and broken
gadgets and network-related equipment.
Don’t forget to comply with your local laws
about e-waste! Check these resources for
more on e-cycling and electronic waste:
1. SORT
EcoSquid is a web search
platform that helps consumers
identifies the best options to
resell, recycle, or donate new
and used electronics.
1. SORT
Earth 911 has taken environmental hotlines, web
sites and other information sources nationwide, and
consolidated them into one network where you can
find community-specific information on e-Cycling
and much more. Electronic Industries Alliance’s
Consumer Education Initiative helps you find reuse,
recycling and donation programs for electronics
products in your state; here is the link to their page
specific to e-Cycling in New Jersey)
1. SORT
TechSoup provides resources for those who would
like to donate hardware, those who would like to
acquire recycled hardware, and refurbishes. Evaluate
your legacy systems to have full understanding of
what is going to go now. Take steps to remove these
items from your location. Sorting will de-clutter and
free up space that your organization will need to
move on to the next step – Set.
2. SET
Now that you have a better understanding of what
you have, and what you need – and let’s not forget
some free space, you can move on to the next aspect
of 5 S method: set everything in order. During this
step you will make sure to lay out your computer
network in most efficient way, and make sure that
your employees have a proper workplace that allows
them to be productive within your network:
2. SET
make sure that if new equipment, software or
license is required, it is acquired. Don’t be an
unintentional software pirate! Make sure that
your offices are properly wired, and your
necessary items such as printers, scanners, etc.
at a reachable distance and can be easily
accessed. So, set things in order – and then
shine!
3. SHINE
Once you have the workplace sorted and set,
it’s time to put some shine on. What are you
doing to make sure your network is neat and
clean? The third step, shine, is crucial to the 5 S
methods. Teach your workforce the importance
of maintaining and cleaning the equipment and
data for a great impact on the way your
business operates.
3. SHINE
Shine also helps the equipment to last
longer as you aren’t neglecting it and
allowing it to get cluttered or dusty. In
addition to prolonging the lifespan of
your equipment, keeping things right is
also healthy for your employees.
3. SHINE
Any environment can benefit from equipment
that is ergonomic – there is plethora of items
such as monitors, keyboards, mice, office
chairs, etc. that are designed to keep your
employees comfortable while on the job. When
they perform their jobs better, your business is
doing better. To propel your success even
further, move on to the next step – standardize.
4. STANDARDIZE
One of the most important things you can do for
your business is to standardize the equipment
and processes within your computer network.
New procedures, once vetted, should be
properly documented and made standard. It will
ensure that large orders and other processes
would flow easily, especially if you are looking to
expand your business.
4. STANDARDIZE
When you have your equipment documented, and when
procedures become part of the employee manual, your
organization will benefit from improved operations. You
can easily use standard procedures for cross-training of
your employees, or bringing new hires on board. In
addition, many platforms and solutions now come with
options to migrate data one to another, and having a
standardized setup makes things like data migrations,
equipment and software updates a breeze.
4. STANDARDIZE
With standards in mind keep an eye on the new
trend – Bring Your Own Device (BYOD). Users are
shifting away from corporate issued devices, such as
Blackberry smart phones, to devices they feel more
comfortable with, such as iOS or Android based
platforms. If not all of your equipment is standard,
processes still should be. Keep computer network
security and efficiency in mind when considering
BYOD for your organization.
5. SUSTAIN
Your final step, sustain, is the hardest – not
falling back into old habits is not easy. It is even
more difficult if you don’t have a full-time IT staff
on board to perform tech support and
maintenance. Left unmonitored, your data, your
network and computer equipment and devices
may get compromised and bring you to a
gradual decline back to the old ways.
5. SUSTAIN
It may affect your business directly by
having your business data and
environment vulnerable. It turns, it will
leave employees idle and impacting your
ability to do business, costing you evens
more through the loss of productivity,
revenue, or reputation.
5. SUSTAIN
Managed Services allows you to maintain and
review standards through practice of outsourcing
day-to-day IT management and Computer Network
Tech Support as a cost-effective method for
improving business operations. Boost performance,
tighten security, and extend the life of your IT
assets. Many IT companies provide Managed
services. If your business is in New Jersey or New
York, give us a call at 201-493-1414 to discuss the
benefits of Managed IT Services for your business.
THANK YOU AND
GOD BLESS!
NOEL S. SAL AC JR.

You might also like