We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62
SET-UP
COMPUTER NETWORKS “Network Concepts” 1. Have knowledge about network concepts 2. Identify the different components of network 3. Identify the different types of network
Before installing network cable you should have
knowledge about the Networking Concepts. What is Computer Network? - Two or more computers connected together through a communication media form a computer network. - The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers. Computer Network Components There are different components of a network. Following are the basic components of network.
1. Server - Powerful computers that provides services to
the other computers on the network.
2. Client - Computer that uses the services that a server
provides the client is less powerful than server.
3. Media - A physical connection between the devices on a
network Computer Network Components 4. Network Adopter - Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.
5. Resources - Anything available to a client on the network is
considered a resource printers, data, fax devices and other network devices and information are resources. Computer Network Components 6. User - Any person that uses a client to access resources on the network.
7. Protocols - These are written rules used for
communications. They are the languages that computers use to talk to each other on a network. Different Types of Computer Network Local Area Network (LAN) - Supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. Metropolitan Area Network (MAN) Is a computer network that usually spans a city or a large campus, A MAN usually interconnects a number of (LANs) using a high-capacity backbone technology, such as fiber- optical links. Wide Area Network (WAN) Is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports, Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. Wide Area Network (WAN) In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable. Storage Area Network (SAN) Is a high-speed sub network of shared storage devices, A storage device is a machine that contains nothing but a disk or disks for storing data. Virtual Private Network (VPN) Technology included in Windows Server 2003 helps enable cost-effective, secure remote access to private networks. VPN allows administrators to take advantage of the Internet to help provide the functionality and security of private WAN connections at a lower cost. Virtual Private Network (VPN) In Windows Server 2003, VPN is enabled using the Routing and Remote Access service. VPN is part of a comprehensive network access solution that includes support for authentication and authorization services, and advanced network security technologies. “Network Topology” 1. Learn the Different Network Topology 2. Draw Network Topology Network topology is the diagram that you will follow in installing network cables. What is Network Topology? - Physical and logical network layout of computer Network. Physical – actual layout of the computer cables and other network devices. Logical – the way in which the network appears to the devices that use it. COMMON TOPOLOGIES: BUS TOPOLOGY Uses a trunk or backbone to which all of the computers on the network connect. - Systems connect to this backbone using T connectors or taps. BUS TOPOLOGY BUS TOPOLOGY RING TOPOLOGY 1. Logical ring - Meaning that data travels in circular fashion from one computer to another on the network. 2. Token Ring - Has multi-station access unit (MSAU), equivalent to hub or switch. MSAU performs the token circulation internally RING TOPOLOGY RING TOPOLOGY STAR TOPOLOGY - All computers/devices connect to a central device called hub or switch. - Each device requires a single cable point -to point connection between the device and hub. - Most widely implemented - Hub is the single point of failure STAR TOPOLOGY STAR TOPOLOGY MESH TOPOLOGY - Each computer connects to every other. - High level of redundancy. - Rarely used. ◦ - Wiring is very complicated ◦- Cabling cost is high ◦- Troubleshooting a failed cable is tricky ◦- A variation hybrid mesh – create point to point connection between specific network devices, often seen in WAN implementation. MESH TOPOLOGY MESH TOPOLOGY WIRELESS NETWORKING - Do not require physical cabling - Particularly useful for remote access for laptop users - Eliminate cable faults and cable breaks. - Signal interference and security issue. WIRELESS NETWORKING WIRELESS NETWORKING “Network OHS & 5s Principles” 1. Learn the Network Occupation Health and Safety 2. Learn the Network 5s Principles Before installing network cables we must practice Network OHS & 5s Principles to ensure our safety during the training. OHS Policies and Procedures Occupational health and safety (OHS) It refers to the legislation, policies, procedures and activities that aim to protect the health, safety and welfare of all people at the workplace. Occupational health and safety (OHS) Every worker has a right to healthy and safe work and to a work environment that enables them to live a socially and economically productive life. Safety practices should be learned early and always adhered to when working with any electrical device including personal computers and peripherals. Personal safety while working with PC’s Here are some safety precautions to take before working with any computer devices: Before doing anything, listen to your trainer’s instruction to prevent accidents or any unwanted events that may occur on your workplace. Be sure not to mix electronic components and water. Personal safety while working with PC’s Avoid playing or running while inside the room. Always wear personal protective equipment's (PPE) like coverall, shoes with rubber sole, anti- static wrist strap, etc. Ask for assistance from your trainer when it comes on dealing with tools & equipment's. Personal safety while working with PC’s Applying safety measure when handling tools and equipment are necessary to avoid certain damages. Be sure to use the tools and equipment's properly to avoid accidents. 5S methodology Manufacturing companies are all familiar with the 5S methodology to organize the workspace for efficiency and effectiveness. 5S is the name of a workplace organization method that uses a list of five Japanese words: seiri, seiton, seiso, seiketsu, and shitsuke. 5S methodology Amazingly, transliterated or translated into English, they all start with the letter S: sort, set, shine, standardize, sustain. (Credit goes to Hiroyuki Hirano and his overall approach to production systems) 5S methodology The obvious benefit of 5S methodology is improved productivity. This methodology can be applied to any workplace – and for our purpose we can discuss it to improve your Computer Network environment. 1. SORT Sorting helps you to use a red tag method that will get rid of all the different processes or items that you don’t need. Throughout the years, your organization may have acquired software and hardware that may be either used partially, or not used at all. 1. SORT I bet you have some old boxes and bundles of cables and trinkets that you don’t know what to do with. Some of them you probably don’t even know what they are for! This is also a good time to do an inventory of your software, to make sure that all of your copies are licensed and up-to-date. 1. SORT Perhaps you can donate your old or unused computers, or discard old and broken gadgets and network-related equipment. Don’t forget to comply with your local laws about e-waste! Check these resources for more on e-cycling and electronic waste: 1. SORT EcoSquid is a web search platform that helps consumers identifies the best options to resell, recycle, or donate new and used electronics. 1. SORT Earth 911 has taken environmental hotlines, web sites and other information sources nationwide, and consolidated them into one network where you can find community-specific information on e-Cycling and much more. Electronic Industries Alliance’s Consumer Education Initiative helps you find reuse, recycling and donation programs for electronics products in your state; here is the link to their page specific to e-Cycling in New Jersey) 1. SORT TechSoup provides resources for those who would like to donate hardware, those who would like to acquire recycled hardware, and refurbishes. Evaluate your legacy systems to have full understanding of what is going to go now. Take steps to remove these items from your location. Sorting will de-clutter and free up space that your organization will need to move on to the next step – Set. 2. SET Now that you have a better understanding of what you have, and what you need – and let’s not forget some free space, you can move on to the next aspect of 5 S method: set everything in order. During this step you will make sure to lay out your computer network in most efficient way, and make sure that your employees have a proper workplace that allows them to be productive within your network: 2. SET make sure that if new equipment, software or license is required, it is acquired. Don’t be an unintentional software pirate! Make sure that your offices are properly wired, and your necessary items such as printers, scanners, etc. at a reachable distance and can be easily accessed. So, set things in order – and then shine! 3. SHINE Once you have the workplace sorted and set, it’s time to put some shine on. What are you doing to make sure your network is neat and clean? The third step, shine, is crucial to the 5 S methods. Teach your workforce the importance of maintaining and cleaning the equipment and data for a great impact on the way your business operates. 3. SHINE Shine also helps the equipment to last longer as you aren’t neglecting it and allowing it to get cluttered or dusty. In addition to prolonging the lifespan of your equipment, keeping things right is also healthy for your employees. 3. SHINE Any environment can benefit from equipment that is ergonomic – there is plethora of items such as monitors, keyboards, mice, office chairs, etc. that are designed to keep your employees comfortable while on the job. When they perform their jobs better, your business is doing better. To propel your success even further, move on to the next step – standardize. 4. STANDARDIZE One of the most important things you can do for your business is to standardize the equipment and processes within your computer network. New procedures, once vetted, should be properly documented and made standard. It will ensure that large orders and other processes would flow easily, especially if you are looking to expand your business. 4. STANDARDIZE When you have your equipment documented, and when procedures become part of the employee manual, your organization will benefit from improved operations. You can easily use standard procedures for cross-training of your employees, or bringing new hires on board. In addition, many platforms and solutions now come with options to migrate data one to another, and having a standardized setup makes things like data migrations, equipment and software updates a breeze. 4. STANDARDIZE With standards in mind keep an eye on the new trend – Bring Your Own Device (BYOD). Users are shifting away from corporate issued devices, such as Blackberry smart phones, to devices they feel more comfortable with, such as iOS or Android based platforms. If not all of your equipment is standard, processes still should be. Keep computer network security and efficiency in mind when considering BYOD for your organization. 5. SUSTAIN Your final step, sustain, is the hardest – not falling back into old habits is not easy. It is even more difficult if you don’t have a full-time IT staff on board to perform tech support and maintenance. Left unmonitored, your data, your network and computer equipment and devices may get compromised and bring you to a gradual decline back to the old ways. 5. SUSTAIN It may affect your business directly by having your business data and environment vulnerable. It turns, it will leave employees idle and impacting your ability to do business, costing you evens more through the loss of productivity, revenue, or reputation. 5. SUSTAIN Managed Services allows you to maintain and review standards through practice of outsourcing day-to-day IT management and Computer Network Tech Support as a cost-effective method for improving business operations. Boost performance, tighten security, and extend the life of your IT assets. Many IT companies provide Managed services. If your business is in New Jersey or New York, give us a call at 201-493-1414 to discuss the benefits of Managed IT Services for your business. THANK YOU AND GOD BLESS! NOEL S. SAL AC JR.