Uc - 2 Module
Uc - 2 Module
MODULE CONTENT
QUALIFICATION COMPUTER SYSTEMS SERVICING NC II
UNIT OF COMPETENCY Setup Computer Networks
MODULE TITLE Setting-up Computer Networks
INTRODUCTION:
LEARNING OUTCOMES:
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3.Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked for
correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program
10. Network connectivity of each terminal is checked in accordance with
network design.
11. Any fault or problem in the network system is diagnosed and remedied in
line with the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance with
network design.
13. Communication checking between terminals are carried out in accordance
with OS network configuration guides.
14. Unplanned events or conditions are responded to in accordance with
established procedures.
15. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
16. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
17. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
18. Wireless settings are configured in accordance manufacturers’ instructions,
network design and end-user preferences
19. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end-user preferences
20. Final inspections are undertaken to ensure that the configuration done on
the computer networks conforms with the manufacturer’s instruction/manual
TECHNICAL TERMS
• Client and Server - Client is a computer that connects to and uses the resources
of a remote computer, or server. The server provides resources like files,
information, Internet and intranet access. In the case of processing, any work
done on the server is referred to as "server-side" work. Any work done on the
local client is similarly called "client-side”.
• Peer-to-Peer Network - is a network that does not have a central computer or
dedicated server; in other words, all computers are independent. This network
is what you would most likely find in home networks or small networks.
• LAN cable, a Cat 5 or category 5 - is a network cable that consists of four twisted
pairs of copper wire terminated by an RJ-45 connector. Cat 5 has a maximum
length of 100m, exceeding this length without the aid of bridge or other network
device could cause network issues.
• Fiber Optic Cable defined in IEEE 802.8 - is cable that contains optical fibers
(usually glass) coated in plastic that are used to send data by pulses of light. The
coating helps protect the fibers from heat, cold, electromagnetic interference
from other types of wiring, as well as some protection from ultraviolet rays from
the sun.
• Packet - is a term first coined by Donald Davies in 1965 that is used to describe a
segment of data sent from one computer or device to another over a network.
LEARNING OUTCOME SUMMARY
ASSESSMENT CRITERIA:
• Cable routes are determined and planned in accordance with network
design and actual installation site.
• Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
• Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
• Appropriate personal protective equipment is used and OHS policies and
procedures are followed
• Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
• Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
• Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
• OHS standards and 5S principles are followed according to enterprise
requirements
• Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program
Introduction to Computer Networks
A computer network is a telecommunication channel using which we can share data with other
computers or devices, connected to the same network. It is also called Data Network. The best example
of a computer network is the Internet.
A network must be able to meet specific criteria’s; these are mentioned below:
● Performance
● Reliability
● Scalability
3. Sharing files, data: Authorized users are allowed to share the files on the network.
Data Communication
The exchange of data between two devices through a transmission medium is called Data
Communication.
Point-To-Point Connection
It is a protocol that is used as a
communication link between two devices. PICTURE
It is simple to establish. The most
common example for Point-to-Point
connection (PPP) is a computer connected
by telephone line.
We can connect the two devices using a
pair of wires or using a microwave or
satellite link. Example: Point-to-Point
connection between the remote control
and Television for changing the channels.
Multipoint Connection It is also called a
Multidrop configuration. In this PICTURE
connection, two or more devices share a
single link. There are two kinds of
Multipoint Connections:
If the links are used simultaneously
between many devices, then it is a
spatially shared line configuration. If the
user takes turns while using the link, then
it is time-shared (temporal) line
configuration.
Types of network Topology
A server is the computer on the network that manages the network resources, such as
the shared files, programs and printers.
Local-area network (LAN) is a computer network covering a small geographic area, like a
home, office, or group of buildings e.g. a school.
The majority of networking, particularly at the corporate level, is done using the internet
standard. At the center of the basic diagram of a wired network is either a hub or a
switcher and computers are connected to the hub, much like spokes of a wheel or star.
Each connection at the hub is called a port.
Metropolitan Area Network – is a network that spans no more than 50 miles. It is design to
connect LANs spanning a town or city.
Wide Area Network – is used to distribute information thousands of miles among thousands of
users.
PICTURE PICTURE
PICTURE
NETWORK SERVER
Host – any computer whether mainframe, server, or even PC that acts as an
information source on a network.
Peers - mean any computer sharing the same protocol layer with another computer.
Workstation- is any network computer that connects to and request resources from a network
Protocol – refers to the specific standards governing the sending and receiving of data.
Types of Networks
Server/client –use a network operating system to manage the entire work.
PICTURE
Peer-to-peer - no centralized computer oversees the networks, no server, and computers simply
connect with each other in a network group to share files, printers, and internet access.
PICTURE
2. Untwist the pairs - don't untwist them beyond what you have exposed, the more
untwisted cable you have the worse the problems you can run into.
4. Trim all the wires to the same length, about 1/2" to 3/4" left exposed from the sheath.
5. Insert the wires into the RJ45 end - make sure each wire is fully inserted to the front of
the RJ45 end and in the correct order. The sheath of the cable should extend into the RJ45
end by about 1/2" and will be held in place by the crimp.
7. Verify the wires ended up the right order and that the wires extend to the front of the
RJ45 end and make good contact with the metal contacts in the RJ45 end.
8. Cut the cable to length - make sure it is more than long enough for your needs.
Remember, an end-to-end connection should not extend more than 100m (~328ft). Try to
keep cables short, the longer the cable becomes the more it may affect performance,
usually noticeable as a gradual decrease in speed and increase in latency.
10. If a cable tester is available, use it to verify the proper connectivity of the cable.
That should be it, if your cable doesn't turn out, look closely at each end and see if you
can find the problem. Usually, a wire ended up in the wrong place or more commonly,
one of the wires didn't extend to the front of the RJ45 connector and is making no, or
poor contact. If you see a mistake or problem, cut the end off and start again.
IDENTIFYING NETWORK MATERIALS
Network and communication cables are network hardware used to connect one
network device to other network devices. For example, connecting two or more
computers to share printers and scanners; connecting several severs to an access
switch. The range covers data and Ethernet cable assemblies, including twisted pair
cable, coaxial cable, optical fiber cable, power line, etc. The twisted pair cable,
coaxial cable and optical fiber cable are categories that are most often referred to.
Twisted pair cabling is a type of wiring in which two conductors (usually copper) of
a single circuit are twisted together.
Why are the pairs twisted together?
-Because the two wires are carrying equal and opposite signals, one pair can induce
crosstalk in another and the effect gets stronger along the length of the cable, which
is bad for the transmission of signal. Twisting the pairs reduce the crosstalk between
lines. Twisted pair cabling is often used in data networks for short and medium
length connections because of its relatively lower costs compared to optical fiber
and coaxial cable.
PICTURE
PICTURE
Summary
This is a quick guide to the common categories of network cables and connectors.
Deeper interpretation on any type of the above-mentioned cables can also be
found on our page or you can study them by searching on the Internet. Knowing
the network and communication cables will benefit both in our daily life and in
network construction work, since the range covers both home-use cables and big-
infrastructure cables.
LEARNING OUTCOME SUMMARY
LEARNING
SET NETWORK CONFIGURATION
OUTCOME #2
CONTENTS:
• Network Configuration
• Configuring NIC
• OS Network Configuration
ASSESSMENT CRITERIA:
Network configuration is the process of setting a network’s controls, flow and operation to support the
network communication of an organization and/or network owner. This broad term incorporates multiple
configuration and setup processes on network hardware or software and other supporting devices and
components.
A patch panel, patch bay, patch field or jack field is a device or unit featuring a number of jacks, usually
of the same or similar type, for the use of connecting and routing circuits for monitoring, interconnecting, and
testing circuits in a convenient, flexible manner. Patch panel are commonly used in computer networking,
recording studios, radio and television.
RJ45 connectors are modular interconnection devices paired with a cable that deliver data
communication to various electronic systems. They contain 8 contacts and 8 wire positions utilized for signals or
power, meaning they allow for 4 twisted wire pairs.
What is NIC?
A network interface card (NIC) is a hardware component, typically a circuit board or chip,
installed on a computer so it can connect to a network. Modern NICs provide functionality to
computers, such as support for input/output interrupt, direct-memory access interfaces, data
transmission, network traffic engineering and partitioning.
Types of NICs
While the standard NIC is a plastic circuit board that slides into a computer to connect with the
motherboard, this connection can occur in multiple ways. Some types of NICs include the
following:
Wireless. NICs that use an antenna to provide wireless reception through radio
frequency waves. Wi-Fi connections use wireless NICs.
Wired. NICs that have input jacks made for cables. Ethernet is the most popular wired
LAN technology.
USB. NICs that provide network connections through a device plugged into the USB port.
Fiber optics. NICs used as a high-speed support system for network traffic handling on
server computers. It's also possible to achieve this support by combining multiple NICs.
Fiber optic NICs are typically more expensive and complex.
NIC components
Speed. All NICs have a speed rating in terms of megabits per second (Mbps) that
determines the card's performance in a network. If the network's bandwidth is lower
than the NIC or multiple computers connect with the same controller, the labeled speed
decreases. The average Ethernet NICs come in 10 Mbps, 100 Mbps, 1000 Mbps and 1
gigabits per second varieties.
Driver. The required software that passes data between the computer's operating
system and the NIC. When a NIC is installed on a computer, the corresponding driver
software is also downloaded. Drivers must stay updated and uncorrupted to ensure
optimal performance from the NIC.
MAC address. Unique, unchangeable media access control addresses, also known as
physical network addresses, are assigned to NICs. MAC addresses deliver Ethernet
packets to the computer.
LED indicator. Most NICs have an LED indicator integrated into the connector to notify
the user when the network connects and data transmission occurs.
CONTENTS:
• WAN Configuration
• LAN Configuration
• Wireless Setting Configuration
• Security and firewall Setting
ASSESSMENT CRITERIA:
Proceed as needed:
For IPv4 routing mode, enter the following information on the IPv4 tab:
• Physical Port: The physical port associated with the primary WAN.
– Get Dynamically from ISP: Choose this option if you have not been assigned
a static DNS IP address.
– Use these DNS Servers: Choose this option if you have assigned a static
DNS IP address. Also enter the addresses in the DNS1 and DNS2 fields.
• MAC Address Source: Specify the MAC address for the primary WAN.
Typically, you can use the unique 48-bit local Ethernet address of the security
appliance as your MAC address source.
– Use Default MAC Address: Choose this option to use the default MAC address.
– Use the following MAC address: If your ISP requires MAC authentication and
another MAC address has been previously registered with your ISP, choose
this option and enter the MAC address that your ISP requires for this
connection.
• Zone: Choose the default WAN zone or an untrusted zone for the primary
WAN. You can click the Create Zone link to view, edit, or add the zones on the
security appliance.
For IPv4/IPv6 routing mode, enter the following information on the IPv6 tab:
– Static IP: If your ISP assigned a static IPv6 address, configure the IPv6 WAN
connection in the following fields:
IPv6 Address: Enter the static IP address that was provided by your ISP.
IPv6 Prefix Length: The IPv6 network (subnet) is identified by the initial bits of
the address called the prefix. All hosts in the network have the identical initial
bits for their IPv6 address. Enter the number of common initial bits in the
network’s addresses. The default prefix length is 64.
Default IPv6 Gateway: Enter the IPv6 address of the gateway for your ISP. This
is usually provided by the ISP or your network administrator.
Primary DNS Server: Enter a valid IP address of the primary DNS server.
• If you are having problems with your WAN connection, see Internet
Connection, page 383.
Note Confirm that you have proper network information from your ISP or a
peer router to configure the security appliance to access the Internet.
Network Addressing
Mode Configuration
DHCP Client Connection type often used with cable modems. Choose this
option if your ISP dynamically assigns an IP address on
connection.
Static IP Choose this option if the ISP provides you with a static
(permanent) IP address and does not assign it dynamically. Use
the corresponding information from your ISP to complete the
following fields:
• User Name: Enter the username that is required to log into the
ISP.
• VLAN Tag ID: Specify the VLAN tag (ID) to the WAN port.
PPTP The PPTP protocol is typically used for VPN connection. Use the
necessary information from your ISP to complete the PPTP
configuration:
L2TP Choose this option if you want to use IPsec to connect a L2TP
(Layer 2 Tunneling Protocol) server and encrypt all data
transmitted from the client to the server. However, it does not
encrypt network traffic to other destinations. Use the necessary
information from your ISP to complete the L2TP configuration:
• User Name: Enter the username that is required to log into the
L2TP server.