0% found this document useful (0 votes)
20 views38 pages

Uc - 2 Module

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views38 pages

Uc - 2 Module

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Unit of Competency 2: Setup Computer Network

MODULE CONTENT
QUALIFICATION COMPUTER SYSTEMS SERVICING NC II
UNIT OF COMPETENCY Setup Computer Networks
MODULE TITLE Setting-up Computer Networks

INTRODUCTION:

This unit covers the outcomes required in setting-up computers


networks for LANs and small-office home-office (SOHO) systems. It consists
of competencies to install network cables, set network configuration, set
router/Wi-Fi/ wireless access point/repeater configuration as well as to
inspect and test the configured computer networks.

LEARNING OUTCOMES:

1. Install network cables


2. Set network configuration
3. Set router/Wi-Fi/ wireless access point/repeater configuration
4. Inspect and test the configured computer networks

ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3.Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked for
correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program
10. Network connectivity of each terminal is checked in accordance with
network design.
11. Any fault or problem in the network system is diagnosed and remedied in
line with the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance with
network design.
13. Communication checking between terminals are carried out in accordance
with OS network configuration guides.
14. Unplanned events or conditions are responded to in accordance with
established procedures.
15. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
16. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
17. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
18. Wireless settings are configured in accordance manufacturers’ instructions,
network design and end-user preferences
19. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end-user preferences
20. Final inspections are undertaken to ensure that the configuration done on
the computer networks conforms with the manufacturer’s instruction/manual
TECHNICAL TERMS

• Network - is a collection of computers, servers, mainframes, network devices,


peripherals, or other devices connected to one another to allow the sharing of
data. An excellent example of a network is the Internet, which connects millions
of people all over the world.

• LAN (Local Area Network) - has networking equipment or computers in close


proximity to each other, capable of communicating, sharing resources and
information. For example, most home and business networks are on a LAN.
Firmware - is a combination of hardware and software, it is a program integrated
on a chip.

• WAN (Wide Area Network) - is a collection of computers and network resources


connected via a network over a geographic area. Wide area networks are
commonly connected either through the Internet or special arrangements made
with phone companies or other service providers.

• Metropolitan Area Network, MAN is a network that is utilized across multiple


buildings. A MAN is much larger than the standard LAN local area network), but
is not as large as a WAN (wide area network). A MAN is commonly used in school
campuses and large companies with multiple buildings.

• Storage Area Network (SAN) - is a specialized, high-speed network that provides


network access to storage devices. SANs are typically composed of hosts,
switches, storage elements, and storage devices that are interconnected using a
variety of technologies, topologies, and protocols. SANs may span multiple sites.

• Internet or wideband transmission, broadband (bb) - are telecommunications


that provide a variety of channels of data over a wire. Today, there are a wide
variety of broadband technologies available in most areas.

• Bandwidth, communication speed, or connection speed is the total maximum


transfer rate of a network cable or device. Essentially, it is a measurement of
how fast data can be sent over a wired or wireless connection, usually measure in
bits per second.

• Broadcast - information is to transmit it to many receivers. For example, a radio


station broadcasts a signal to many listeners, and digital TV subscribers receive a
signal that is broadcast by their TV provider.

• Network Interface Card or NIC - is also referred to as an Ethernet card and


network adapter. It is an expansion card that enables a computer to connect to
a network; such as a home network, or the Internet using an Ethernet cable with
an RJ-45 connector.

• Client and Server - Client is a computer that connects to and uses the resources
of a remote computer, or server. The server provides resources like files,
information, Internet and intranet access. In the case of processing, any work
done on the server is referred to as "server-side" work. Any work done on the
local client is similarly called "client-side”.
• Peer-to-Peer Network - is a network that does not have a central computer or
dedicated server; in other words, all computers are independent. This network
is what you would most likely find in home networks or small networks.

• LAN cable, a Cat 5 or category 5 - is a network cable that consists of four twisted
pairs of copper wire terminated by an RJ-45 connector. Cat 5 has a maximum
length of 100m, exceeding this length without the aid of bridge or other network
device could cause network issues.

• Fiber Optic Cable defined in IEEE 802.8 - is cable that contains optical fibers
(usually glass) coated in plastic that are used to send data by pulses of light. The
coating helps protect the fibers from heat, cold, electromagnetic interference
from other types of wiring, as well as some protection from ultraviolet rays from
the sun.

• Gateway - is a networked device which serves as an entry point into another


network. For example, a wireless router is commonly the default gateway in a
home network.

• Packet - is a term first coined by Donald Davies in 1965 that is used to describe a
segment of data sent from one computer or device to another over a network.
LEARNING OUTCOME SUMMARY

LEARNING INSTALL NETWORK CABLES


OUTCOME #1
CONTENTS:
• Installed Network Cable
• Identifying Network Materials
• Copper Cable splicing and Troubleshooting
• Installed network cables and cables raceway
• OHS standards and 5S principles

ASSESSMENT CRITERIA:
• Cable routes are determined and planned in accordance with network
design and actual installation site.
• Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
• Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
• Appropriate personal protective equipment is used and OHS policies and
procedures are followed
• Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
• Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
• Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
• OHS standards and 5S principles are followed according to enterprise
requirements
• Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program
Introduction to Computer Networks

A computer network is a telecommunication channel using which we can share data with other
computers or devices, connected to the same network. It is also called Data Network. The best example
of a computer network is the Internet.

A node can be a device that is capable of sending or receiving data generated by


other nodes on the network like a computer, printer, etc. These links connecting the devices
are called Communication channels.

A network must be able to meet specific criteria’s; these are mentioned below:
● Performance
● Reliability
● Scalability

Computer Networks: Performance


It can be measured in the following ways:
Transit time: It is the time taken to travel a message from one device to another.
Response time: It is defined as the time elapsed between inquiry and response.
Other ways to measure performance are:
1. Efficiency of software
2. Number of users
3. Capability of connected hardware
Computer Networks: Reliability
It decides the frequency at which network failure takes place. The more the
shortcomings are, the less is the network’s reliability.

Computer Networks: Security


It refers to the protection of data from any unauthorized user or access. While
traveling through a network, data passes many layers of a network, and data can be traced if
attempted. Hence security is also an essential characteristic for Networks.

Properties of a Good Network

1. Interpersonal Communication: We can communicate with each other efficiently


and smoothly. Example: e-mails, chat rooms, video conferencing, etc., all of these are
possible because of computer networks.

2. Resources can be shared: We can share physical resources by making them


available on a network such as printers, scanners, etc.

3. Sharing files, data: Authorized users are allowed to share the files on the network.
Data Communication
The exchange of data between two devices through a transmission medium is called Data
Communication.

Data Communication: Local


Local communication takes place when the communicating devices are in the same
geographical area, the same building, or face-to-face, etc.

Data Communication: Remote


Remote communication takes place over a distance i.e. the devices are farther. The
effectiveness of data communication can be measured through the following features:

1. Delivery: Delivery should be done to the correct destination.


2. Timeliness: Delivery should be on time.
3. Accuracy: Data delivered should be accurate.
Components of Data Communication
1. Message: It is the information to be delivered.
2. Sender: Sender is the person who is sending the message.
3. Receiver: Receiver is the person to whom the message is being sent to.
4. Medium: It is the medium through which the message is sent. For example: A Modem.
5. Protocol: These are some set of rules which govern data communication.

Basic Communication Model


A Communication model is used to exchange data between two parties.

Example communication between a computer, server, and telephone (through Modem).

1. Source - Data to be transmitted is generated by this device, for example: telephones,


personal computers, etc.
2. Transmitter - The data generated by the source system is not directly transmitted in
the form it created. The transmitter transforms and encodes the data in such a way to
produce electromagnetic waves or signals.
3. Transmission system can be a single transmission line or a complex network
connecting source and destination.
4. Receiver accepts the signal from the transmission system and converts it into a form
that is easily managed by the destination device.
1. Destination receives the incoming data from the receiver.

Following are some business applications of computer networks:


1. Resource Sharing:
The goal is to make all programs, equipment (like printers, etc.), and especially data, available
to anyone on the network without regard to the physical location of the resource and the user.
2. Server-Client model:
One can imagine a company’s information system consisting of one or more databases and
some employees who need to access it remotely. In this model, the data is stored on powerful
computers called Servers. Often these are centrally housed and maintained by a system
administrator. In contrast, the employees have simple machines, called Clients, on their desks,
using which they access remote data.
3. Communication Medium:
A computer network can provide a powerful communication medium among employees.
Virtually every company that has two or more computers now has e-mail (electronic mail),
which employees generally use for a great deal of daily communication
4. e-commerce:
A goal that is starting to become more critical in businesses is doing business with consumers
over the Internet. Airlines, bookstores, and music vendors have discovered that many
customers like the convenience of shopping from home. This sector is expected to grow
quickly in the future.
There are two ways to connect the devices:

Point-To-Point Connection
It is a protocol that is used as a
communication link between two devices. PICTURE
It is simple to establish. The most
common example for Point-to-Point
connection (PPP) is a computer connected
by telephone line.
We can connect the two devices using a
pair of wires or using a microwave or
satellite link. Example: Point-to-Point
connection between the remote control
and Television for changing the channels.
Multipoint Connection It is also called a
Multidrop configuration. In this PICTURE
connection, two or more devices share a
single link. There are two kinds of
Multipoint Connections:
If the links are used simultaneously
between many devices, then it is a
spatially shared line configuration. If the
user takes turns while using the link, then
it is time-shared (temporal) line
configuration.
Types of network Topology

1. Bus topology is a network type in


PICTURE
which every computer and network
device isPICTURE
connected to a single cable.
When it has exactly two endpoints, then it
is called Linear Bus topology.

2. RING Topology is called ring topology


PICTURE
because it forms a ring as each computer
is connected to another computer, with
the last one connected to the first. Exactly
two neighbors for each device.

3. STAR topology all the computers are


PICTURE
connected to a single hub through a
cable. This hub is the central node and all
other nodes are connected to the central
node.

4. MESH Topology is a point-to- point


PICTURE
connection to other nodes or devices. All
the network nodes are connected.

5. TREE Topology has a root node and all


other nodes are connected to it forming a
hierarchy. It is also called hierarchical
topology. It should at least have three
levels to the hierarchy.

6. HYBRID topology is two different types


of topologies which is a mixture of two or
more topologies. For example, if in an
office in one department ring topology is
used and, in another star, topology is
used, connecting these topologies will
result in Hybrid Topology (ring topology
and star topology).
A network is a group of interconnected computers, linked for the purpose of sharing
files, programs and peripherals. Through your computers or office network, you can run
programs, use printers, and edit files from other computers as if they were located on
your own.

A server is the computer on the network that manages the network resources, such as
the shared files, programs and printers.

Local-area network (LAN) is a computer network covering a small geographic area, like a
home, office, or group of buildings e.g. a school.

The majority of networking, particularly at the corporate level, is done using the internet
standard. At the center of the basic diagram of a wired network is either a hub or a
switcher and computers are connected to the hub, much like spokes of a wheel or star.
Each connection at the hub is called a port.

Three Basic Network Categories


Local Area Network- the smallest of the three network types, consists of PCs connected
together within a limited area, such as within the same building, floor or department.
PICTURE

LOCAL AREA NETWORK

Metropolitan Area Network – is a network that spans no more than 50 miles. It is design to
connect LANs spanning a town or city.
Wide Area Network – is used to distribute information thousands of miles among thousands of
users.
PICTURE PICTURE

METROPOLITAN AREA WIDE AREA NETWORK


NETWORK
Network Server- is a powerful computer whose sole purpose is to serve network clients.

PICTURE

NETWORK SERVER
Host – any computer whether mainframe, server, or even PC that acts as an
information source on a network.
Peers - mean any computer sharing the same protocol layer with another computer.
Workstation- is any network computer that connects to and request resources from a network
Protocol – refers to the specific standards governing the sending and receiving of data.

Types of Networks
Server/client –use a network operating system to manage the entire work.
PICTURE

Peer-to-peer - no centralized computer oversees the networks, no server, and computers simply
connect with each other in a network group to share files, printers, and internet access.

PICTURE

The Basic Rule


The basic rule for network design is known as the 5-4-3 rule. It states that in a 10 Mbps.
Ethernet network: You can have a maximum of five cable segments between any two
computers, you can have a maximum of four repeaters (hubs, switches, wireless access points,
etc.) between any two computers of the five cable segments (maximum) between any
computers, only three of these can terminate in computers.
Standard, Straight-Through Wiring (both ends are the same):
Wire Color Wire Diagram 10Base-T Signal
RJ45 Pin # 1000Base-T Signal
(T568A) (T568A) 100Base-TX Signal
1 White/Green Transmit+ BI_DA+
2 Green Transmit- BI_DA-
3 White/ Receive+ BI_DB+
Orange
4 Blue Unused BI_DC+
5 White/Blue Unused BI_DC-
6 Orange Receive- BI_DB-
7 White/Brown Unused BI_DD+
8 Brown Unused BI_DD-
Straight-Through Cable Pinout for T568A

Wire Color Wire Diagram 10Base-T Signal


RJ45 Pin # 1000Base-T Signal
(T568B) (T568B) 100Base-TX Signal
1 White/ Transmit+ BI_DA+
Orange
2 Orange Transmit- BI_DA-
3 White/Green Receive+ BI_DB+
4 Blue Unused BI_DC+
5 White/Blue Unused BI_DC-
6 Green Receive- BI_DB-
7 White/Brown Unused BI_DD+
8 Brown Unused BI_DD-
Straight-Through Cable Pinout for T568B

Cross Over Cable (T568B):


RJ45 Pin # Diagram End RJ45 Pin # Diagram End
Wire Color Wire Color
(END 1) #1 (END 2) #2
1 White/ 1 White/Green
Orange
2 Orange 2 Green
3 White/Green 3 White/
Orange
4 Blue 4 White/Brown
5 White/Blue 5 Brown
6 Green 6 Orange
7 White/Brown 7 Blue
8 Brown 8 White/Blue
How to wire Ethernet Cables:

1. Strip off about 2 inches of the cable sheath.

2. Untwist the pairs - don't untwist them beyond what you have exposed, the more
untwisted cable you have the worse the problems you can run into.

3. Align the colored wires according to the diagrams above.

4. Trim all the wires to the same length, about 1/2" to 3/4" left exposed from the sheath.

5. Insert the wires into the RJ45 end - make sure each wire is fully inserted to the front of
the RJ45 end and in the correct order. The sheath of the cable should extend into the RJ45
end by about 1/2" and will be held in place by the crimp.

6. Crimp the RJ45 end with the crimper tool

7. Verify the wires ended up the right order and that the wires extend to the front of the
RJ45 end and make good contact with the metal contacts in the RJ45 end.

8. Cut the cable to length - make sure it is more than long enough for your needs.
Remember, an end-to-end connection should not extend more than 100m (~328ft). Try to
keep cables short, the longer the cable becomes the more it may affect performance,
usually noticeable as a gradual decrease in speed and increase in latency.

9. Repeat the above steps for the second RJ45 end.

10. If a cable tester is available, use it to verify the proper connectivity of the cable.

That should be it, if your cable doesn't turn out, look closely at each end and see if you
can find the problem. Usually, a wire ended up in the wrong place or more commonly,
one of the wires didn't extend to the front of the RJ45 connector and is making no, or
poor contact. If you see a mistake or problem, cut the end off and start again.
IDENTIFYING NETWORK MATERIALS
Network and communication cables are network hardware used to connect one
network device to other network devices. For example, connecting two or more
computers to share printers and scanners; connecting several severs to an access
switch. The range covers data and Ethernet cable assemblies, including twisted pair
cable, coaxial cable, optical fiber cable, power line, etc. The twisted pair cable,
coaxial cable and optical fiber cable are categories that are most often referred to.

What Twisted Pair Is Like and Its Cabling Standards

Twisted pair cabling is a type of wiring in which two conductors (usually copper) of
a single circuit are twisted together.
Why are the pairs twisted together?
-Because the two wires are carrying equal and opposite signals, one pair can induce
crosstalk in another and the effect gets stronger along the length of the cable, which
is bad for the transmission of signal. Twisting the pairs reduce the crosstalk between
lines. Twisted pair cabling is often used in data networks for short and medium
length connections because of its relatively lower costs compared to optical fiber
and coaxial cable.

Shielded Twisted Pair vs. Unshielded Twisted Pair


Twisted pair cables are often shielded in an attempt to prevent electromagnetic
interference. Twisted pair with shielding are known as shielded twisted pair (STP). In
contrast to STP, unshielded twisted pair (UTP) is not surrounded by any shielding.
STP cable is also divided by overall shield and individual shield. Individual shielded
twisted pair is with aluminum foil for each twisted pair or quad. This type of
shielding protects cable from external electromagnetic interference (EMI) entering
or exiting the cable and also protects neighboring pairs from crosstalk. Overall
shielded twisted pair is with overall foil or braided shield across all of the pairs
within the 100 Ω twisted pair cable. This type of shielding helps prevent EMI from
entering or exiting the cable. One STP cable can have both overall and individual
shielding.
PICTURE

Figure 1: shielded twisted pair construction.


UTP cable without shielding is more prone to outside interference. For this
reason, this cable type is more often found in indoor telephone applications.
Outdoor telephone cables contain hundreds or thousands of pairs. Pairs that
have the same twisted rate within the cable can experience some degree of
crosstalk, so wire pairs are usually selected carefully within a large cable to
reduce the crosstalk.
Most UTP cable uses RJ45 connectors, which look like telephone connectors (RJ11)
but have eight wires instead of four.
PICTURE

Figure 2: RJ45 connector (up) and RJ45 adaptor (up).


The Nearest Twisted Pair to Us: Ethernet Cable
Ethernet cable is a typical type of twisted pairs, and probably the most familiar one
to us. The following table gives the basic information of some Ethernet cables.

Table 1: twisted pair Ethernet cable types.

NAME TYPICAL BANDWIDTH APPLICATIONS


CONSTRUCTION
CAT 3 UTP 16 MHz 10BASE-T and 100BASE-T4 Ethernet
CAT 4 UTP 20 MHz 16Mbit/s Token Ring
CAT 5 UTP 100 MHz 100BASE-TX & 1000BASE-T Ethernet
CAT 5e UTP 100 MHz 100BASE-TX & 1000BASE-T Ethernet
CAT 6 STP 250 MHz 10GBASE-T Ethernet
CAT 6a STP 500 MHz 10GBASE-T Ethernet
CAT 7 STP 600 MHz 10GBASE-T Ethernet or
POTS/CATV/1000BASE-T over single cable
CAT 7a STP 1000 MHz 10GBASE-T Ethernet or
POTS/CATV/1000BASE-T over single cable
CAT 8/8.1 STP 1600-2000 MHz 40GBASE-T Ethernet or
POTS/CATV/1000BASE-T over single cable
CAT 8.2 STP 1600-2000 MHz 40GBASE-T Ethernet or
POTS/CATV/1000BASE-T over single cable

Twisted Pair Cabling: T568A or T568B?


Two wiring standards are commonly used with twisted pair cabling: T568A
and T568B. These are telecommunications standards from TIA and EIA that
specify the pin arrangements for the connectors (often RJ45) on UTP or STP
cables. The number 568 refers to the order in which the wires within the
twisted pair cable are terminated and attached to the connector. The signal is
identical for both.
Pin numbers are read left to right, with the connector tab facing down. Notice
that the pin-outs stay the same, and the only difference is in the color coding
of the wiring.
Figure 3: T568A and T568B wiring standards for twisted pair cabling.

Coaxial Cable: Not Just a Video Cable

Coaxial cable is a type of cable that has an inner conductor surrounded


by a tubular insulating layer, surrounded by a tubular conducting shield.
The inner conductor and the outer shield share a geometric axis. Many
coaxial cables have an insulating outer sheath or jacket.
PICTURE

Figure 4: coaxial cable construction.

Why Is Coaxial Cable Good for Radio Transmission?


Coaxial cable is used as a transmission line for radio frequency (RF) signals. Its
applications include feedlines connecting radio transmitters and receivers with
their antennas, computer network connections, digital audio, and distributing
cable television signals. Coaxial cable has an obvious advantage over other types
of radio transmission line. In a good coaxial cable, the electromagnetic field
carrying the signal exists only in the space between the inner conductor and the
outer conducting shield. For this reason, coaxial cables are allowed to be installed
next to metal objects without power losses that occur in other types of radio
transmission line.

Widely Used Coaxial Connector Types


Many coaxial connector types are available in the audio, digital, video, RF and
microwave industries, each designed for a specific purpose and application. One
consideration the number of connect-disconnect cycles that a connector pair
could withstand while still performing as expected. Here are some common
coaxial connector types.
Table 2: coaxial connector types.
TYPE FEMALE MALE MAXIMUM
FREQUENCY
APPLICATION
TYPE F 250 MHz to 1 GH z.
PICTURE
VIDEO PICTURE The “F” series
connectors are
primarily utilized in
television cable
antenna
applications

TYPE N 12 GHz or more.


PICTURE PICTURE Type N connector
was originally
designed for
military systems
operating below 5
GHz, later improved
to 12 GHz and
higher. Type N
connectors follow
the military
standard MIL-C-
39012.

PHONE 100 kHz or less.


PLUGS Same with the
AND names, the phone
JACKS plug is the male
TS, TRS connector, a phone
jack is the female
connector.

RCA 10 MHz A round,


PHONE press-on connector
PLUGS commonly used for
AND consumer- grade
JACKS audio and
composite video
connections

7/16 7.5 GHz. A relatively


DIN new connector
used popularly as
an interconnect in
cellular and other
so called “wireless”
applications,
especially on
towers.
APC-7 The genderless
7 mm APC- 7 (Amphenol
Precision Connector
- 7mm) offers the
lowest reflection
coefficient and
most repeatable
measurement of all
18 GHz connectors,
The Capable Optical Fiber Cable
Optical fiber cabling is an excellent transmission medium for its high data capacity and
supported long distances. It is indispensable in any fiber optic network. It has a
fiber/glass core within a rubber outer coating and uses beams of light rather than
electrical signals to relay data. Because light doesn't diminish over distance the way
electrical signals do, this cabling can run for distances measured in kilometers with
transmission speeds from 10 Mbps up to 100 Gbps or higher.

PICTURE

Figure 5: optical fiber cable cutaway.

The Fiber Core Size Matters: SMF and MMF


The inner fiber can be either single mode or multimode. Generally, a single mode fiber
core is 9/125µm wide, whereas a multimode fiber core can be 62.5/125µm or 50/125µm
wide. Only the early OM1 is 62.5/125µm fiber, the later generations OM2, OM3, OM4,
OM5 50/125µm fiber. The letters “OM” stand for optical multimode. Both multimode
fiber (MMF) and single mode fiber (SMF) can be used for high-speed transmission. MMF
is often for short reach while SMF is for long reach.
PICTURE

Figure 6: multimode fiber and single mode fiber core diameters.

Multiple Fiber Optic Connectors


Optical fiber cables can be terminated with various types of fiber optic
connectors that can be plugged into different ports of devices. The figure
below shows some common fiber optic connector types, and the LC, SC and
ST are most used three types.

PICTURE

Figure 7: common fiber optic connector types.


In addition, there is a multi-fiber connector type called MTP/MPO (Multi-fiber
Push On). It is designed for higher bandwidth applications such as 40GbE and
100GbE. 12- and 24-fiber versions are currently used to directly connect into 40G
and 100G transceivers and also used in high density fiber distribution areas.
Higher fiber versions are also available (48, 72 fibers) but their use and
deployment is currently limited.
PICTURE

Figure 8: 12-fiber and 24-fiber MTP/MPO connector interfaces.

Summary
This is a quick guide to the common categories of network cables and connectors.
Deeper interpretation on any type of the above-mentioned cables can also be
found on our page or you can study them by searching on the Internet. Knowing
the network and communication cables will benefit both in our daily life and in
network construction work, since the range covers both home-use cables and big-
infrastructure cables.
LEARNING OUTCOME SUMMARY

LEARNING
SET NETWORK CONFIGURATION
OUTCOME #2

CONTENTS:

• Network Configuration
• Configuring NIC
• OS Network Configuration

ASSESSMENT CRITERIA:

• Network connectivity of each terminal is checked in accordance


with network design.
• Any fault or problem in the network system is diagnosed and
remedied in line with the standard operating procedures.
• Network interface card (NIC) settings are configured in
accordance with network design.
• Communication checking between terminals are carried out in
accordance with OS network configuration guides
• Unplanned events or conditions are responded to in accordance with
established procedures
Network Configuration

Network configuration is the process of setting a network’s controls, flow and operation to support the
network communication of an organization and/or network owner. This broad term incorporates multiple
configuration and setup processes on network hardware or software and other supporting devices and
components.

Below is an example of basic network configuration in computer system servicing.


Patch Panel?

A patch panel, patch bay, patch field or jack field is a device or unit featuring a number of jacks, usually
of the same or similar type, for the use of connecting and routing circuits for monitoring, interconnecting, and
testing circuits in a convenient, flexible manner. Patch panel are commonly used in computer networking,
recording studios, radio and television.

Patch panel cable management

RJ45 Modular Box

RJ45 connectors are modular interconnection devices paired with a cable that deliver data
communication to various electronic systems. They contain 8 contacts and 8 wire positions utilized for signals or
power, meaning they allow for 4 twisted wire pairs.
What is NIC?

A network interface card (NIC) is a hardware component, typically a circuit board or chip,
installed on a computer so it can connect to a network. Modern NICs provide functionality to
computers, such as support for input/output interrupt, direct-memory access interfaces, data
transmission, network traffic engineering and partitioning.

A NIC provides a computer with a dedicated, full-time connection to a network. It


implements the physical layer circuitry necessary for communicating with a data link layer
standard, such as Ethernet or Wi-Fi. Each card represents a device and can prepare, transmit and
control the flow of data on the network.

Types of NICs

While the standard NIC is a plastic circuit board that slides into a computer to connect with the
motherboard, this connection can occur in multiple ways. Some types of NICs include the
following:

 Wireless. NICs that use an antenna to provide wireless reception through radio
frequency waves. Wi-Fi connections use wireless NICs.

 Wired. NICs that have input jacks made for cables. Ethernet is the most popular wired
LAN technology.

 USB. NICs that provide network connections through a device plugged into the USB port.

 Fiber optics. NICs used as a high-speed support system for network traffic handling on
server computers. It's also possible to achieve this support by combining multiple NICs.
Fiber optic NICs are typically more expensive and complex.

NIC components

Components of NICs include the following:

 Speed. All NICs have a speed rating in terms of megabits per second (Mbps) that
determines the card's performance in a network. If the network's bandwidth is lower
than the NIC or multiple computers connect with the same controller, the labeled speed
decreases. The average Ethernet NICs come in 10 Mbps, 100 Mbps, 1000 Mbps and 1
gigabits per second varieties.

 Driver. The required software that passes data between the computer's operating
system and the NIC. When a NIC is installed on a computer, the corresponding driver
software is also downloaded. Drivers must stay updated and uncorrupted to ensure
optimal performance from the NIC.

 MAC address. Unique, unchangeable media access control addresses, also known as
physical network addresses, are assigned to NICs. MAC addresses deliver Ethernet
packets to the computer.
 LED indicator. Most NICs have an LED indicator integrated into the connector to notify
the user when the network connects and data transmission occurs.

 Router. A router is sometimes needed to enable communication between a computer


and other devices. In this case, the NIC connects to the router which is connected to the
internet.

LEARNING OUTCOME SUMMARY

LEARNING SET ROUTER/WI-FI/WIRELESS ACCESS


OUTCOME #3 POINT/REPEATER CONFIGURATION

CONTENTS:

• WAN Configuration
• LAN Configuration
• Wireless Setting Configuration
• Security and firewall Setting

ASSESSMENT CRITERIA:

• Client Device systems settings are configured in


accordance with manufacturers’ instructions and end-
user preferences
• Local area network (LAN) port is configured in
accordance with manufacturers’ instructions and
network design
• Wide area network (WAN) port is configured in
accordance with manufacturers’ instructions and
network design
• Wireless settings are configured in accordance manufacturers’
instructions, network design and end-user preferences
• Security/Firewall/Advance settings are configured in
accordance with manufacturers’ instructions and end-user
preferences
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. A data packet is typically forwarded from
one router to another router through the networks that constitute the internetwork until it reaches
its destination node.

INFORMATION SHEET 3.1-1

Configuring WAN Settings for Internet Connection

Configuring WAN Settings for Your Internet Connection


Use the Networking > WAN > WAN Settings to configure WAN settings by
using the account information provided by your ISP. If you have two ISP links,
you can configure one for WAN1 and another for WAN2.

Proceed as needed:

• Release or renew a DHCP WAN connection

• Configure the primary WAN

• Configure a secondary WAN

Release or renew a DHCP WAN connection


If a WAN interface is configured to obtain an IP address from the ISP by using
Dynamic Host Configuration Protocol (DHCP), you can click the Release icon to
release its IP address, or click the Renew icon to obtain a new IP address.

Configure the primary WAN


To configure the settings for the primary WAN (WAN1), click the Edit (pencil)
icon. Then use the WAN - Add/Edit page to configure the connection. If you
enabled IPv4/IPv6 routing mode, complete both tabbed pages. Click OK to
save your settings. Click Save to apply your settings to the security appliance.

For IPv4 routing mode, enter the following information on the IPv4 tab:

• Physical Port: The physical port associated with the primary WAN.

• WAN Name: The name of the primary WAN (WAN1).

• IP Address Assignment: Depending on the requirements of your ISP, choose


the network addressing mode and complete the corresponding settings. The
security appliance supports DHCP Client, Static IP, PPPoE, PPTP, and L2TP. For
information on configuring network addressing mode, see Network Addressing
Mode.

• DNS Server Source: DNS servers map Internet domain names to IP


addresses. You can get DNS server addresses automatically from your ISP or
use ISP-specified addresses.

– Get Dynamically from ISP: Choose this option if you have not been assigned
a static DNS IP address.

– Use these DNS Servers: Choose this option if you have assigned a static
DNS IP address. Also enter the addresses in the DNS1 and DNS2 fields.
• MAC Address Source: Specify the MAC address for the primary WAN.
Typically, you can use the unique 48-bit local Ethernet address of the security
appliance as your MAC address source.

– Use Default MAC Address: Choose this option to use the default MAC address.

– Use the following MAC address: If your ISP requires MAC authentication and
another MAC address has been previously registered with your ISP, choose
this option and enter the MAC address that your ISP requires for this
connection.

• MAC Address: Enter the MAC address, for example 01:23:45:67:89:ab.

• Zone: Choose the default WAN zone or an untrusted zone for the primary
WAN. You can click the Create Zone link to view, edit, or add the zones on the
security appliance.

For IPv4/IPv6 routing mode, enter the following information on the IPv6 tab:

• IP Address Assignment: Choose Static IP if your ISP assigned a fixed (static or


permanent) IP address, or choose SLAAC if you were not assigned a static IP
address. By default, your security appliance is configured to be a DHCPv6
client of the ISP, with stateless address auto-configuration (SLAAC).

– SLAAC: SLAAC provides a convenient method to assign IP addresses to


IPv6 nodes. This method does not require any human intervention from an
IPv6 user. If you choose SLAAC, the security appliance can generate its own
addresses using a combination of locally available information and
information advertised by routers.

– Static IP: If your ISP assigned a static IPv6 address, configure the IPv6 WAN
connection in the following fields:

IPv6 Address: Enter the static IP address that was provided by your ISP.

IPv6 Prefix Length: The IPv6 network (subnet) is identified by the initial bits of
the address called the prefix. All hosts in the network have the identical initial
bits for their IPv6 address. Enter the number of common initial bits in the
network’s addresses. The default prefix length is 64.

Default IPv6 Gateway: Enter the IPv6 address of the gateway for your ISP. This
is usually provided by the ISP or your network administrator.

Primary DNS Server: Enter a valid IP address of the primary DNS server.

Secondary DNS Server (Optional): Optionally, enter a valid IP address of the


secondary DNS server.
Configure a secondary WAN
To configure a secondary WAN (WAN2), click Add. Then use the WAN - Add/Edit
page to configure the connection. If you enabled IPv4/IPv6 routing mode,
complete both tabbed pages, as described for the primary WAN interface.
Click OK to save your settings in the pop-up window. Click Save to apply your
settings to the security appliance. To determine how the two ISP links are
used, configure the WAN redundancy settings. See Configuring WAN
Redundancy.

• If you are having problems with your WAN connection, see Internet
Connection, page 383.

Network Addressing Mode


The security appliance supports five types of networks addressing modes. You
need to specify the network addressing mode for the primary WAN and the
secondary WAN depending on your ISP requirements.

Note Confirm that you have proper network information from your ISP or a
peer router to configure the security appliance to access the Internet.

Network Addressing
Mode Configuration

DHCP Client Connection type often used with cable modems. Choose this
option if your ISP dynamically assigns an IP address on
connection.

NOTE: Unless a change is required by your ISP, it is


recommended that the MTU values be left as is.

• MTU: The Maximum Transmission Unit is the size, in bytes,


of the largest packet that can be passed on. Choose Auto to
use the default MTU size, or choose Manual if you want to
specify another size.

• MTU Value: If you choose Manual, enter the custom MTU


size in bytes.

Static IP Choose this option if the ISP provides you with a static
(permanent) IP address and does not assign it dynamically. Use
the corresponding information from your ISP to complete the
following fields:

• IP Address: Enter the IP address of the WAN port that


can be accessible from the Internet.

• Subnet Mask: Enter the IP address of the subnet mask.

• Gateway: Enter the IP address of default gateway.

• MTU: The Maximum Transmission Unit is the size, in bytes,


of the largest packet that can be passed on. Choose Auto to
use the default MTU size, or choose Manual if you want to
specify another size.

• MTU Value: If you choose Manual, enter the custom MTU


size in bytes.

PPPoE PPPoE uses Point to Point Protocol over Ethernet (PPPoE) to


connect to the Internet. Choose this option if your ISP provides
you with client software, username, and password. Use the
necessary PPPoE information from your ISP to complete the
PPPoE configuration.

• User Name: Enter the username that is required to log into the
ISP.

• Password: Enter the password that is required to log into the


ISP.

• Authentication Type: Choose the authentication type


specified by your ISP.

• Connect Idle Time: Choose this option to let the security


appliance disconnect from the Internet after a specified period
of inactivity (Idle Time). This choice is recommended if your
ISP fees are based on the time that you spend online.

• Keep alive: Choose this option to keep the connection


always on, regardless of the level of activity. This choice is
recommended if you pay a flat fee for your Internet service.

• MTU: Choose Auto to use the default MTU size, or choose


Manual
if you want to specify another size.

• MTU Value: If you choose Manual, enter the custom MTU


size in bytes.

• Add VLAN Tag: Click Yes to support VLAN Tagging (802.1q)


over the WAN port, or click No to disable it.

• VLAN Tag ID: Specify the VLAN tag (ID) to the WAN port.

• Reset Timer: You can reset the PPPoE connection at a given


time of a day and day of a week. The reset events are logged if
you enable this feature. Choose one of the following options
from the Frequency drop-down list and specify the
corresponding settings:

– Never: Choose this option to disable this feature.

– Daily: Choose this option to reset the PPPoE connection at a


given time of a day. Specify the time of a day in the Time fields.

– Weekly: Choose this option to reset the PPPoE connection at


a given day of a week. Then specify the day of a week and the
time of a day.

PPTP The PPTP protocol is typically used for VPN connection. Use the
necessary information from your ISP to complete the PPTP
configuration:

• IP Address: Enter the IP address of the WAN port that


can be accessible from the Internet.

• Subnet Mask: Enter the subnet mask.

• Gateway: Enter the IP address of default gateway.

• User Name: Enter the username that is required to log


into the PPTP server.

• Password: Enter the password that is required to log into the


PPTP server.

• PPTP Server IP Address: Enter the IP address of the PPTP


server.

• MPPE Encryption: Microsoft Point-to-Point Encryption (MPPE)


encrypts data in PPP-based dial-up connections or PPTP VPN
connections. Check this box to enable the MPPE encryption to
provide data security for the PPTP connection that is between
the VPN client and the VPN server.

• Connect Idle Time: Choose this option to let the security


appliance disconnect from the Internet after a specified period
of inactivity (Idle Time). This choice is recommended if your
ISP fees are based on the time that you spend online.

• Keep alive: Choose this option to keep the connection


always on, regardless of the level of activity. This choice is
recommended if you pay a flat fee for your Internet service.

• MTU: Choose Auto to use the default MTU size, or choose


Manual
if you want to specify another size.

• MTU Value: If you choose Manual, enter the custom MTU


size in bytes.

L2TP Choose this option if you want to use IPsec to connect a L2TP
(Layer 2 Tunneling Protocol) server and encrypt all data
transmitted from the client to the server. However, it does not
encrypt network traffic to other destinations. Use the necessary
information from your ISP to complete the L2TP configuration:

• IP Address: Enter the IP address of the WAN port that


can be accessible from the Internet.

• Subnet Mask: Enter the subnet mask.

• Gateway: Enter the IP address of default gateway.

• User Name: Enter the username that is required to log into the
L2TP server.

• Password: Enter the password that is required to log into the


L2TP server.

• L2TP Server IP Address: Enter the IP address of the L2TP


server.

• Secret (Optional): L2TP incorporates a simple, optional,


CHAP-like tunnel authentication system during control
connection establishment. Enter the secret for tunnel
authentication if necessary.

• Connect Idle Time: Choose this option to let the security


appliance disconnect from the Internet after a specified period
of inactivity (Idle Time). This choice is recommended if your
ISP fees are based on the time that you spend online.
• Keep alive: Choose this option to keep the connection
always on, regardless of the level of activity. This choice is
recommended if you pay a flat fee for your Internet service.

• MTU: Choose Auto to use the default MTU size, or choose


Manual
if you want to specify another size.

• MTU Value: If you choose Manual, enter the custom MTU


size in bytes.

You might also like