0% found this document useful (0 votes)
2 views

CSS JE

This module covers the installation and configuration of computer hardware and software, detailing essential components such as monitors, keyboards, mice, and various types of storage devices. It also discusses networking basics, including network components and tools necessary for computer servicing. Additionally, safety procedures for assembling and disassembling computers are outlined, emphasizing the importance of using appropriate tools and precautions to prevent electrical hazards.

Uploaded by

paranasskills
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CSS JE

This module covers the installation and configuration of computer hardware and software, detailing essential components such as monitors, keyboards, mice, and various types of storage devices. It also discusses networking basics, including network components and tools necessary for computer servicing. Additionally, safety procedures for assembling and disassembling computers are outlined, emphasizing the importance of using appropriate tools and precautions to prevent electrical hazards.

Uploaded by

paranasskills
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 39

––

This module is about Computer Hardware and Computer Software Installations and Configurations

This module is about Computer Hardware and Computer Software Installations and Configurations

Computer
Systems Servicing
NC II
COC1 - INSTALL AND CONFIGURE COMUTER SYSTEMS
COC2 – SET UP COMPUTER NETWORK
COC3 – SET UP COMPUTER SERVER
COC4 – MAINTAIN AND REPAIR COMPUTER SYSTEMS AND NETWORKS

CREATED BY: Juanito O. Castañeda Jr.

CREATED BY: RANGELO R. CORALES


COMPUTER
SYSTEMS
SERVICING NC II
COC I – INSTALL AND CONFIGURE COMPUTER

4 Dimension of Competency
TASK SKILLS
- undertaking a specific workplace task(s)
CB: JUANITO O. CASTAÑEDA JR. -CSS

KNOWLEDGE SKILLS ATTITUDE

TASK MANAGEMENT SKILLS


-- managing a number of different tasks to complete a whole
work activity
PLAN TECHNIQUE TIME SPEED

CONTINGENCY MANAGEMENT SKILLS


– Responding to problems and irregularities when undertaking a
work activity, such as:
Breakdowns
Changes in routine
Unexpected or atypical results or outcomes
Difficult or dissatisfied clients

JOB ROLE/ENVIRONMENT SKILLS


- Dealing with the responsibilities and expectations of the work
environment when undertaking a work activity, such as:
Working with others
Interacting with clients and suppliers
Complying with standard operating procedures
Observing enterprise policy and procedures
1
What is a Computer?
Computer is an electronic device that ACCEPTS,
PROCESSES, STORES, and OUTPUTS data at high speeds
according to programmed instructions.
There are two basic components that make up a
computer: hardware and software.
A computer can…
 Accept data
 Process data as desired
 Print the result in desired format
 Store data/output
 Retrieve the stored data as and when required

What is Data? What is Information?


 Data is any fact which can be  Information is the manipulation of
operated on to derive meaningful data.
information.  Data becomes information when

CB: JUANITO O. CASTAÑEDA JR. -CSS


 Data are raw facts which can be they are processed and convey
manipulated. meaning to people.
 Information science defines data as  ...so data is raw and information is
unprocessed information. processed.

DATA PROCESSING
Is a manipulation of Data into a more meaningful form?

INPUT PROCESS OUTPUT


DATA CPU INFORMATION

2
3
CB: JUANITO O. CASTAÑEDA JR. -CSS
COMPUTER PERIPHERALS
MONITOR – (OUTPUT)
It’s a TV like hardware device that is use to display images on the
screen

TYPES of MONITOR MONITOR CABLE TYPES


CRT – Cathode Ray Tube
VGA – Video Graphic Array
LCD – Liquid Cristal Display
DVI – Digital Video Interface
LED – Light Emitting Diod
HDMI – High Definition Multi
Media Interface
KEYBOARD –
(INPUT)
Mainly use for typing text, numbers

CB: JUANITO O. CASTAÑEDA JR. -CSS


and symbols and compose of 5 keys

KEYBOARD CABLE TYPES


SERIAL (OLD VERSION)
PS2 – Personal System 2 KEYBOARD KEYS
USB – Universal Serial Bus Function Keys Alpha Numeric Keys Special Keys

Navigation Keys Numeric Keys

MOUSE – (INPUT)
An hand-held device use to send commands to the computer
by controlling the cursor
TYPES OF MOUSE
Mechanical Mouse - Use ball as sensor
Optical Mouse - Use light as sensor

PART OF MOUSE
1, Right Button 2, Left Button 3, Scroll Wheel 4,
Sensor

4
PRINTER – (OUTPUT)
A device use to transfer digital data into a paper.
TYPES OF PRINTER
Printer Cable Types
Dot-Matrix Printer
Ink Jet Printer - Parallel Cable
Laser Printer - Serial Cable
- USB
COMMON BRAND
Epson
HP
Brother
Canon

DOT-MATRIX INK JET LASER


CB: JUANITO O. CASTAÑEDA JR. -CSS

5
SCANNER – (INPUT)
A device that us to transfer hard copy to a digital data
in form of picture form
Scanner Cable Types
- Parallel Cable
- Serial Cable
- USB

SPEAKER/HEADSET/HEADPHONE –
(OUTPUT)
A device that us to transfer hard copy to a digital data in form
of picture form

CB: JUANITO O. CASTAÑEDA JR. -CSS


Printer Cable Types
- USB - Audio Jack
MIC LINE OUT LINE IN

MICROPHONE – (INPUT)
A device use to record audio inputs in to the computer for
modification or other purposes.

Microphone Cable Types


USB - Audio Jack

PROJECTOR – (OUTPUT)
Use to expand or extend the graphic output of the
monitor in to a big screen. It is usually use for reporting
or presentation.

6
OTHERS COMPUTER PARTS

UPS – Uninterruptable Power Supply


A back-up battery that can retain small amount of electricity when in case
of accidental power lost for the user to save and lost running applications
before shutting down the computer

AVR – Automatic Voltage Regulator


A device use to maintain the amount of electricity (220 V) that is entering
to the power supply

SYSTEM UNIT
A box-like case that houses the electronic
components of the computer that are used to
CB: JUANITO O. CASTAÑEDA JR. -CSS

process data.
PARTS OF SYSTEM UNITS
- Rare Part
- Back Panel
- System Case

COMPONENTS INSIDE THE CASE


BRAND OF CPU
 Also known as the microprocessor
 Performs calculations
 Compares data
 Processes results

BASIC PARTS OF CPU


ALU CONROL UNIT INTEL AMD

TYPES OF COMPUTER MEMORY


RAM - Random Access Memory
7 ROM - Read Only Memory
RAM – RANDOM ACCESS MEMORY

A Pc’s main memory is fast storage that is directly


accessible by the CPU, and is used to store the
currently executing program and
immediately needed data.

TYPES OF RAM
- Static RAM
- Dynamic RAM
EXAMPLES OF
RAM
EDU
SDRAM
DDR2, DDR3 and DDR4

ROM – READ ONLY MEMORY

CB: JUANITO O. CASTAÑEDA JR. -CSS


HARD DISK DRIVE
TYPES OF HARD DISK DRIVE Mass storage devices store programs and data
SATA TYPE PATA/IDE TYPE even when the power is off; they do require
power to perform read and write functions during
usage.

SATA – Serial Advance Technology Attachment


PATA – Parallel Advance Technology Attachment
Advantages: IDE – Integrated Drive Electronics
Speed (data transfer) SOLID STATE DRIVE – New version of HDD
Temperature Hard Disk commonly
Drive Cableuse nowadays
Type
Connectivity -IDE Cable -SATA Cable

CD/DVD ROM – COMPACT DISK /


DIGITAL VIDEO DISK
A drive that use to read and write
data on an optical disk
Types of CDs and DVDs:
Read Only
Recordable
8 Rewritable Optic Disk
OTHER ROM DEVICES
POWER SUPPLY
Converts alternating current (AC) to direct
current (DC). All the components in the system
USB FLASH DRIVE DISKETTE
unit get their powerFLASH CARDS
source from the power
supply

TYPES OF POWER SUPPY


-ADVANCE TECHNOLOGY (AT) – 20 PINS
-ADVANCE TECHNOLOGY EXTENDED – 24 PINS

MOTHERBOARD
Main Circuit board of the computer.
CB: JUANITO O. CASTAÑEDA JR. -CSS

9
CB: JUANITO O. CASTAÑEDA JR. -CSS
BACK PANEL CONNECTORS
BIOS – BASIC INPUT/OUTPUT
SYSTEM
A BIOS chip (Basic Input Output System) is a very
important computer component. In simple terms, the
BIOS chip wakes up the computer when you turn it on
and reminds it what parts it has and what they do!

10 BIOS perform Power On Self-test (POST)

CMOS BATTERY - COMPLEMENTARY


METAL OXIDE SEMI CONDUCTOR
 Used to store startup configuration options such as:
 Disk drives, keyboard, monitor; the current date and time
 Other startup information needed when the computer is turned on.
 CMOS chips use batteries to maintain the date and time when the
computer is turned off.
 It can be changed.
CMOS AND BIOS CHIPSET
CABLES USE INSIDE THE CASE
- Serial Advance Technology Attachment Cable
- Integrated Drive Electronics Cable
- Floppy Cable
- Front Panel Connectors
CB: JUANITO O. CASTAÑEDA JR. -CSS

- Power Supply Connector


NORTH AND SOUTH BRIDGE CHIPSETS
A Northbridge or host bridge is one of the two chips in
the core logic chipset architecture on a PC motherboard,
the other being the Southbridge. Unlike the Southbridge,
Northbridge is connected directly to the CPU via the
front-side bus (FSB) and is thus responsible for tasks that
require the highest performance. The Northbridge is
usually paired with Southbridge, also known as I/O
controller hub. In systems where they are included, these
two chips manage communications between the CPU
and other parts of the motherboard, and constitute the
core logic chipset of the PC motherboard

11
EXPANSION CARDS

LAN CARD VIDEO CARD

NETWORK DEVICES
Components of a Network
A computer network comprises the following components:
 A minimum of at least 2 computers
 Cables that connect the computers to each other, although wireless communication
is becoming more common
 A network interface device on each computer (this is called a network interface

CB: JUANITO O. CASTAÑEDA JR. -CSS


card or NIC)
 A ‘Switch’ used to switch the data from one point to another. Hubs are outdated
and are little used for new installations.
 Network operating system software

NETWORK CABLE TYPES ETHERNET CABLE is the combination of RJ 45 and UTP cable
• Coaxial cable
• Unshielded
twisted pair
• Fiber optic UTP CABLE RJ – 45 ETHERNET CABLE

LAN WALL OUTLET


A standard Cat5e Wall Outlet socket which the cables are
connected to.

PATCH PANEL
A standard Cat5e Patch Panel Wall Outlet socket which is used to terminate the cables
from various points in the school bank to a central point.

WALL MOUNTED CABINET


A wall mounted cabinet used to house and protect patch
12 panel cables and connectors various points in the school bank
to a central point.
HUB AND SWITCH
A hub is a device used to connect a PC to the network. The
function of a hub is to direct information around the network,
facilitating communication between all connected devices.
24 ports Switch
However in new installations switches should be used instead of
hubs as they are more effective and provide better performance.
A switch, which is often termed a 'smart hub'.
8 ports Hub

WIRELESS ACCESS POINT (WAP)


Router – use to route data from data sender to data
receiver
It supports wireless communication and Wi-Fi access
CB: JUANITO O. CASTAÑEDA JR. -CSS

COMPUTER HARDWARE TOOLS


PROPER USE OF TOOLS
- Using tools properly helps prevent
accidents and damage to equipment and
people. This section describes and
covers the proper use of a variety of
hardware, software, and organizational
tools specific to working with computers
and peripherals.
- For every job there is the right tool.
Make sure that you are familiar with the
correct use of each tool and that the
correct tool is used for the current task.
Skilled use of tools and software makes the job less difficult and ensures that
tasks are performed properly and safely.

FLAT-HEAD SCREWDRIVER: Used to tighten or


loosen slotted screws.
13
PHILLIPS-HEAD SCREWDRIVER: Used to tighten
or loosen cross-headed screws.
TORX SCREWDRIVER: Used to tighten or loosen screws that
have a star-like depression on the top, a feature that is mainly
found on laptops.

NEEDLE-NOSE PLIERS: Used to hold small parts.

WIRE CUTTERS: Used to


strip and cut wires.

CB: JUANITO O. CASTAÑEDA JR. -CSS


TWEEZERS: Used to manipulate small parts.

FLASHLIGHT: Used to light up areas that you cannot see well.

WIRE STRIPPER: A wire stripper is


used to remove the insulation from wire so that it can be
twisted to other wires

or crimped to connectors to make a


cable.

14 CRIMPER: Used to attach connectors to wires.


PUNCH-DOWN TOOL: Used to terminate wire into
termination blocks. Some cable connectors must be connected
to cables using a punch down tool.
CB: JUANITO O. CASTAÑEDA JR. -CSS

15
ASSESSMBLING AND DISASSESSMBLING COMPUTER
Before you start to work on the computer, perform the following steps in the sequence indicated:

1. Turn off the computer and all peripherals


2. Touch an unpainted metal surface on the computer chassis, such as the metal
around the card-slot openings at the back of your computer, before touching
anything inside your computer.
3. Disconnect the computer and peripherals from their electrical outlets. Doing so
reduces the potentials for personal injury or shock. Also disconnect any
telephone or telecommunication lines from the computer.

Additional Safety Tips:


 Wear shoes with non-conductive rubber soles to help reduce the chance of being
shocked or seriously injured in an electrical accident.
 Do not work on components that are plugged into their power source.

CB: JUANITO O. CASTAÑEDA JR. -CSS


 Do not remove expansion cards from a computer when it is turned on.
 Remove all jewelry when working inside any computer related equipment.
 Be sure not to mix electronic components and water.
 When you shut down your computer, be sure to shut it down properly. Do not turn it
off with the case switch.
 Don’t eat or drinks with working.

Antistatic Wrist Strap


 Before cleaning or repairing equipment, make sure that your tools are in good
condition. Clean, repair, or replace items that are not functioning adequately.
 An example of ESD is the small shock that you receive when you walk across a carpeted
room and touch a doorknob. Although the small shock is harmless to you, the same
electrical charge passing from you to a computer can damage its components. Self-
grounding or wearing an antistatic wrist strap can prevent ESD damage to computer
components.

16
PROCEDURE ON HOW TO USE ANTI-SATIC WRIST STRAP
 Step 1. Wrap the strap around your wrist and
secure it using the snap or Velcro. The metal on the
back of the wrist strap must remain in contact with
your skin at all times.
 Step 2. Snap the connector on the end of the wire
to the wrist strap, and connect the other end either
to the equipment or to the same grounding point
that the antistatic mat is connected to. The metal
skeleton of the case is a good place to connect the
wire. When connecting the wire to equipment that
you are working on, choose an unpainted metal
surface. A painted surface does not conduct
electricity as well as unpainted metal.
When installing/removing computer hardware and other peripherals:
CB: JUANITO O. CASTAÑEDA JR. -CSS

 Wear proper apparel. Avoid acrylic or wool sweaters when working with electronic
parts. Do not wear loose fitting clothing, rings, bracelets etc.
 Unplug all computer equipment and peripherals before opening any covering cases.
 Keep your work area clean and well lit.
 Check for damaged parts.
 Do not force components into computer ports.
 Use an anti-static wrist strap or discharge yourself by touching a grounded metal
object such as a computer casing.
 Power supplies produce several levels of voltage. Read the information on the
power supply carefully and make sure that the power supply you are using is
appropriate for the application.
 Replace all cases or coverings after inspections or installations.
 Check all circuits and installations with the instructor before power is applied.
 Retain all screws during disassembly in containers such as film canisters for proper
re-assembly.
 Electronic components should never become hot. Hot components means that
there is a problem with the circuit. Disconnect any power immediately.

17
ACTIVITY TIME!!!
Title: Assembling and Disassembling system units
Performance Objective: To be able to assemble and disassemble computer hardware
properly.
Supplies: Screwdriver (Philip), Screwdriver (Standard)
Equipment: Parts/Components of computer, PPE
Steps/Procedures:
Identify and Prepare necessary materials, tools and equipment in planning & preparing
for installation.
Suggestions on how planning & preparing for installation. It ensures the parts of
computer mounted on the computer casing.

Install the computer parts in accordance with the standard operating procedures (SOP)
and observe PPE.
Check the system unit, make your own operating checklist in testing the system unit and
perform necessary adjustment.

CB: JUANITO O. CASTAÑEDA JR. -CSS


Test the system unit and submit operating checklist to your trainer.
Observe 5S

Components to be check….. YES NO


COMPUTER PARTS
Motherboard
Power Supply
Processor
RAM
HDD
FDD
CD/DVD-ROM
Processor fan
Monitor
Mouse
Keyboard
Speaker
TOOLS
Screwdriver (Standard)
Screwdriver (Flat)

18
COMPUTER SOFTWARE
Computer software is a general
term used to describe a collection
of computer programs,
procedures and documentation
that perform some tasks on a
computer system.

TYPES OF SOFTWARE
 System Software
 Application Software
 Programming Languages
CB: JUANITO O. CASTAÑEDA JR. -CSS

SYSTEM SOFTWARE: System software or operating system is the software used by the
computer to translate inputs from various sources into a language which a machine can
understand. Basically, the OS coordinates the different hardware components of a
computer.

Microsoft Windows Mac OS X Linux

APPLICATION SOFTWARE: A normal user rarely gets to see the operating system or to
work with it. But all of us are familiar with application software which we must use to
interact with a computer.

TYP–ES OF SOFTWARE APPLICATIONS


Word Processing software - Use this kind of tool to create worksheets, type letters, and
type papers, etc.
19
MS Word, WordPerfect, MS Works, AppleWork.
Desktop Publishing software - Use this software to make signs, banners, greeting cards,
illustrative worksheets, newsletters, etc.

Adobe PageMaker, MS Word, MS Publisher, AppleWorks, MS Works, Quark Express.

Spreadsheet software - Use this kind of tool to compute number-intensive problems such
as budgeting, forecasting, etc.

MS Excel, Quattro Pro, Lotus 1-2-3, MS Works

Database software - Use this software to store data such as address, membership and
other text information. A database can be used to easily sort and organize records.

MS Access, Filemaker Pro, AppleWorks, MS Works

Presentation software - Use this software to create multimedia stacks of cards/screens


that can effectively present a lesson or a sales pitch

MS PowerPoint, AppleWorks (slideshows), HyperStudio, Flash, Director, HyperCard,

CB: JUANITO O. CASTAÑEDA JR. -CSS


Internet Browsers - This software allows one to surf the Web. Often they can read email
and create Web pages too.

Netscape Navigator (or Netscape Communicator), MS Internet Explorer, AOL Browser....

Email programs - These programs send and receive email.

Netscape Messenger (part of Netscape Communicator), MS Outlook Express, MS Outlook

Graphics Programs (pixel-based) - This software allows one to touch up photographs and
create graphics from scratch.

Adobe Photoshop, Paint Shop Pro, AppleWorks, MS Works, MS Paint (comes free on
Windows PC's)

Graphics Programs (vector-based) - This software creates graphics that are similar to
illustrations or cartoon drawings.

Adobe Illustrator, Corel Draw, AppleWorks,

Communications software - This software allows two computers with modems to


communicate through audio, video, and/or chat-based means.

MS NetMeeting, AOL Instant Messenger, IRC,

20
FILE SYSTEM
FAT VS. NTFS

A file system in computing, is a method for storing and organizing computer files and the
data they contain to make it easy to find and access them.

File systems may use a data storage device such as a hard disk or CD-ROM and involve
maintaining the physical location of the files.

The FAT file system is a legacy file system which is simple and robust. It offers good
performance even in light-weight implementations, but cannot deliver the same
performance, reliability and scalability as some modern file systems.

NTFS (New Technology File System) is a proprietary file system developed by Microsoft
Corporation for its Windows NT line of operating systems, beginning with Windows NT
3.1 and Windows 2000, including Windows XP, Windows Server 2003, and all their
successors to date.
CB: JUANITO O. CASTAÑEDA JR. -CSS

NTFS supersedes the FAT file system as the preferred file system for
Microsoft's Windows operating systems.. NTFS has several technical
improvements over FAT and HPFS (High Performance File System),
such as improved support for metadata, and the use of advanced
data structures to improve performance, reliability, and disk space
utilization, plus additional extensions, such as security access
control lists (ACL) and file system journaling.

DISK FORMATTING
The process of preparing a data storage device such as a Hard Disk Drive, Solid-state
Drive, Floppy Disk or USB Flash Drive for initial use. In some cases, the formatting
operation may also create one or more new file systems.

Formatting a disk for use by an operating system and its applications typically involves
three different processes.

Low-level formatting (i.e., closest to the hardware) marks the surfaces of the disks with
markers indicating the start of a recording block (typically today called sector markers) and
other information like block CRC to be used later, in normal operations, by the disk
controller to read or write data. This is intended to be the permanent foundation of the
21
disk, and is often completed at the factory.
Partitioning divides a disk into one or more regions, writing data structures to the disk to
indicate the beginning and end of the regions. This level of formatting often includes
checking for defective tracks or defective sectors.

High-level formatting creates the file system format within a disk partition or a logical
volume. This formatting includes the data structures used by the OS to identify the logical
drive or partition's contents. This may occur during operating system installation, or when
adding a new disk. Disk and distributed file system may specify an optional boot block,
and/or various volume and directory information for the operating system.

CREATING BOOTABLE USB FLASH DRIVE


Materials Needed:
- USB Flash Drive
- Desktop Computer
- Application (Rufus/PowerISO)
- OS (Win Server & Win 7)
-

CB: JUANITO O. CASTAÑEDA JR. -CSS


MANUAL (COMMAND USER INTERFACE)

You can create a bootable USB flash drive to use to deploy Windows Server Essentials. The
first step is to prepare the USB flash drive by using DiskPart, which is a command-line
utility. For information about DiskPart, see DiskPart Command-Line Options.
22
APPLICATIONS (RUFUS or POWER ISO)
RUFUS
STEPS:
1. INSERT your USB flash drive on the
computer.
2. RUN rufus-2.0.exe
3. CLICK browse and locate your installer
location
4. CLICK start and WAIT until the bootable
process end.

BROWSE
BUTTON
CB: JUANITO O. CASTAÑEDA JR. -CSS

NOTE:
Make sure that the USB flash drive can be
formatted and doesn’t have important files…

PowerISO

STEPS:
1. INSERT your USB flash drive on the
computer.
2. RUN PowerISO.exe
3. CLICK Tools
4. SELECT Create Bootable USB Drive…
5. CLICK browse and locate your installer
location
6. CLICK start and WAIT until the bootable
process end.

BROWSE
BUTTON …
NOTE:
23 Make sure that the USB flash drive can be
formatted and doesn’t have important files…
24
CB: JUANITO O. CASTAÑEDA JR. -CSS
INSTALLING OPERATING SYSTEM (Window 7)
Materials Needed:
- Bootable USB Flash Drive with Installer
- Desktop Computer

Procedure:
CB: JUANITO O. CASTAÑEDA JR. -CSS

1. ENTER to BIOS set-up and SET your USB Flash Drive as first priority in BOOT
PRIORITY SEQUENCE.

25
Your computer is already formatted, now you can install the missing drivers needed by the
computer to fully function, install Anti-virus and MS Office..

CB: JUANITO O. CASTAÑEDA JR. -CSS

26
ACTIVITY TIME!!!
Title: Formatting Desktop Computer
Performance Objective: To be able to install windows 7 ultimate in to a desktop
computer
Supplies: Bootable USB Flash Drive with OS, MS office and Smadav
Equipment: Desktop Computer
Steps/Procedures:
1. Format 2 Computers
- Windows Server
Partition : 2 (Install OS on C:)
Computer Name : Server
Password : Admin123
Time Zone : (UTC + 8:00) Taipei
Time & Date : Present
- Windows 7
CB: JUANITO O. CASTAÑEDA JR. -CSS

Partition : 2 (Install OS on C:)


Computer Name : Client
Password : None
Time Zone : (UTC + 8:00) Taipei
Time & Date : Present
2. Install Drivers Pack
3. Install Applications
- Anti-Virus
- MS Office (word, excel, powerpoint)

ADDITIONAL ACTIVITIES:

DUAL BOOT
DISK MANAGEMENT

27
COMPUTER NETWORK
A computer network is a
group of computers that are
connected together and that
communicate with one
another for a common
purpose.
Broadly speaking, there are two types
of network configuration, peer-to-peer
networks and client/server networks.

Peer-to-peer networks are more commonly


implemented where less than ten computers

CB: JUANITO O. CASTAÑEDA JR. -CSS


are involved and where strict security is not
necessary. All computers have the same status,
hence the term 'peer', and they communicate
with each other on an equal footing.

Files, such as word processing or spreadsheet


documents, can be shared across the network and
all the computers on the network can share
devices, such as printers or scanners, which are
connected to any one computer.

Client/server networks are more suitable


for larger networks. A central computer, or
'server', acts as the storage location for
files and applications shared on the
network. Usually the server is a higher than
average performance computer. The server
also controls the network access of the
other computers which are referred to as
the 'client' computers.
Typically, teachers and students in a school
will use the client computers for their work
and only the network administrator
28 (usually a designated staff member) will
have access rights to the server.
PEER TO
PEER VS.
CLIENT/SER
PEER TO PEER CLIENT/SERVER
· Easy to set up · More difficult to set up
· Less expensive to install · More expensive to install
· Can be implemented on a wide range of · A variety of operating systems can be
operating systems supported on the client computers, but the
server needs to run an operating system that
supports networking

· More time consuming to maintain the · Less time consuming to maintain the
software being used (as computers must be software being used (as most of the
managed individually) maintenance is managed from the server)

· Very low levels of security supported or · High levels of security are supported, all of
none at all. These can be very cumbersome which are controlled from the server. Such
CB: JUANITO O. CASTAÑEDA JR. -CSS

to set up, depending on the operating system measures prevent the deletion of essential
being used system files or the changing of settings

· Ideal for networks with less than 10 · No limit to the number of computers that
computers can be supported by the network

· Does not require a server · Requires a server running a server


operating system

· Demands a moderate level of skill to · Demands that the network administrator


administer the network has a high level of IT skills with a good
working knowledge of a server operating
system

COMPONENTS OF A NETWORK
A computer network comprises the following components:
A minimum of at least 2 computers
Cables that connect the computers to each other, although wireless communication is
becoming more common
A network interface device on each computer (this is called a network interface card or
NIC)
29 A ‘Switch’ used to switch the data from one point to another. Hubs are outdated and are
little used for new installations.
Network operating system software
TYPES OF NETWORKS
Some of the different networks based on size are:
- Personal area network, or PAN
- Local area network, or LAN
- Metropolitan area network, or MAN
- Wide area network, or WAN

TYPES OF NETWORK TOPOLOGY


Network Topology is the schematic description of a network arrangement, connecting
various nodes(sender and receiver) through lines of connection.

BUS TOPOLOGY
Bus topology is a network type in
where every computer and network
device is connected to single cable.
Features of Bus Topology

CB: JUANITO O. CASTAÑEDA JR. -CSS


- It transmits data only in one
direction.
- Every device is connected to
a single cable
ADVANTAGES OF BUS DISADVANTAGES OF BUS
TOPOLOGY TOPOLOGY
- It is cost effective. - Cables fails then whole network fails.
- Cable required is least compared to - If network traffic is heavy or nodes are
other network topology. more the performance of the network
- Used in small networks. decreases.
- It is easy to understand. - Cable has a limited length.
- Easy to expand joining two cables - It is slower than the ring topology.
together.

30

RING TOPOLOGY
It is called ring topology because it forms a ring
as each computer is connected to another
computer, with the last one connected to the
first. Exactly two neighbors for each device.
ADVANTAGES OF RING DISADVANTAGES OF RING
TOPOLOGY TOPOLOGY
- Transmitting network is not affected by - Troubleshooting is difficult in ring
high traffic or by adding more nodes, as topology.
only the nodes having tokens can - Adding or deleting the computers
transmit data. disturbs the network activity.
- Cheap to install and expand - Failure of one computer disturbs the
whole network.

STAR TOPOLOGY
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
Features of Star Topology
- Every node has its own dedicated connection to the hub.
- Acts as a repeater for data flow.
- Can be used with twisted pair, Optical Fibre or coaxial cable.
CB: JUANITO O. CASTAÑEDA JR. -CSS

ADVANTAGES OF STAR DISAD


TOPOLOGY
- Fast performance with few nodes and - Cost of
low network traffic. - Expensi
- Hub can be upgraded easily. - If the h
- Easy to troubleshoot. networ
- Easy to setup and modify. nodes d
- Only that node is affected which has - Perform
failed rest of the nodes can work is it dep
smoothly.

MESH TOPOLOGY
It is a point-to-point connection to other
nodes or devices. Traffic is carried only
between two devices or nodes to which it
is connected. Mesh has n (n-2)/2 physical
channels to link hn devices.
Features of Mesh Topology
- Fully connected.
- Robust.
31 - Not flexible
TYPES OF MESH TOPOLOGY
1. Partial Mesh Topology: In this topology some of the systems are connected in the
same fashion as mesh topology but some devices are only connected to two or
three devices.
2. Full Mesh Topology: Each and every nodes or devices are connected to each other.
ADVANTAGES OF MESH DISADVANTAGES OF MESH
TOPOLOGY TOPOLOGY
- Each connection can carry its own data - Installation and configuration is
load. difficult.
- It is robust. - Cabling cost is more.
- Fault is diagnosed easily. - Bulk wiring is required.
- Provides security and privacy.

NETWORK CABLING

CB: JUANITO O. CASTAÑEDA JR. -CSS


Making connections with Cat5
Way cool!

Learning Objectives
List common cable types used in networking
Describe how UTP cables are made
Explain how UTP cables are used in Ethernet
networks
Demonstrate the ability to make a working
patch cable
Name the two wiring standards used for
wired Ethernet networks and their uses

UTP CHARACTERISTICS
Unshielded
Twisted (why?) pairs of insulated
conductors
Covered by insulating sheath
• 1000Mbps data capacity
• For runs of up to 90 meters
• Solid core cable ideal for structural installations (PVC or
32 Plenum)
• Stranded cable ideal for patch cables
• Terminated with RJ-45 connectors
MAKING CONNECTIONS - TOOLS
• Cat5e cable
• RJ45 connectors
• Cable stripper
• Scissors
• Crimping tool

MAKING CONNECTIONS – STEPS


1. Strip cable end
2. Untwist wire ends
3. Arrange wires
4. Trim wires to size
5. Attach connector
6. Check
7. Crimp
8. Test
CB: JUANITO O. CASTAÑEDA JR. -CSS

STEP 1 – STRIP CABLE END


• Strip 1 – 1½” of insulating sheath
• Avoid cutting into conductor insulation

STEP 2 – UNTWIST WIRE ENDS


• Sort wires by insulation colors

STEP 3 – ARRANGE WIRES


• TIA/EIA 568A

• • TIA/EIA 568B
33
STEP 4 – TRIM WIRES TO SIZE
• Trim all wires evenly
• Leave about ½” of wires exposed

STEP 5 – ATTACH CONNECTOR


• Maintain wire order, left-to-right, with RJ45 tab
facing downward

STEP 6 – CHECK
• Do all wires extend to end?
• Is sheath well inside connector?

CB: JUANITO O. CASTAÑEDA JR. -CSS


STEP 7 – CRIMP
• Squeeze firmly to crimp connecter onto cable end (8P)

STEP 8 – TEST
• Does the cable work?
34
CONFIGURATION OF UTP CABLE

STAIGHT-THROUGH VS. CROSSOVER


CB: JUANITO O. CASTAÑEDA JR. -CSS

35
 A straight-thru cable has identical ends.
 A crossover cable has different ends.
 A straight-thru is used as a patch cord in Ethernet connections.
 A crossover is used to connect two Ethernet devices without a hub or for
connecting two hubs.
 A crossover has one end with the Orange set of wires switched with the Green set.
 Odd numbered pins are always striped, even numbered pins are always solid
colored.
 Looking at the RJ-45 with the clip facing away from you, Brown is always on the
right, and pin 1 is on the left.
 No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be
susceptible to crosstalk.
 Do not deform, do not bend, do not stretch, do not staple, do not run parallel with
power cables, and do not run Ethernet cables near noise inducing components.

PATCH PANEL

CB: JUANITO O. CASTAÑEDA JR. -CSS


Having a patch panel in
the wiring closet, or in
the area in the data
center makes it easier
for moves, adds and
changes to be done.
There is more room on
the patch panel
(possibly ) for labels
that indicate which cube
or office a connection
goes to.

WHY DO WE USE PATCH PANEL?

A patch panel provides a convenient


place to terminate all of the cable runs
coming from different rooms into the
wiring closet. Of course, one could skip
the patch panel and just connect all RJ-
45 connectors directly into the hub, but
one may miss the following advantages:

You can label the patch panel so you


know which room the cable run goes to.
36 Putting the labels o n the cables is
tougher to read than labels on a patch
panel and also there is risk of having the
cable labels fall off. A patch panel is a step up from a punch-down block. It usually has a 110
style connectors on the back for the cable to run to the stations. Each of those connectors is
wired to an RJ-45 on the front. The RJ-45 on the front provides a spot to plug in a patch cable
that goes to the hub.

IP ADDRESS
An Internet Protocol address (IP
CB: JUANITO O. CASTAÑEDA JR. -CSS

address) is a numerical label assigned to


each device connected to a computer
network that uses the Internet Protocol
for communication. An IP address serves
two principal functions: host or network
interface identification and location
addressing.
An IP address consists of 32 bits, often
shown as 4 octets of numbers from 0-255
represented in decimal form instead of binary form. For example, the IP address:
168.212.226.204 in binary form is 10101000.11010100.11100010.11001100.

PARTS OF IP ADDRESS
An IP address consists of two parts, one identifying the network (NETWORK
ADDRESS) and one identifying the node, or host (HOST ADDRESS). The Class of
the address determines which part belongs to the network address and
which part belongs to the node address. All nodes on a given network share the
same network prefix but must have a unique host number.

Classes of IP Address

37
Static IP VS. Dynamic IP
Difference between static and dynamic IPs. When a device is assigned a static
IP address, the address does not change. Most devices use dynamic IP
addresses, which are assigned by the network when they connect and change over
time.

SUBNET MASK
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP

CB: JUANITO O. CASTAÑEDA JR. -CSS


address into network address and host address. Subnet Mask is made by setting
network bits to all "1"s and setting host bits to all "0"s.

SUBNET MASK – 11111111.11111111.11111111.00000000 =


255.255.255.0

DEFAULT GATEWAY
A default gateway serves as an access point or IP router that a networked
computer uses to send information to a computer in another network or the
internet. Default simply means that this gateway is used by default, unless an
application specifies another gateway.

38

You might also like