0% found this document useful (0 votes)
18 views16 pages

Admiminister Network Unit 5

The document discusses configuring peripheral services including naming conventions for peripherals, configuring security and access controls, and allowing applications to work with peripherals. Specific topics covered include peer-to-peer networking, user privileges, sharing resources, and IP networking basics like IP addresses, subnets, and broadcasting.

Uploaded by

m.tsedey2013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views16 pages

Admiminister Network Unit 5

The document discusses configuring peripheral services including naming conventions for peripherals, configuring security and access controls, and allowing applications to work with peripherals. Specific topics covered include peer-to-peer networking, user privileges, sharing resources, and IP networking basics like IP addresses, subnets, and broadcasting.

Uploaded by

m.tsedey2013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Unit Five:

Configure peripheral services


• In this Unit we will see about:
• Manage local area network-connected peripherals
• Meaningful name for peripherals and control queues
• Configure Security and access to use of peripherals
• Configure Workstation to allow applications
5.1 Install required software to Configure/manage LAN
5.1.1. Network Peripherals
• A network peripheral refers to equipment which typically enables computers to
communicate each others.
• A local peripherals is a peripheral that can be connected to the stand alone (a single)
computer.
• Examples of Network peripherals include: - Hub, routers, Switches, Access points,
Network interface cards and other hardware devices.
A. Repeater
• A repeater amplifies the signal it receives on one port before it transmits it on other
ports.
• Because the repeater does not check on the contents of the data it receives or
retransmits, frames that are corrupted by noise and other factors can also be repeated.
• The development of the hub replaced the repeater for all practical purposes, because
it performs the same functions, and can include additional features.
Cont…
B. Hubs: are simple network devices that direct data packets to all connected devices,
regardless of whether the data package is destined for the device.
• This makes them inefficient devices and can create a performance bottleneck on busy
networks.
• Also known as multiport repeater
• They are simply low cost.
• Most hubs are referred to as either active or passive
C. Switch: Switches are used to connect multiple devices together on the same network.
• On the surface, a switch looks much like a hub.
• Like hubs, switches are the connectivity points of an Ethernet network.
• Unlike a hub, switch forwards it only to the port that connects to the destination device.
• It does this by learning the MAC address of the devices attached to it, and then by
matching the destination MAC address in the data it receives.
Cont…
D. Routers: is used to create larger networks by joining two network segments.
• A router is a special computer which has the ability to perform such tasks as routing
and forwarding information with use of software and hardware.
• A router is used to provide connectivity across wide area network (WAN) links and
route information between two LAN segments.
• E. Gateways
• The term gateway is applied to any device, system, or software application that can
perform the function of translating data from one format to another.
• Actually, the term gateway refers more to a network role than a network device.
• It is a device or a software that connects different networks with different protocols.
• Some examples of gateways include a router that translates data from one network
protocol to another, a bridge that converts between two networking systems, and a
software application that converts between two dissimilar formats.
Cont…

• E. Modems
• A modem is a device that makes it possible for computers to
communicate over a telephone line.
• Modems perform a simple function: They translate digital signals from a
computer into analog signals that can travel across conventional phone
lines .
• It is a contraction of the terms modulator and demodulator.
F. Network Interface Cards (NICs)
• NICs are the mechanisms by which computers connect to a network.
• NICs come in all shapes and sizes, and they come in prices to suit all
budgets.
• Known as network card, network adapter, and LAN adapter, etc.
Cont….
G. Transceivers(Media Converters)
• The term transceiver does not necessarily describe a separate network device but rather an
integrated technology embedded in devices.
• I.e. transceiver = transmitter and a receiver device that receives data, converts it, and then sends it
to another location.
• E.g. RF Transceivers, Fiber-Optic Transceivers, Ethernet Transceivers, Wireless Transceivers
• RF Transceivers are used to transmit either voice or video information without the help of wiring.
• It can both transmit and receive radio waves using an antenna, for communication purposes.
• These two related functions are often combined in a single device to reduce manufacturing costs.
H. Firewall : A hardware or software system that is used to separate one computer or network from
another one.
• The most common type is used to protect a computer or an entire network from unauthorized
access from the Internet.
• Software firewall is configured on the server to allow or permit certain types of network traffic.
• Hardware firewall: can be implemented with very little configuration and protect all systems
behind the firewall from outside sources.
5.2 Using meaningful name for peripherals and control queues
• A peripheral device is typically a device that is external to a computer and
connected either wirelessly or via a cable.
• As you install and configure a printer you should keep to the network standards
of the organization, which should include naming conventions for peripherals
and other devices.
• Each organization will have its own standards, but it is important that users can
identify peripherals easily.
• Naming conventions usually reflect the function of a peripheral, and in the case
of a large office or global enterprise, the location.
Cont…
For example, the following may be used for a peripheral name of 15 characters:

Characters
1–4 5–7 8–10 11–15

Attributes City or town Type of Workplace location Uniqueness of device,


reflected peripheral usually number sequence
5.3 Configuring security and access to make use of peripherals.
5.3.1 Basics of Peer to peer Network
• In a peer-to-peer network, computers on the network are equal, with each
workstation providing access to resources and data.
• The Windows networking functions allow you to implement networking
capabilities in your application without making allowances for a particular
network provider or physical network implementation.
• This is because the Windows networking functions are network independent.
5.3.2 Configuring peripherals to access and use security
A. User Privileges
• Windows 10 allows providing security to files and folders; this feature is available
because of the NTFS (New Technology File System).
• New Technology File System or NT File System (NTFS) provides virtual space to
organize and store files.
• It is used for retrieving and storing files on the hard disk.
• It also notes file positions in folders, creation dates, and details about access and provides data
encryption.
• There are different levels of security, such as read, modify, full control etc. Full
control permissions include:
• Read
• Write
• Execute
• Delete
• Change permissions

• Where as modify includes 4 permissions that is, read, write, execute and delete.
Cont….
B. Sharing Network resources
• Sharing allows an object to be accessed from network.
• By default in windows 10, there are some hidden shares, these shares end
with a $ symbol.
• To view these default shares open computer management (right click on
my computer and choose manage) and select shared folders and then
shares.
• Most devices support access control lists.
• Example: printers, sharing data using folders, and manage devices, etc
5.4 Configuring workstation to allow applications work with peripherals.
5.4.1 Configuring workstation
• Perform appropriate steps to set up a basic workstation includes: .
• Plug in cables . • Configure and verify Internet connection
• Power on computer . • Run software and security updates
• Follow initial operating system setup wizard • Other user accounts (if applicable)
• Install security software, • Basic cable management
• Configure peripherals (if applicable) • Software version identification and
• Install and Uninstall unneeded software compatibility .
(if applicable) • Configure keyboard, mouse, display,
sound, etc.
5.4.2 IP Networking Basics
• An internet protocol (IP) is essentially a set of rules that structure and format the data we send over
internet networks.
• IP is fundamental to allowing our devices to communicate with each other.
IP Addresses
• is a series of numbers that uniquely identifies a connection of a device with a network.
• Every device connected to the internet has an IP address.
• Each device on an IP network requires 3 different pieces of information in order to correctly communicate
with other devices on the network: an IP address, a subnet mask, and a broadcast address.
• So, these numbers written as four "octets" (e.g. 198.41.12.151, 255.255.255.0, and 198.41.12.255).
• Every IP address is really made up of two pieces:
• A "network" portion, which tells routers what group of devices a packet should go to (e.g., any, a campus,
etc.) and
• A "host" portion which tells routers what specific device among that group the packet should go to.
• By examining the destination address in an IP packet that must be forwarded, and by using information that
has either been statically configured or dynamically gathered from other routers.
• Any router can determine the optimal path for forwarding packets from one group to another.
NB: The process of sending data to every device or node connected to a network is known as broadcasting.
• The broadcast address can be used to send data packets in IP networks to all participants of a local network.
Cont…
• Each group of devices on an IP internet needs to have a unique network
portion, and each device within that group also needs a unique host portion.
• In the case of the Internet, this uniqueness is made possible by indirectly
getting all network portion assignments through a central clearinghouse called
the Network Information Center or "NIC."
• The NIC assigns blocks of addresses to Internet Service Providers (ISPs), who
then assign these addresses to their customers.
• If your network is, or will be, connected to the Internet, you will need to get a
unique network address from your ISP or network administrator.
• How much of any given address is the network part and how much is the host
part is determined by the "class" of the network.
Cont…

Table 5.1: IP Address Classes


Cont…

•You can always tell what class an address is by looking at the first octet and comparing it to the
chart above.
•For instance, 198.41.12.151 is Class C because the first octet is 198
Subnet Masks
•subnet mask defines the range of IP addresses that can be used within a network or subnet.
•It also separates an IP address into two parts: network bits and host bits.
•A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to all 1s.
•The subnet mask separates the IP address into the network and host addresses.
•The masks for traditional Class A, B and C networks.

Class Subnet Mask


A 255.0.0.0

B 255.255.0.0
Table 5.2: Standard IP Subnets
C 255.255.255.0

You might also like