Admiminister Network Unit 5
Admiminister Network Unit 5
• E. Modems
• A modem is a device that makes it possible for computers to
communicate over a telephone line.
• Modems perform a simple function: They translate digital signals from a
computer into analog signals that can travel across conventional phone
lines .
• It is a contraction of the terms modulator and demodulator.
F. Network Interface Cards (NICs)
• NICs are the mechanisms by which computers connect to a network.
• NICs come in all shapes and sizes, and they come in prices to suit all
budgets.
• Known as network card, network adapter, and LAN adapter, etc.
Cont….
G. Transceivers(Media Converters)
• The term transceiver does not necessarily describe a separate network device but rather an
integrated technology embedded in devices.
• I.e. transceiver = transmitter and a receiver device that receives data, converts it, and then sends it
to another location.
• E.g. RF Transceivers, Fiber-Optic Transceivers, Ethernet Transceivers, Wireless Transceivers
• RF Transceivers are used to transmit either voice or video information without the help of wiring.
• It can both transmit and receive radio waves using an antenna, for communication purposes.
• These two related functions are often combined in a single device to reduce manufacturing costs.
H. Firewall : A hardware or software system that is used to separate one computer or network from
another one.
• The most common type is used to protect a computer or an entire network from unauthorized
access from the Internet.
• Software firewall is configured on the server to allow or permit certain types of network traffic.
• Hardware firewall: can be implemented with very little configuration and protect all systems
behind the firewall from outside sources.
5.2 Using meaningful name for peripherals and control queues
• A peripheral device is typically a device that is external to a computer and
connected either wirelessly or via a cable.
• As you install and configure a printer you should keep to the network standards
of the organization, which should include naming conventions for peripherals
and other devices.
• Each organization will have its own standards, but it is important that users can
identify peripherals easily.
• Naming conventions usually reflect the function of a peripheral, and in the case
of a large office or global enterprise, the location.
Cont…
For example, the following may be used for a peripheral name of 15 characters:
Characters
1–4 5–7 8–10 11–15
• Where as modify includes 4 permissions that is, read, write, execute and delete.
Cont….
B. Sharing Network resources
• Sharing allows an object to be accessed from network.
• By default in windows 10, there are some hidden shares, these shares end
with a $ symbol.
• To view these default shares open computer management (right click on
my computer and choose manage) and select shared folders and then
shares.
• Most devices support access control lists.
• Example: printers, sharing data using folders, and manage devices, etc
5.4 Configuring workstation to allow applications work with peripherals.
5.4.1 Configuring workstation
• Perform appropriate steps to set up a basic workstation includes: .
• Plug in cables . • Configure and verify Internet connection
• Power on computer . • Run software and security updates
• Follow initial operating system setup wizard • Other user accounts (if applicable)
• Install security software, • Basic cable management
• Configure peripherals (if applicable) • Software version identification and
• Install and Uninstall unneeded software compatibility .
(if applicable) • Configure keyboard, mouse, display,
sound, etc.
5.4.2 IP Networking Basics
• An internet protocol (IP) is essentially a set of rules that structure and format the data we send over
internet networks.
• IP is fundamental to allowing our devices to communicate with each other.
IP Addresses
• is a series of numbers that uniquely identifies a connection of a device with a network.
• Every device connected to the internet has an IP address.
• Each device on an IP network requires 3 different pieces of information in order to correctly communicate
with other devices on the network: an IP address, a subnet mask, and a broadcast address.
• So, these numbers written as four "octets" (e.g. 198.41.12.151, 255.255.255.0, and 198.41.12.255).
• Every IP address is really made up of two pieces:
• A "network" portion, which tells routers what group of devices a packet should go to (e.g., any, a campus,
etc.) and
• A "host" portion which tells routers what specific device among that group the packet should go to.
• By examining the destination address in an IP packet that must be forwarded, and by using information that
has either been statically configured or dynamically gathered from other routers.
• Any router can determine the optimal path for forwarding packets from one group to another.
NB: The process of sending data to every device or node connected to a network is known as broadcasting.
• The broadcast address can be used to send data packets in IP networks to all participants of a local network.
Cont…
• Each group of devices on an IP internet needs to have a unique network
portion, and each device within that group also needs a unique host portion.
• In the case of the Internet, this uniqueness is made possible by indirectly
getting all network portion assignments through a central clearinghouse called
the Network Information Center or "NIC."
• The NIC assigns blocks of addresses to Internet Service Providers (ISPs), who
then assign these addresses to their customers.
• If your network is, or will be, connected to the Internet, you will need to get a
unique network address from your ISP or network administrator.
• How much of any given address is the network part and how much is the host
part is determined by the "class" of the network.
Cont…
•You can always tell what class an address is by looking at the first octet and comparing it to the
chart above.
•For instance, 198.41.12.151 is Class C because the first octet is 198
Subnet Masks
•subnet mask defines the range of IP addresses that can be used within a network or subnet.
•It also separates an IP address into two parts: network bits and host bits.
•A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to all 1s.
•The subnet mask separates the IP address into the network and host addresses.
•The masks for traditional Class A, B and C networks.
B 255.255.0.0
Table 5.2: Standard IP Subnets
C 255.255.255.0