0% found this document useful (0 votes)
24 views11 pages

LO4 Install Peripherals To A Network

The document provides an overview of computer peripherals, categorizing them into input, output, and storage devices, and explains their connection to computers via various I/O ports. It also discusses the importance of network connections for peripherals, including LANs, WANs, and VPNs, and highlights the use of private lines for secure data transport. Additionally, it outlines methods for testing network connections and ensuring proper functionality of peripherals.

Uploaded by

misikir2.6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views11 pages

LO4 Install Peripherals To A Network

The document provides an overview of computer peripherals, categorizing them into input, output, and storage devices, and explains their connection to computers via various I/O ports. It also discusses the importance of network connections for peripherals, including LANs, WANs, and VPNs, and highlights the use of private lines for secure data transport. Additionally, it outlines methods for testing network connections and ensuring proper functionality of peripherals.

Uploaded by

misikir2.6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

WEB DEVELOPMENT AND DATABASE

ADMINISTRATION

Level-II

Unit of Administer Network Hardware


Competence:- and Peripheral
Administering Network Hardware
Module Title:-
and Peripheral
LG Code:- EIS WDDBA2 M02 LO4
TTLM Code:- EIS WDDBA2 M02 0322

LO4: Install peripherals to a network


Information Sheet – Planning location of peripherals to
1 provide service to users

Planning location of peripherals to provide service to users


 A computer peripheral is a device that is connected to a computer but is not
part of the core computer architecture.
 The core elements of a computer are the central processing unit, power supply,
motherboard and the computer case that contains those three components.
Technically speaking, everything else is considered a peripheral device.
However, this is a somewhat narrow view, since various other elements are
required for a computer to actually function, such as a hard drive and random-
access memory (or RAM).
 Most people use the term peripheral more loosely to refer to a device external to
the computer case. You connect the device to the computer to expand the
functionality of the system.
 For example, consider a printer. Once the printer is connected to a computer,
you can print out documents
Another way to look at peripheral devices is that they are dependent on the
computer system. For example, most printers can't do much on their own, and they
only become functional when connected to a computer system.
Types of Peripheral Devices
There are many different peripheral devices, but they fall into three general
categories:
1. Input devices, such as a mouse and a keyboard
2. Output devices, such as a monitor and a printer
3. Storage devices, such as a hard drive or flash drive
 Some devices fall into more than one category. Consider a CD-ROM drive; you
can use it to read data or music (input), and you can use it to write data to a CD
(output).
 Peripheral devices can be external or internal. For example, a printer is an
external device that you connect using a cable, while an optical disc drive is
typically located inside the computer case. Internal peripheral devices are also
referred to as integrated peripherals. When most people refer to peripherals, they
typically mean external ones.
 The concept of what exactly is 'peripheral' is therefore somewhat fluid. For a
desktop computer, a keyboard and a monitor are considered peripherals - you
can easily connect and disconnect them and replace them if needed.
 For a laptop computer, these components are built into the computer system
and can't be easily removed.
How can you connect peripheral devices to a computer? One connects
Computer Peripherals to Computer Systems through the I/O ports designed for
that purpose, e.g. Universal Serial Bus (USB), PCI Express, SATA, SCSI, FireWire
(IEEE 1394), Thunderbolt (interface), HDMI, etc.
Connecting peripherals to the
Information Sheet – 2
network

Connecting peripherals to the network


Peripherals are devices physically connected to a computer or network that
require ‘driver’ software to run them and to be configured to meet requirements of
operating systems and network protocols. Single user peripherals can include:
printers, scanners, speakers, external DVDs, CDs, game pads and joysticks,
graphics tablets and pens, modems, UPS (uninterrupted power supply),
removable hard disks and webcams, while printers, network attached storage
devices (NAS), and LCD projectors are often accessed over networks.
Large and small LANs, WANs and VPNs

A virtual private network (VPN) is programming that creates a safe and


encrypted connection over a less secure network, such as the public internet. A
VPN works by using the shared public infrastructure while maintaining privacy
through security procedures and tunneling protocols.
A local-area network (LAN) is a computer network that spans a relatively small area.
Most often, a LAN is confined to a single room, building or group of buildings;
however, one LAN can be connected to other LANs over any distance via telephone
lines and radio waves.

Many WANs are built for one particular organization and are private. Others, built by
Internet service providers, provide connections from an organization's LAN to the
Internet. WANs are often built using leased lines

The internet,

A global computer network providing a variety of information and communication


facilities, consisting of interconnected networks using standardized communication
protocols.
The information used to get packets to their destinations is contained in routing
tables kept by each router connected to the Internet. Routers are packet switches. A
router is usually connected between networks to route packets between them. Each
router knows about its sub-networks and which IP addresses they use.
 The Internet is a global wide area network that connects computer systems
across the world. It includes several high-bandwidth data lines that comprise the
Internet "backbone." ... When you connect to the Internet using a public Wi-Fi
signal, the Wi-Fi router is still connected to an ISP that provides Internet access.
4.2.3 The use of PSTN for dial-up modems only
 Dial-up Internet access is a form of Internet access that uses the facilities of the
public switched telephone network (PSTN) to establish a connection to an Internet
service provider (ISP) by dialing a telephone number on a conventional telephone
line.
 The user's computer or router uses an attached modem to encode and Because
telephone access is widely available,PSTN stands for Public Switched Telephone
Network, or the traditional circuit-switched telephone network. This is the system
that has been in general use since the late 1800s. ... The phones themselves are
known by several names, such as PSTN, landlines, Plain Old Telephone Service
(POTS), or fixed-line telephones.
Private lines, data and voice
Private Line
 A Private Line service is a private data connection securely connecting two or
more locations with high data speeds.
 A private line circuit is a closed network data transport service which does not
traverse the public Internet and is inherently secure with no data encryption
needed. Private Line services are available in higher bandwidth speeds such
as T1, Ethernet private line, DS3 private line.
 Private line service provides unparalleled quality of service (QoS) as it is not a
shared service and follows the same direct private line network path every
time. Private Line circuits are used by businesses to provide reliable, secure
point to point data service for applications including credit card processing, file
sharing, data backup, point to point VOIP, and video conferencing. Private
Line services can also be configured to carry voice, video, Internet, and data
services together over the same private line network connection.
Connecting peripherals to computer
Information Sheet –
using parallel, serial and other direct
3
connection

Connecting peripherals to computers using parallel, serial and other direct


connection

How can you connect peripheral devices to a computer? One connects


Computer Peripherals to Computer Systems through the I/O ports designed for that
purpose, e.g. Universal Serial Bus (USB), PCI Express, SATA, SCSI, FireWire (IEEE
1394), Thunderbolt (interface), HDMI,
Some of your peripherals will need special software, which you install on your
computer so that your operating system will be able to communicate with and send
instructions to the device.
On PCs, the parallel port uses a 25-pin connector (type DB-25) and is used to
connect printers, computers and other devices that need relatively high bandwidth.
It is often called a Getronics interface after the company that designed the original
standard for parallel communication between a computer and printer
Parallel busses, which are used by SCSI (small computer system interface)
and ATA (advanced technology attachment) ports, have 16 or more parallel
wires that are used to send bits simultaneously. They are much faster than
serial busses for identical clock speeds.

 A peripheral device connects to a computer system to add functionality.


Examples are a mouse, keyboard, monitor, printer and scanner.
Information Sheet –
Testing peripherals
4

Testing Peripherals

How do you test a network?

Testing Your Computer Network


1. Check the physical connections. Check that the Link light — the little red or
green light next to the RJ-45 port — is lit on every computer. ...
2. Verify that you can log on. ...
3. Check the network configuration. ...
4. This command will spit out numerous lines of information. ...
5. Verify that the computers can ping each other.

You might also like