Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Competency-Based Learning Materials Computer System Servicing NC II Everything About Computer Networks Prepared by BTLED-ICT Students: On March 4, 2025 Ayap, Jericho R. Sarmiento, Erica C. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain DEFINITION OF COMPUTER NETWORK What Is a Computer Network? A computer network is a system that connects many independent computers to share information (data) and resources. The integration of computers and other different devices allows users to communicate more easily. A computer network is a collection of two or more computer systems that are linked together. A network connection can be established using either cable or wireless media. Hardware and software are used to connect computers and tools in any network. Uses of Computer Networks - Communicating using email, video, instant messaging, etc. -Sharing devices such as printers, scanners, etc. -Sharing files. -Sharing software and operating programs on remote systems. -Allowing network users to easily access and maintain information. Types of Computer Networks Computer 1. Personal Area Network (PAN) PAN is the most basic type of computer network. It is a type of network designed to connect devices within a short range, typically around one person. It allows your personal devices, like smartphones, tablets, laptops, and wearables, to communicate and share data with each other. PAN offers a network range of 1 to 100 meters from person to device providing communication. Its transmission speed is very high with very easy maintenance and very low cost. This uses Bluetooth, IrDA, and Zigbee as technology. Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Types of PAN Wireless Personal Area Networks: Wireless Personal Area Networks are created by simply utilising wireless technologies such as WiFi and Bluetooth. It is a low-range network. Wired Personal Area Network: A wired personal area network is constructed using a USB. Advantages of PAN -PAN is relatively flexible and provides high efficiency for short network ranges. -It needs easy setup and relatively low cost. -It does not require frequent installations and maintenance - It is easy and portable. -Needs fewer technical skills to use. Disadvantages of PAN -Low network coverage area/range. -Limited to relatively low data rates. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain -Devices are not compatible with each other. -Inbuilt WPAN devices are a little bit costly. Applications of PAN -Home and Offices -Organizations and the Business sector -Medical and Hospital -School and College Education -Military and Defense 2. Local Area Network (LAN) LAN is the most frequently used network. A LAN is a computer network that connects computers through a common communication path, contained within a limited area, that is, locally. A LAN encompasses two or more computers connected over a server. The two important technologies involved in this network are Ethernet and Wi-fi. It ranges up to 2km & transmission speed is very high with easy maintenance and low cost. Examples of LAN are networking in a home, school, library, laboratory, college, office, etc. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Advantages of a LAN -Privacy: LAN is a private network, thus no outside regulatory body controls it, giving it a privacy. -High Speed: LAN offers a much higher speed(around 100 mbps) and data transfer rate comparatively to WAN. -Supports different transmission mediums: LAN support a variety of communications transmission medium such as an Ethernet cable (thin cable, thick cable, and twisted pair), fiber and wireless transmission. Inexpensive and Simple: A LAN usually has low cost, installation, expansion and maintenance and LAN installation is relatively easy to use, good scalability. Disadvantages of LAN - The initial setup costs of installing Local Area Networks is high because there is special software required to make a server. - Communication devices like an ethernet cable, switches, hubs, routers, cables are costly. - LAN administrator can see and check personal data files as well as Internet history of each and every LAN user. Hence, the privacy of the users are violated - LANs are restricted in size and cover only a limited area - Since all the data is stored in a single server computer, if it can be accessed by an unauthorized user, can cause a serious data security threat. 3. Campus Area Network (CAN) CAN is bigger than a LAN but smaller than a MAN. This is a type of computer network that is usually used in places like a school or colleges. This network covers a limited geographical area that is, it spreads across several buildings within the campus. CAN mainly use Ethernet technology with a range from 1km to 5km. Its transmission speed is very high with a moderate maintenance cost and Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain moderate cost. Examples of CAN are networks that cover schools, colleges, buildings, etc. Advantages of CAN - Speed: Communication within a CAN takes place over Local Area Network (LAN) so data transfer rate between systems is little bit fast than Internet. - Security: Network administrators of campus take care of network by continuous monitoring, tracking and limiting access. To protect network from unauthorized access firewall is placed between network and internet. - Cost effective: With a little effort and maintenance, network works well by providing fast data transfer rate with multi-departmental network access. It can be enabled wirelessly, where wiring and cabling costs can be managed. So to work with in a campus using CAN is cost-effective in view of performance 4. Metropolitan Area Network (MAN) A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network that connects computers over a geographical distance through a shared communication path over a city, town, or metropolitan area. This network mainly uses FDDI, CDDI, and ATM as the technology with a range from 5km to Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 50km. Its transmission speed is average. It is difficult to maintain and it comes with a high cost. Examples of MAN are networking in towns, cities, a single large city, a large area within multiple buildings, etc. Advantages of MAN - MAN offers high-speed connectivity in which the speed ranges from 10-100 Mbps. - The security level in MAN is high and strict as compared to WAN. - It support to transmit data in both directions concurrently because of dual bus architecture. - MAN can serve multiple users at a time with the same high-speed internet to all the users. - MAN allows for centralized management and control of the network, making it easier to monitor and manage network resources and security. Disadvantages of MAN - The architecture of MAN is quite complicated hence, it is hard to design and maintain. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain - This network is highly expensive because it required the high cost to set up fiber optics. - It provides less fault tolerance. - The Data transfer rate in MAN is low when compare to LANs. 5. Wide Area Network (WAN) WAN is a type of computer network that connects computers over a large geographical distance through a shared communication path. It is not restrained to a single location but extends over many locations. WAN can also be defined as a group of local area networks that communicate with each other with a range above 50km. Here we use Leased-Line & Dial-up technology. Its transmission speed is very low and it comes with very high maintenance and very high cost. The most common example of WAN is the Internet. Advantages of WAN - It covers large geographical area which enhances the reach of organisation to transmit data quickly and cheaply. - The data can be stored in centralised manner because of remote access to data provided by WAN. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain - The travel charges that are needed to cover the geographical area of work can be minimised. - WAN enables a user or organisation to connect with the world very easily and allows to exchange data and do business at global level. Disadvantages of WAN - Traffic congestion in Wide Area Network is very high. - The fault tolerance ability of WAN is very less. - Noise and error are present in large amount due to multiple connection point. - The data transfer rate is slow in comparison to LAN because of large distances and high number of connected system within the network. Other Types of Computer Networks 1. Wireless Local Area Network (WLAN) 2. Storage Area Network (SAN) 3. System-Area Network (SAN) 4. Passive Optical Local Area Network (POLAN) 5. Enterprise Private Network (EPN) 6. Virtual Private Network (VPN) 7. Home Area Network (HAN) 1. Wireless Local Area Network (WLAN) WLAN is a type of computer network that acts as a local area network but makes use of wireless network technology like Wi-Fi. This network doesn’t allow devices to communicate over physical cables like in LAN but allows devices to communicate wirelessly. The most common example of WLAN is Wi-Fi. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain There are several computer networks available; more information is provided below. 2. Storage Area Network (SAN) SAN is a type of computer network that is high-speed and connects groups of storage devices to several servers. This network does not depend on LAN or WAN. Instead, a SAN moves the storage resources from the network to its high-powered network. A SAN provides access to block-level data storage. Examples of SAN are a network of disks accessed by a network of servers. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 3. Passive Optical Local Area Network (POLAN) A POLAN is a type of computer network that is an alternative to a LAN. POLAN uses optical splitters to split an optical signal from a single strand of singlemode optical fiber to multiple signals to distribute users and devices. In short, POLAN is a point to multipoint LAN architecture. 4. Enterprise Private Network (EPN) EPN is a type of computer network mostly used by businesses that want a secure connection over various locations to share computer resources. 5. Virtual Private Network (VPN) A VPN is a type of computer network that extends a private network across the internet and lets the user send and receive data as if they were connected to a private network even though they are not. Through a virtual point-to-point connection users can access a private network remotely. VPN protects you from malicious sources by operating as a medium that gives you a protected network connection. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 6. Home Area Network (HAN) Many of the houses might have more than a computer. To interconnect those computers and with other peripheral devices, a network should be established similar to the local area network (LAN) within that home. Such a type of network that allows a user to interconnect multiple computers and other digital devices within the home is referred to as Home Area Network (HAN). HAN encourages sharing of resources, files, and programs within the network. It supports both wired and wireless communication. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Internetwork An internet network is defined as two or more computer network LANs, WANs, or computer network segments that are connected by devices and configured with a local addressing system. The method is known as internetworking. There are two types of Internetwork. Intranet: An internal network within an organization that enables employees to share data, collaborate, and access resources. Intranets are not accessible to the public and use private IP addresses. Extranet: Extranets extend the intranet to authorized external users, such as business partners or clients. They provide controlled access to specific resources while maintaining security. Advantages of Computer Network - Central Storage of Data: Files are stored on a central storage database which helps to easily access and available to everyone. - Connectivity: A single connection can be routed to connect multiple computing devices. - Sharing of Files: Files and data can be easily shared among multiple devices which helps in easily communicating among the organization. - Security through Authorization: Computer Networking provides additional security and protection of information in the system. Disadvantages of Computer Network Virus and Malware: A virus is a program that can infect other programs by modifying them. Viruses and Malware can corrupt the whole network. High Cost of Setup: The initial setup of Computer Networking is expensive because it consists of a lot of wires and cables along with the device. loss of Information: In case of a System Failure, might lead to some loss of data. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Management of Network: Management of a Network is somehow complex for a person, it requires training for its proper use. REFERENCE: https://www.geeksforgeeks.org/types-of-computer-networks/ Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain DEFINITION OF TOPOLOGY What is Network Topology? Network topology is the way devices are connected in a network. It defines how these components are connected and how data transfer between the network. Understanding the different types of network topologies can help in choosing the right design for a specific network. There are two major categories of Network Topology i.e. Physical Network topology and Logical Network Topology. Physical Network Topology refers to the actual structure of the physical medium for the transmission of data. Logical network Topology refers to the transmission of data between devices present in the network irrespective of the way devices are connected. The structure of the network is important for the proper functioning of the network. one must choose the most suitable topology as per their requirement. Types of Network Topology Below mentioned are the types of Network Topology 1. Point to Point Topology 2. Mesh Topology 3. Star Topology 4.Bus Topology 5. Ring Topology 6.Tree Topology 7. Hybrid Topology 1. Point to Point Topology is a type of topology that works on the functionality of the sender and receiver. It is the simplest communication between two nodes, in which one is the sender and the other one is the receiver. Point-to-Point provides high bandwidth. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 2. Mesh Topology In a mesh topology, every device is connected to another device via a particular channel. Every device is connected to another via dedicated channels. These channels are known as links. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain - Suppose, the N number of devices are connected with each other in a mesh topology, the total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices connected to each other, hence the total number of ports required by each device is 4. The total number of ports required = N * (N-1). - Suppose, N number of devices are connected with each other in a mesh topology, then the total number of dedicated links required to connect them is N C 2 i.e. N(N1)/2. In Figure 1, there are 5 devices connected to each other, hence the total number of links required is 5*4/2 = 10. Advantages of Mesh Topology - Communication is very fast between the nodes. - Mesh Topology is robust. - The fault is diagnosed easily. - Data is reliable because data is transferred among the devices through dedicated channels or links. - Provides security and privacy. Disadvantages of Mesh Topology - Installation and configuration are difficult. - The cost of cables is high as bulk wiring is required, hence suitable for less number of devices. - The cost of maintenance is high. A common example of mesh topology is the internet backbone, where various internet service providers are connected to each other via dedicated channels. This topology is also used in military communication systems and aircraft navigation systems. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 3. Star Topology all the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc. Advantages of Star Topology - If N devices are connected to each other in a star topology, then the number of cables required to connect them is N. So, it is easy to set up. - Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports required is N. - It is Robust. - If one link fails only that link will affect and not other than that. - Easy to fault identification and fault isolation. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain - Star topology is cost-effective as it uses inexpensive coaxial cable. Disadvantages of Star Topology - If the concentrator (hub) on which the whole topology relies fails, the whole system will crash down. - The cost of installation is high. - Performance is based on the single concentrator i.e. hub. A common example of star topology is a local area network (LAN) in an office where all computers are connected to a central hub. This topology is also used in wireless networks where all devices are connected to a wireless access point. 4. Bus Topology is a network type in which every computer and network device is connected to a single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Advantages of Bus Topology - If N devices are connected to each other in a bus topology, then the number of cables required to connect them is 1, known as backbone cable, and N drop lines are required. - Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 Mbps. - The cost of the cable is less compared to other topologies, but it is used to build small networks. - Bus topology is familiar technology as installation and troubleshooting techniques are well known. - CSMA is the most common method for this type of topology. Disadvantages of Bus Topology - A bus topology is quite simpler, but still, it requires a lot of cabling. If the common cable fails, then the whole system will crash down. - If the network traffic is heavy, it increases collisions in the network. - To avoid this, various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc. - Adding new devices to the network would slow down networks. Security is very low. A common example of bus topology is the Ethernet LAN, where all devices are connected to a single coaxial cable or twisted pair cable. This topology is also used in cable television networks. 5. Ring Topology it forms a ring connecting devices with exactly two neighboring devices. A number of repeaters are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Hence to prevent data loss repeaters are used in the network. The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the data. The most common access method of ring topology is token passing. Token passing: It is a network access method in which a token is passed from one node to another node. Token: It is a frame that circulates around the network. Operations of Ring Topology - One station is known as a monitor station which takes all the responsibility for performing the operations. - To transmit the data, the station has to hold the token. - After the transmission is done, the token is to be released for other stations to use. - When no station is transmitting the data, then the token will circulate in the ring. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain - There are two types of token release techniques: Early token release releases the token just after transmitting the data and Delayed token release releases the token after the acknowledgment is received from the receiver. Advantages of Ring Topology - The data transmission is high-speed. - The possibility of collision is minimum in this type of topology. - Cheap to install and expand. - It is less costly than a star topology. Disadvantages of Ring Topology - The failure of a single node in the network can cause the entire network to fail. - Troubleshooting is difficult in this topology. - The addition of stations in between or the removal of stations can disturb the whole topology. - Less secure. 6. Tree Topology is the variation of the Star topology. This topology has a hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain In tree topology, the various secondary hubs are connected to the central hub which contains the repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is a multi-point connection and a nonrobust topology because if the backbone fails the topology crashes. Advantages of Tree Topology - It allows more devices to be attached to a single central hub thus it decreases the distance that is traveled by the signal to come to the devices. - It allows the network to get isolated and also prioritize from different computers. - We can add new devices to the existing network. - Error detection and error correction are very easy in a tree topology. Disadvantages of Tree Topology - If the central hub gets fails the entire system fails. - The cost is high because of the cabling. -A common example of a tree topology is the hierarchy in a large organization. At the top of the tree is the CEO, who is connected to the different departments or divisions (child nodes) of the company. Each department has its own hierarchy, with managers overseeing different teams (grandchild nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected to their respective managers and departments. If new devices are added, it becomes difficult to reconfigure. 7. Hybrid Topology is the combination of all the various types of topologies we have studied above. Hybrid Topology is used when the nodes are free to take any form. It means these can Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain be individuals such as Ring or Star topology or can be a combination of various types of topologies seen above. Each individual topology uses the protocol that has been discussed earlier. The above figure shows the structure of the Hybrid topology. As seen it contains a combination of all different types of networks. Advantages of Hybrid Topology - This topology is very flexible . - The size of the network can be easily expanded by adding new devices. Disadvantages of Hybrid Topology - It is challenging to design the architecture of the Hybrid Network. - Hubs used in this topology are very expensive. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain - The infrastructure cost is very high as a hybrid network requires a lot of cabling and network devices . A common example of a hybrid topology is a university campus network. The network may have a backbone of a star topology, with each building connected to the backbone through a switch or router. Within each building, there may be a bus or ring topology connecting the different rooms and offices. The wireless access points also create a mesh topology for wireless devices. This hybrid topology allows for efficient communication between different buildings while providing flexibility and redundancy within each building. REFERENCE: https://www.geeksforgeeks.org/types-of-network-topology/ Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain TECHNICAL TERMS Host - any computer whether mainframe, server, or even PC that acts as an information source on a network. Local Area Network- the smallest of the three network types, consist of PCs connected together within a limited area, such as within the same building, floor or department. Metropolitan Area Network - are network that spans no more than 50 miles. It is design to connect LANs spanning a town or city. Modem -Is a device that allows a given computer to share data or otherwise a device which let computers exchange information Modular Hubs - are popular in networks because they are easily expanded and always have management option. It is purchased as chassis, or card cage, with multiple card slots, each of which accepts a communication card, or module. Multimedia - is the combination of different types of communication media (sound, print, video, and so on) Network - is a communications system connecting two or more computers. Network Server - is a powerful computer whose sole purpose is to serve network clients. Network Switch - It helps determine how data moves over large networks. Peers - mean any computer sharing the same protocol layer with another computer. Protocol - refers to the specific standards governing the sending and receiving data. Repeater - a device that strengthen signals and allow them to stay clear over longer distances. RJ 45 - is the connector plugged into the NIC ports on computers and often connecting the main networking hardware together. Router - a device that forwards data packets between Local or Wide Area Network groups. Server - is a part of a network. It is a special computer that users on the network can assess to carry out a particular job. Software - programs and data that a computer uses. Stackable Hubs - work just like standalone hubs, except that several of them can be "stacked" (connected) together, usually by short lengths of cable. Standalone Hubs - are single products with a number of ports. It is usually include some method of linking them to other standalone hubs for network expansion. UTP - (Unshielded Twisted Pair) least expensive and most popular network media. Wide Area Network - used to distribute information thousands of miles among thousands of users. Workstation - is any network computer that connects to and request resources from a network. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Network Cable Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Examples of network media: 1. Unshielded Twisted Pair (UTP) Cable 2. Shielded Twisted Pair (STP) Cable 3. Coaxial Cable 4. Fiber Optic Cable 5. Wireless LANS 1. Unshielded Twisted Pair (UTP) cable The least expensive and most popular network media. The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style. 2. Shielded Twisted Pair (STP) Cable Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain solution. Shielded cables can also help to extend the maximum distance of the cables. 3. Coaxial Cable Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers. This cable is commonly used by television industries. 4. Fiber Optic Cable Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. 5. Wireless LANS More and more networks are operating without cables, in the wireless mode. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations, servers, or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Wireless networks are great for allowing laptop computers, portable devices, or remote computers to connect to the LAN. CABLE INSTILLATION GUIDES The two most common network cable: 1. Straight through cable – Connected from PC to witch/hub. 2. Crossover cable – Connected from Pc to PC (limited to two computers only) What is RJ45? RJ stands for Registered Jacks. These are used in telephone and data jack wiring registered with FCC, RJ-11 is a 6-position, 4-conductor jack used in telephone wiring, and RJ-45 is a 8-position, 8-conductor jack used in 10BaseT and 100BaseT Ethernet wiring. Wiring Standards for RJ45 1. T568A 2. T568B Standard T-568A vs T-568B T-568B T-568A Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain RJ45 WIRING GUIDE Straight Through Cable Crossover Cable Where: Ge-Green Stripe ; G-GREEN : Os-Orange Stripe ; O-Orange ; Bs-Blue Stripe ; B-Blue ; Brs-Brown Stripe ; Br-Brown Network Configuration Network configuration is the process of setting a network's controls, flow and operation to support the network communication of an organization and/or network owner. This broad term incorporates multiple configuration and setup processes on network hardware, software and other supporting devices and components. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Below is an example of basic network configuration Patch Panel A patch panel, patch bay, patch field or jack field is a device or unit featuring a number of jacks, usually of the same or similar type, for the use of connecting and routing circuits for monitoring, interconnecting, and testing circuits in a convenient, flexible manner. Patch panels are commonly used in computer networking, recording studios, radio and television. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Patch panel cable management Neat Patch is the ultimate in patch panel rack cable management system. A storage solution unlike anything the network cabling world has ever known. Neat Patch panel rack is compliant with telecom/datacom industry standards, and supports proper bend radius requirements. Router Configuration A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. How to change the WIFI name and WIFI password The cause of the change WIFI name and wireless password is to protect the wireless network. This article will guide you how to change the wifi name and wireless password. Part 1: Login the homepage of the router Part 2: Change the SSID and wireless password Part 3: Reboot the router Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Get the IP address of your router. IP: 192.168.0.1 Next step, Open the browser then type the IP Adress of YOUR router. In this case, the IP Adress of our router is 192.168.0.1 Type the Password as admin in the bars to login the setting page Click on Advanced on the home page to login the advanced setting page Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Click on Wireless, then click on Wireless Basic Settings and making sure that wireless is Enable. Making sure the SSID Broadcast was checked, otherwise the wireless signal will not be found in your wireless bar of your computer. Also you can change the Primary SSID as you want. Click on Wireless, then click on Wireless Security and choose the Security mode as WPA-PSK, and then open the drop down menu of the WPA Algorithms option then select the type as AES and set a Security Key as you want. At last, let the other options as defaulted and hit on the Save button to save the settings. Note: Security Key should be at least 8 characters. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Testing Your Computer Network You've set up all your network switches, plugged in all the cables, and configured all your computers. One task remains before you can declare your network finished: You must verify that the network works as expected. Here are a few simple tests you can conduct to make sure your network is functional. Check the physical connections. Check that the Link light the little red or green light next to the RJ-45 port - is lit on every computer. You must check this light both on the computer itself and on the switch or router the computer is plugged into. If this light is not on, you have a connection problem most likely a bad cable. Verify that you can log on. When you're sure the physical connections are good, you should attempt to log on to each of your network computers using a valid domain user account. Check the network configuration. Click the Start button, type cmd and press Enter. Then, enter the command <ipconfig /all> and press Enter. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain This command will spit out numerous lines of information. The line you're looking for should resemble this: Verify that the computers can ping each other. Another basic test you should perform is to use the ping command from a command prompt to make sure that the computers on your network can contact one another. Ping another computer (LAN only) Click the Start button, type cmd and press Enter. Then, enter the command PING 192 168.8.100 and press Enter. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Ping a website (WAN-Internet) Click the Start button, type cmd and press Enter. Then, enter the command PING and then the web address or domain name of the website you want to ping, in this case Google will be the website I want to ping, so I will enter the web address WWW.GOOGLE.COM. What is an IP Address? An Internet Protocal address (IP address) in layman's terms is basically the address given to your computer when it's connected to a network. Technically speaking, an IP address is a 32-bit number that signifies the address of both the sender and receiver of packets on a network. Class Adress Range Supports Class A 1.0.0.1 to 126.255.255.254 Large networks with many devices. Class B 128.1.0.1 to 191.255.255.254 Medium-sized networks. Class C 192.0.1.1 to 233.255.254.254 Smaller networks (fewer than 256) Class D 244.0.0.0 to 239.255.255.255 Reserved for multicast groups. Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or Research and Development Purposes. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain The two main types of IP Address 1. Static IP Address As the name speaks, the static IP addresses are those types of IP address that never change once they are assigned to a device on a network. No doubt this type of addressing is cost effective but could have a high security risk. Static IP addresses are mostly used by web, email and gaming servers who don't care much about hiding their locations. 2. Dynamic IP Address On the other hand, a Dynamic IP address changes each time the device logs in to a network. This kind of IP address is very tough to trace and are thus used by companies and business firms. You must be thinking as to who or what allocates this Dynamic IP address every time the device logs in. Well, these IP address are assigned using DHCP (Dynamic Host Configuration Protocol). Talking about DHCP in detail is beyond the scope of this article and we will take it up in a future post. How to set a Static IP Address Normally, your computer's IP Address has a dynamic IP Address. To find out your computer's Dynamic IP simply click the Start button, type cmd and press Enter. Then, enter the command IPCONFIG and press Enter. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain To permanently set it as your Static IP 1. Right click on Wifi icon (Laptop) or LAN icon (PC) at the notification bar and select Open Network and Sharing Center 2. Select Change adapter settings 3. Right click Local Area Connection and Select Property 4. _Select Internet Protocol Version 4 and click on properties Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 5._Select Use the following IP address and enter the IP addresses from the command prompt (IPCONFIG). Note: If you change the default gateway and preferred DNS server, you will lose your internet connection. System Configuration is the way a system is set up. It is the collection of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows Operating System. Many software products require that the computer has a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory capacity. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain When you install a new device or program, you sometimes need to configure it, which means that you need to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. IP Addressing An IP address is a number that is used to identify a device on the network. Each device on a network must have a unique IP address to communicate with other network devices. Network devices are those that move data across the network, including hubs, switches, and routers. On a LAN, each host (device that sends or receives information on the network) and network device must have an IP address within the same network to be able to communicate with each other. A person's name and fingerprints usually do not change. They provide a label or address for the person's physical aspect-the body. A person's mailing address, on the other hand, relates to where the person lives or picks up mail. This address can change. On a host, the Media Access Control (MAC) address is assigned to the host Network Interface Card (NIC) and is known as the physical address. The physical address remains the same regardless of where the host is placed on the network in the same way that fingerprints remain with someone regardless of where he or she goes. An IP address consists of a series of 32 binary bits (1s and Os). It is very difficult for humans to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called octets. An IP address, even in this grouped format, is hard for humans to read, write, and remember. Therefore, each octet is presented as its decimal value, separated by a decimal point or period. This format is called dotteddecimal notation. When a host is configured with an IP address, it is entered as a dotted-decimal number, such as 192.168.1.5. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network, and the second part identifies a host on that network. Both parts are required in an IP address. For example, if a host has an IP address of 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57, identifies the host. This is called hierarchical addressing, because the network portion indicates the network on which each unique host address is located. Routers only need to know how to reach each network, not the location of each individual host. Subnet Mask The subnet mask indicates the network portion of an IP address. Like the IP address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same subnet mask. Table 1 shows default subnet masks for usable IP addresses that are mapped to the first three classes of IP addresses: 255.0.0.0: Class A, which indicates that the first octet of the IP address is the network portion 255.255.0.0: Class B, which indicates that the first two octets of the IP address are the network portion 255.255.255.0: Class C, which indicates that the first three octets of the IP address are the network portion Table 1. Default Subnet Masks for Usable IP Addresses Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Class D addresses are used for multicast groups. There is no need to allocate octet or bits to separate network and host addresses. Class E addresses are reserved for research use only. IpConfig Ipconfig is a command used to find out the IP address of a certain network you are connected to How to use the ipconfig command? 1. Click on Start Button, then type cmd (command prompt) on the search box. 2. A black screen will appear as shown in the figure below. Figure 1: Command Prompt Window 3. Type ipconfig and press enter. The figure below shows the IP configuration window using the ipconfig command. The information from this window will be useful because it shows the IP address, subnet mask and default gateway of a network you are connected to. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Figure 2: IP Configuration in CMD Window Assigning a static IP Address In a home network with several computers and devices, it is ideal to assign each of them a specific address. This is for the purpose of avoiding problems when you do troubleshooting which requires figuring out the IP address of each of them. It is also a means to prevent address conflicts between the devices. You can also manage them with ease if you have assigned their own addresses. Here are the procedures in assigning an IP Address on a windows base computer system: 1. Open the Control Panel's Network Connections icon. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 2. Open the icon representing your computer's network connection. 3. Click the Properties button in the Status dialog box. 4. From the list of items, choose Internet Protocol (TCP/IP). Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog box appears. 6. Type the IP address for your computer. Enter the appropriate IP Address in the IP address section. 7. Type a subnet mask. The value used on a local network is commonly 255.255.255.0, but it can be different, such as 255.255.255.127. 8. Type the default gateway address. The default gateway is the router, so type the router's address. Figure 54 shows an example of assigning an IP Address, Subnet mask and default gateway. 9. Type the address for the preferred DNS server. The address should be obtained from your Internet Service Protocol. It is used to help your computer find web pages and other addresses on the internet. 10. Type the address for the alternate DNS server. The alternate Domain Name System (DNS) server's IP address is something that your ISP provides. 11. Click OK to confirm the settings. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain 12. Close all other open dialog boxes and windows. Assigning a Dynamic IP Address If more than a few computers comprise the LAN, manually configuring IP addresses for every host on the network can be time-consuming and prone to errors. In this case, using a Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP addresses and greatly simplify the addressing process. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Dynamic Host Configuration Protocol (DHCP) is a software utility used to dynamically assign IP addresses to network devices. This dynamic process eliminates the need to manually assign IP addresses. A DHCP server can be set up and the hosts can be configured to automatically obtain an IP address. When a computer is set to obtain an IP address automatically, the other entire IP addressing configuration boxes are dimmed or disabled. The server maintains a list of IP addresses to assign, and it manages the process so that every device on the network receives a unique IP address. Each address is held for a predetermined amount of time. When the time expires, the DHCP server can use this address for any computer that joins the network. These are the IP address information that a DHCP server can assign to hosts: IP address Subnet mask Default gateway Optional values, such as a Domain Name System (DNS) server address Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain The DHCP server receives a request from a host. The server then selects IP address information from a set of predefined addresses that are stored in a database. After the IP address information is selected, the DHCP server offers these values to the requesting host on the network. If the host accepts the offer, the DHCP server leases the IP address for a specific period of time. Using a DHCP server simplifies the administration of a network because the software keeps track of IP addresses. Automatically configuring TCP/IP also reduces the possibility of assigning duplicate or invalid IP addresses. Before a computer on the network can take advantage of the DHCP server services, the computer must be able to identify the server on the local network. You can configure a computer to accept an IP address from a DHCP server by clicking the Obtain an IP address automatically option in the NIC configuration window. If your computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a private IP address. If your computer is assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, it can communicate with only other computers in the same range. An example of when these private addresses would be useful is in a classroom lab where you want to prevent access outside to your network. This operating system feature is called Automatic Private IP Addressing (APIPA). APIPA continually requests an IP address from a DHCP server for your computer. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Figure 1: Assigning a Dynamic IP Address Ping The ping is a Command Prompt command used to test the ability of the source computer to reach a specified destination computer. The ping command is usually used as a simple way to verify that a computer can communicate over the network with another computer or network device. The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response. How many of those responses are returned, and how long it takes for them to return, are the two major pieces of information that the ping command provides. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Table 2: Ping Command Syntax Syntax Description -t Using this option will ping the target until you force it to stop using Ctrl-C. -a - This ping command option will resolve, if possible, the hostname of an IP address target. -n count This option sets the number of ICMP Echo Request messages to send. If you execute the ping command without this option, four requests will be sent. Use this option to set the size, in bytes, of the echo request packet from 32 to -1 size 65,527. The ping command will send a 32 byte echo request if you do not use the -1 option. Use this ping command option to prevent ICMP Echo Requests from being fragmented by routers between you and the target. The -f option is most -f often used to troubleshoot Path Maximum Transmission Unit (PMTU) issues. -i TTL This option sets the Time to Live (TTL) value, the maximum of which is 255. This option allows you to set a Type of Service (TOS) value. Beginning in -v TOS Windows 7, this option no longer functions but still exists for compatibility reasons. Use this ping command option to specify the number of hops between the computer and the target computer or device that you would like to be -r count recorded and displayed. The maximum value for count is 9 so use the tracert command instead. If you are interested in viewing all hops between two devices. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Use this option to report the time, in Internet Timestamp format, that each -s count echo request is received and echo reply is sent. The maximum value for count is 4 which means that only the first four hops can be time stamped. Specifying a timeout value when executing the ping command adjusts the -w timeout amount of time, in milliseconds, that ping waits for each reply. If you do not use the w option, the default timeout value is used which is 4000, or 4 seconds. -R -S srcaddr -4 This option tells the ping command to trace the round trip path. Use this option to specify the source address. This forces the ping command to use IPv4 only but is only necessary if target is a hostname and not an IP address. -6 This forces the ping command to use IPv6 only but as with the -4 option, is only necessary when pinging a hostname. target This is the destination you wish to ping, which is either an IP address or a hostname. /? Use the help switch with the ping command to show detailed help about the command's several options. Using the ping Command Ping is one of your most important tools in troubleshooting Internet problems. It shows you whether the Domain Name Server is working, whether the computer you are trying to talk to is reachable, and how long it takes to get there. It does this at a very low level – only the most basic Internet functions have to be up and running. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Here are the steps: 1. Click on Start Button, then type cmd (command prompt) on the search box. 2. A black screen will appear as shown in the figure below. 3. Type ping followed by the IP address you desire to verify. The figure below shows the screen of the ping command and its output. Figure 2: Step 3 Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Figure 3: Pinging This output shows several things: Decoding names to network addresses - A domain name server (DNS) resolves machine names to numeric addresses. A single machine can have many names, all of which resolve to the same Internet address. In the example just given, the name www.google.com resolves to the Internet address 122.2.152.23 Round-trip response time - The parts of the replies that say things like time 105ms show you how long it took from the time the client machine sent out the ping message until a reply came back (1 ms is 1 millisecond, or one thousandth of a second). The variability in the times you see reflects that networks do not always respond identically. Differing amounts of traffic on the communication lines or differing loads on the server are common causes. You will see very different response times depending on the access equipment you use. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain Routing hop count - The part of the replies that says TTL=50 tells you about the route the message took from one point to another. The acronym TTL stands for Time to Live, which is a measure of how many rerouting from one point to another the packet has to go through before IP declares it undeliverable. The number following TTL (called the hop count) is a number that usually starts at 255 and counts down by one every time the message gets rerouted through an intermediary computer. Southern Luzon State University COLLEGE OF TEACHER EDUCATION Lucban, Quezon, Philippines Website: https://www.slsu.edu.ph/ Facebook: https://www.facebook.com/slsuMain REFERENCES: Talamisan, E. M. (2019). CSS NC II Core 2 Set-Up Computer Networks Updated. SCRIBD. https://www.scribd.com/document/433087882/CSS-NC-II-Core-2- Set-up-Computer-Networks-Updated Geeksforgeeks. (2024). Types of Computer Networks. https://www.geeksforgeeks.org/types-of-computer-networks/ Jabie M. (2020). TVL-ICT-CSS. Quarter 1 – Module 3-4: Setup Network Configuration. Department of Education Schools Division of Negros Oriental Region VII. https://www.scribd.com/document/535851700/TVL-ICT-CSS-12Q1-Week-3-4
0
You can add this document to your study collection(s)
Sign in Available only to authorized usersYou can add this document to your saved list
Sign in Available only to authorized users(For complaints, use another form )