Professional Documents
Culture Documents
LEARNING OUTCOMES:
1 Determine and plan cable routes in accordance with network design and
actual installation site.
2 Identify network materials necessary to complete the work and obtained in
accordance with established procedures and checked against systems
requirements
3 Obtain tools, equipment and testing devices needed to carry out the
installation work in accordance with established procedures and checked for
correct operation and safety
4 Use appropriate personal protective equipment and OHS policies and
procedures are followed
CONTENTS:
Computer networking concepts
o Open system interconnection (OSI) model
Physical layer
Data link layer
Network layer
Transport layer
o Network components
Computer system
Media
- Wired or wireless
Protocol
Interface / Network devices
- Hubs, Switches, Routers and Bridges
o Network topology
o Types of networks
Size/geographical
- Local area network (LAN)
- Wide area network (WAN)
Role
- Peer-to-peer
- Client Server
Network cable installation
o Types of cable
Unshielded Twisted Pair/Shielded Twisted Pair (UTP/STP)
Coaxial
Fiber optic
o Copper cable splicing standards
Straight-through
Cross-over
o Fiber optic cable installation
o Copper cable standards
CONDITIONS:
The students/trainees must be provided with the following:
PC or workstation
Access to network cable installation board
Ladder
PPEs (i.e. goggles, gloves, safety shoes, working clothes, etc.)
ASSESSMENT METHODS:
Written exam
Practical exam/demonstration
Observation in workplace
CONTENTS:
Network design
o Data packet principles
o IP address configuration
IPV4
IPV6
o Subnet configuration
o Procedures in configuring Network interface card (NIC) for network
communication
Protocol
IP address
Subnet mask
Gateway
Network configuration
o Peer-to-peer cross-over connection
o Peer-to-peer using switch
Network connectivity testing
o Wizard–based testing
o Command line interface testing
CONDITIONS:
The students/trainees must be provided with the following:
2 units desktop computers
Laptop
Terminated network cables
ASSESSMENT METHODS:
Written exam
Practical exam/demonstration
Observation in workplace
ASSESSMENT CRITERIA:
1 Configure client Device systems settings in accordance with manufacturers’
instructions and end-user preferences
2 Configure local area network (LAN) port in accordance with manufacturers’
instructions and network design
3 Configure wide area network (WAN) port in accordance with manufacturers’
instructions and network design
4 Configure wireless settings in accordance manufacturers’ instructions,
network design and end-user preferences
5 Configure security/Firewall/Advance settings in accordance with
manufacturers’ instructions and end-user preferences
CONTENTS:
Router/Wi-Fi/ wireless access point/repeater configuration
Network interface card (NIC) settings
Device systems settings configuration
Local area network (LAN) port configuration
Wide area network (WAN) port configuration
Wireless settings configuration
Security/Firewall/Advance settings and configuration
Cloud computing
CONDITIONS:
The students/trainees must be provided with the following:
2 units desktop computers
Laptop
Terminated network cables
Switch
ASSESSMENT METHODS:
Written exam
Practical exam/demonstration
Observation in workplace
ASSESSMENT CRITERIA:
1 Undertake final inspections to ensure that the configuration done on the
computer networks conforms with the manufacturer’s instruction/manual
2 Check computer networks to ensure safe operation.
3 Prepare reports /completed according to company requirements.
CONTENTS:
Network connectivity testing
Documentation procedures
Philippine Electrical Code relevant to data connection
Principles of 5S and 3Rs
CONDITIONS:
The students/trainees must be provided with the following:
ASSESSMENT METHODS:
Written exam
Practical exam/demonstration
Observation in workplace
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Determine and plan cable routes are in accordance with network design and
actual installation site.
2. Identified and obtained network materials necessary to complete the work
are in accordance with established procedures and checked against systems
requirements.
3. Carry out the installation work tools, equipment and testing devices needed
to obtained in accordance with established procedures and checked for
correct operation and safety.
4. Used appropriate personal protective equipment and OHS policies and
procedures are followed.
5. Performed copper cable splicing based on Electronic Industries Alliance/
Telecommunications Industry Association (EIA/TIA) standards.
6. Installed network cables and cable raceway in accordance with established
procedures and installation requirements.
7. Performed installation work and checked to ensure no unnecessary damage
has occurred and complies with requirements.
8. Follow 5S and 3Rs according to environmental policies.
OSI (Open Systems Interconnection) is reference model for how applications can
communicate over a network. A reference model is a conceptual framework for
understanding relationships. The purpose of the OSI reference model is to guide vendors
and developers so the digital communication products and software programs they
create will inter operate, and to facilitate clear comparisons among communications tools.
Most vendors involved in telecommunications make an attempt to describe their
products and services in relation to the OSI model. And although useful for guiding
discussion and evaluation, OSI is rarely actually implemented, as few network products
or standard tools keep all related functions together in well-defined layers as related to
the model. The TCP/IP protocols, which define the Internet, do not map cleanly to the
OSI model.
OSI layers
The main concept of OSI is that the process of communication between two end
points in a telecommunication network can be divided into seven distinct groups of
related functions, or layers. Each communicating user or program is at a computer that
can provide those seven layers of function. So in a given message between users, there
will be a flow of data down through the layers in the source computer, across the network
and then up through the layers in the receiving computer. The seven layers of function
are provided by a combination of applications, operating systems, network card device
drivers and networking hardware that enable a system to put a signal on a network cable
or out over Wi-Fi or other wireless protocol).
Layer 2: The data-link layer. This layer sets up links across the physical network,
putting packets into network frames. This layer has two sub-layers, the Logical Link
Control Layer and the Media Access Control Layer. Ethernet is the main data link layer
in use.
Layer 3: The network layer. This layer handles the addressing and routing of the
data (sending it in the right direction to the right destination on outgoing transmissions
and receiving incoming transmissions at the packet level). IP is the network layer for the
Internet.
Layer 4: The transport layer. This layer manages packetization of data, then the
delivery of the packets, including checking for errors in the data once it arrives. On the
Internet, TCP and UDP provide these services for most applications as well.
Layer 5: The session layer. This layer sets up, coordinates and terminates
conversations. Services include authentication and reconnection after an interruption. On
the Internet, Transmission Control Protocol (TCP) andUser Datagram Protocol (UDP)
provide these services for most applications.
Layer 6: The presentation layer. This layer is usually part of an operating system
(OS) and converts incoming and outgoing data from one presentation format to another
(for example, from clear text to encrypted text at one end and back to clear text at the
other).
Computer network components include the major parts that are needed to
install a network both at the office and home level. Before delving into the
installation process, you should be familiar with each part so that you could choose
and buy the right component that fits with your network system.
In this article we will discuss about the main computer network components
required to install simple computer network, often called LAN (local area
network).
Computer network is a group of two or more computers that connect with each
other to share a resource. Sharing of devices and resources is the purpose of
computer network. You can share printers, fax machines, scanners, network
connection, local drives, copiers and other resources.
Computer network requires the following devices (some of them are optional):-
There are two types of network cards: wired and wireless. The wired NIC
uses cables and connectors as a medium to transfer data, whereas in the wireless
card, the connection is made using antenna that employs radio wave technology.
All modern laptop computers incorporated wireless NIC in addition to the wired
adapter.
2. Hub
3. Switch
Like Hub, switch don’t broadcast the received message to entire network,
rather before sending it checks to which system or port should the message be sent.
In other words switch connects the source and destination directly which increases
the speed of the network. Both switch and hub have common features: Multiple RJ-
45 ports, power supply and connection lights.
There are a number of solid transmission Media types, which are listed below. -
Coaxial cable
Fiber-optic cable
5. Router
When we talk about computer network components, the other device that
used to connect a LAN with an internet connection is called Router. When you
have two distinct networks (LANs) or want to share a single internet connection to
multiple computers, we use a Router.
In most cases, recent routers also include a switch which in other words can
be used as a switch. You don’t need to buy both switch and router, particularly if
you are installing small business and home networks.
There are two types of Router: wired and wireless. The choice depends on
your physical office/home setting, speed and cost.
A modem is not necessary for LAN, but required for internet connection
such as dial-up and DSL.
There are some types of modems, which differs in speed and transmission
rate. Standard PC modem or Dial-up modems (56Kb data transmission speed),
Cellular modem (used in a laptop that enables to connect while on the go), cable
modem (500 times faster than standard modem) and DSL Modems are the most
popular.
Network Protocol
A network topology is the pattern in which nodes (i.e., computers, printers, routers or
other devices) are connected to a local area network (LAN) or other network via links
(e.g., twisted pair copper wire cable or optical fiber cable). There are four principal
topologies used in LANs: bus, ring, star and mesh.
Standard Topologies
Bus
Alternatively referred to as a line topology, a bus topology is a network setup
where each computer and network device are connected to a single cable or backbone.
Bus networks are useful in small networks (like those setup in a small offices) and have
the advantage of using less cable. Their main disadvantage is that if any segment of the
network fails, all transmissions do as well. Below is a visual example of a simple
computer setup on a network using the bus topology
The bus topology is often referred to as a "linear bus" because the computers are
connected in a straight line. This is the simplest and most common method of networking
computers. Figure 1.15 shows a typical bus topology. It consists of a single cable called
a trunk (also called a backbone or segment) that connects all of the computers in the
network in a single line.
Sending the Signal Network data in the form of electronic signals is sent to all the
computers on the network. Only the computer whose address matches the address
encoded in the original signal accepts the information. All other computers reject the data.
Figure 1.16 shows a message being sent from 0020af151d8b to 02608c133456. Only one
computer at a time can send messages.
Figure 1.16 Data is sent to all computers, but only the destination computer accepts it
Signal Bounce because the data, or electronic signal, is sent to the entire network, it
travels from one end of the cable to the other. If the signal is allowed to continue
uninterrupted, it will keep bouncing back and forth along the cable and prevent other
computers from sending signals. Therefore, the signal must be stopped after it has had a
chance to reach the proper destination address.
Both ends of each cable segment on the network must be plugged into something. For
example, a cable end can be plugged into a computer or a connector to extend the cable
length. Any open cable ends not plugged into something must be terminated to prevent
signal bounce. Figure 1.17 shows a properly terminated bus topology network.
In the star topology, cable segments from each computer are connected to a
centralized component called a hub. Figure 1.21 shows four computers and a hub
connected in a star topology. Signals are transmitted from the sending computer through
the hub to all computers on the network. This topology originated in the early days of
computing when computers were connected to a centralized mainframe computer.
The star network offers the advantage of centralized resources and management.
However, because each computer is connected to a central point, this topology requires
a great deal of cable in a large network installation. Also, if the central point fails, the
entire network goes down.
If one computer—or the cable that connects it to the hub—fails on a star network,
only the failed computer will not be able to send or receive network data. The rest of the
network continues to function normally.
The ring topology connects computers on a single circle of cable. Unlike the bus
topology, there are no terminated ends. The signals travel around the loop in one
direction and pass through each computer, which can act as a repeater to boost the signal
and send it on to the next computer. Figure 1.22 shows a typical ring topology with one
server and four workstations. The failure of one computer can have an impact on the
entire network.
One method of transmitting data around a ring is called token passing. (A token is
a special series of bits that travels around a token-ring network. Each network has only
one token.) The token is passed from computer to computer until it gets to a computer
that has data to send. Figure 1.23 shows a token ring topology with the token. The sending
computer modifies the token, puts an electronic address on the data, and sends it around
the ring.
Figure 1.23 A computer grabs the token and passes it around the ring
The data passes by each computer until it finds the one with an address that
matches the address on the data.
It might seem that token passing would take a long time, but the token actually
travels at roughly the speed of light. A token can circle a ring 200 meters (656 feet) in
diameter about 477,376 times per second.
Mesh
Figure 1.24 In a mesh topology, all computers are connected to each other by separate cables
Types of networks
Size/geographical
Computer networks are classified into one of two groups, depending on their size
and function. A local area network (LAN) is the basic building block of any computer
network. A LAN can range from simple (two computers connected by a cable) to complex
(hundreds of connected computers and peripherals throughout a major corporation). (See
Figure 1.7.) The distinguishing feature of a LAN is that it is confined to a limited
geographic area.
Wide area network (WAN), on the other hand, has no geographical limit (see
Figure 1.8). It can connect computers and other devices on opposite sides of the world. A
WAN is made up of a number of interconnected LANs. Perhaps the ultimate WAN is the
Internet.
Role
In general, all networks have certain components, functions, and features in common,
shown in Figure 1.9. These include:
Even with these similarities, networks are divided into two broad categories,
illustrated in Figure 1.10:
Peer-to-peer networks
Server-based networks
Figure 1.11 Peer-to-peer network computers act as both clients and servers
Size
Peer-to-peer networks are also called workgroups. The term "workgroup" implies
a small group of people. There are typically 10 or fewer computers in a peer-to-peer
network.
Cost
Operating Systems
In a peer-to-peer network, the networking software does not require the same
standard of performance and level of security as the networking software designed for
dedicated servers. Dedicated servers function only as servers and not as clients or
workstations. They are discussed in more detail later in this lesson.
Where these factors apply, a peer-to-peer network will probably be a better choice than
a server-based network.
Administration
Network administration tasks include:
Sharing Resources
All users can share any of their resources in any manner they choose. These
resources include data in shared directories, printers, fax cards, and so on.
Server Requirements
Use a large percentage of its resources to support the user at the computer, known
as the local user.
Use additional resources such as hard-disk space and memory, to support the
user's accessing resources on the network, known as the remote user.
Server-Based Networks
Sharing Resources
Security
Backup
Backups can be scheduled several times a day or once a week depending on the
importance and value of the data. Server backups can be scheduled to occur
automatically, according to a predetermined schedule, even if the servers are located on
different parts of the network.
Through the use of backup methods known as redundancy systems, the data on
any server can be duplicated and kept online. Even if harm comes to the primary data
storage area, a backup copy of the data can be used to restore the data.
Number of Users
Hardware Considerations
Client computer hardware can be limited to the needs of the user because clients
do not need the additional random access memory (RAM) and disk storage needed to
provide server services. A typical client computer often has no more than a Pentium
processor and 32 megabytes (MB) of RAM.
The vast majority of networks today are connected by some sort of wiring or
cabling that acts as a network transmission medium that carries signals between
computers. Many cable types are available to meet the varying needs and sizes of
networks, from small to large.
Cable types can be confusing. Belden, a leading cable manufacturer, publishes a
catalog that lists more than 2200 types of cabling. Fortunately, only three major groups of
cabling connect the majority of networks:
Coaxial cable
Twisted-pair (unshielded and shielded) cable
Fiber-optic cable
At one time, coaxial cable was the most widely used network cabling. There were
a couple of reasons for coaxial cable's wide usage: it was relatively inexpensive, and it
was light, flexible, and easy to work with.
In its simplest form, coaxial cable consists of a core of copper wire surrounded by
insulation, a braided metal shielding, and an outer cover. Figure 2.1 shows the various
components that make up a coaxial cable.
The term shielding refers to the woven or stranded metal mesh (or other material)
that surrounds some types of cabling. Shielding protects transmitted data by absorbing
stray electronic signals, called noise, so that they do not get onto the cable and distort the
data. Cable that contains one layer of foil insulation and one layer of braided metal
shielding is referred to as dual shielded. For environments that are subject to higher
interference, quad shielding is available. Quad shielding consists of two layers of foil
insulation and two layers of braided metal shielding.
The core of a coaxial cable carries the electronic signals that make up the data. This
wire core can be either solid or stranded. If the core is solid, it is usually copper.
Surrounding the core is a dielectric insulating layer that separates it from the wire
mesh. The braided wire mesh acts as a ground and protects the core from electrical noise
and crosstalk. (Crosstalk is signal overflow from an adjacent wire. For a more detailed
discussion of crosstalk, see the section Unshielded Twisted-Pair (UTP) Cable, later in this
lesson.)
Twisted-Pair Cable
In its simplest form, twisted-pair cable consists of two insulated strands of copper
wire twisted around each other. Figure 2.12 shows the two types of twisted-pair
cable: unshielded twisted-pair (UTP) and shielded twisted-pair (STP) cable.
UTP, using the 10BaseT specification, is the most popular type of twisted-pair
cable and is fast becoming the most popular LAN cabling. The maximum cable length
segment is 100 meters, about 328 feet.
Traditional UTP cable, as shown in Figure 2.13, consists of two insulated copper
wires. UTP specifications govern how many twists are permitted per foot of cable; the
number of twists allowed depends on the purpose to which the cable will be put. In North
America, UTP cable is the most commonly used cable for existing telephone systems and
is already installed in many office buildings.
Category 1 This refers to traditional UTP telephone cable that can carry voice but
not data transmissions. Most telephone cable prior to 1983 was Category 1 cable.
Category 2 This category certifies UTP cable for data transmissions up to 4
megabits per second (Mbps). It consists of four twisted pairs of copper wire.
Category 3 This category certifies UTP cable for data transmissions up to 16
Mbps. It consists of four twisted pairs of copper wire with three twists per foot.
Category 4 This category certifies UTP cable for data transmissions up to 20
Mbps. It consists of four twisted pairs of copper wire.
Category 5 This category certifies UTP cable for data transmissions up to 100
Mbps. It consists of four twisted pairs of copper wire.
One potential problem with all types of cabling is crosstalk. Figure 2.14 shows
crosstalk between two UTP cables. (As discussed earlier in this lesson, crosstalk is defined
as signals from one line interfering with signals from another line.) UTP is particularly
susceptible to crosstalk, but the greater the number of twists per foot of cable, the more
effective the protection against crosstalk.
Figure 2.14 Crosstalk occurs when signals from one line bleed into another line
STP cable uses a woven copper-braid jacket that is more protective and of a higher
quality than the jacket used by UTP. Figure 2.15 shows a two-twisted-pair STP cable. STP
also uses a foil wrap around each of the wire pairs. This gives STP excellent shielding to
protect the transmitted data from outside interference, which in turn allows it to support
higher transmission rates over longer distances than UTP.
While we have defined twisted-pair cabling by the number of twists and its ability
to transmit data, additional components are necessary to complete an installation. As it
is with telephone cabling, a twisted-pair cable network requires connectors and other
hardware to ensure proper installation.
The RJ-45 connector is slightly larger and will not fit into the RJ-11 telephone
jack. The RJ-45 connector houses eight cable connections, while the RJ-11 houses only
four.
In fiber-optic cable, optical fibers carry digital data signals in the form of
modulated pulses of light. This is a relatively safe way to send data because, unlike
copper-based cables that carry data in the form of electronic signals, no electrical
impulses are carried over the fiber-optic cable. This means that Fiber-optic cable cannot
be tapped, and its data cannot be stolen.
An optical fiber consists of an extremely thin cylinder of glass, called the core,
surrounded by a concentric layer of glass, known as the cladding. The fibers are
sometimes made of plastic. Plastic is easier to install, but cannot carry the light pulses for
as long a distance as glass.
Because each glass strand passes signals in only one direction, a cable includes two
strands in separate jackets. One strand transmits and one receives. A reinforcing layer of
plastic surrounds each glass strand, and Kevlar fibers provide strength. See Figure 2.18
for an illustration of fiber-optic cable. The Kevlar fibers in the fiber-optic connector are
placed between the two cables. Just as their counterparts (twisted-pair and coaxial) are,
fiber-optic cables are encased in a plastic coating for protection.
Straight-through, Crossover, and Rollover wiring of cables and the intended use for each
type of cable. These terms are referring to the way the cables are wired (which pin on one
end is connected to which pin on the other end). Below we will try shed some light on
cable. In other words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 ect.
Straight-Through wired cables are most commonly used to connect a host to client. When
we talk about cat5e patch cables, the Straight-Through wired cat5e patch cable is used to
connect computers, printers and other network client devices to the router switch or hub
Connector A Connector B
Pin 1 Pin 1
Pin 2 Pin 2
Pin 3 Pin 3
Pin 4 Pin 4
Pin 5 Pin 5
Pin 6 Pin 6
Pin 7 Pin 7
Pin 8 Pin 8
Straight-Through cables with the exception that TX and RX lines are crossed (they are at
opposite positions on either end of the cable. Using the 568-B standard as an example
below you will see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2 on
connector A goes to Pin 6 on connector B ect. Crossover cables are most commonly used
to a router. Note: While in the past when connecting two host devices directly a crossover
cable was required. Now days most devices have auto sensing technology that detects
Pin 2 Pin 6
Pin 3 Pin 1
Pin 4 Pin 7
Pin 5 Pin 8
Pin 6 Pin 2
Pin 7 Pin 4
Pin 8 Pin 5
assignments on each end of the cable or in other words it is "rolled over". Pin 1 of
connector A would be connected to Pin 8 of connector B. Pin 2 of connector A would be
Yost cables are most commonly used to connect to a devices console port to make
programming changes to the device. Unlike crossover and straight-wired cables, rollover
cables are not intended to carry data but instead create an interface with the device.
Pin 2 Pin 7
Pin 3 Pin 6
Pin 4 Pin 5
Pin 5 Pin 4
Pin 6 Pin 3
Pin 7 Pin 2
Pin 8 Pin 1
RJ45 Connectors - Ensure your RJ45 connectors are designed for the type of cable
you are using (solid/stranded), as they have different types of teeth for piercing between
multiple strands or around a solid single strand. Note: if you ask in an electrical trades
store for RJ45 connectors, you may be asked whether you want "solid", "stranded" or
"flat". The "flat" choice relates to the old flat "silver satin" cables used in 10Base-T, and
should not be used in new Ethernet deployments.
A. Crimping RJ 45
1. Cross Over
The steps below are general Ethernet Category 5 (commonly known as Cat 5) cable
construction guidelines. For our example, we will be making a Category 5e patch cable,
but the same general method will work for making any category of network cables.
Steps
568B - Put the wires in the following order, from left to right:
1 white orange 4 blue 7 white brown
2 orange 5 white blue 8 brown
3 white green 6 green
10. Repeat all of the above steps with the other end of the cable. The way you wire the
other end (568A or 568B) will depend on whether you're making a straight-
through, rollover, or cross-over cable.
2. Straight through
Do the same procedure as in Cross Over just make sure to use the color of
figure1 on both end.
568B - Put the wires in the following order, from left to right:
1 white orange
2 orange
3 white green
4 blue
5 white blue
6 green
7 white brown
8 brown
patch panel
Patch panels are network ports held together within telecommunication closets that
connect incoming and outgoing local area network (LAN) lines or other
communication, electronic and electrical systems. ... Patch panels permit circuits to be
arranged and rearranged by plugging and unplugging respectivepatch cords.
"Patch panels form the main link to collect data, and route it to where it needs
to go," explains Douglas Peck, vice president of operations for Allen Tel Products
(www.allentel.com). Patch panels are critical, and if a malfunction occurs, it can cause
the whole system to fail.
1. Acquire the patch panel or patch panels. The patch panels purchased should
have 110 style insulation displacement connectors. Patch panels with various
numbers of terminations are available. Acquire enough patch connectors on the
patch panels to accommodate all of the incoming Ethernet cables. Patch panels
are available through electronic supply outlets and some electrical parts stores.
2. Make a cable map. The map should tell the system administrator which
incoming cables are terminated to which patch panel connectors. A map of the
patch panel connections is necessary, and labeling the patch panels is helpful
in diagnosing system problems and handling future changes and upgrades.
3. Remove the cable jacket from each incoming Ethernet cable. Use wire strippers
to cut off the cable jacket about 1.5 inches (38 mm) from the end of each cable.
Remove and discard the jacket. Wire strippers are available at electrical parts
stores and hardware stores.
4. Remove internal tubing for the cables. If the incoming Ethernet cables are Cat6
type, they will have an internal plastic jacket under the outer cable jacket that
must be carefully removed and discarded using wire cutters. Wire cutters are
available at electrical parts stores and hardware stores. If the incoming cable is
Cat5e type this step will not be necessary.
5. Spread out the cable wires. There will be 4 twisted pairs of wires inside the
Ethernet cable. Untwist all of the wires and spread them out. Note that the
wires are color coded with 4 being solid colors, and 4 with a white stripe around
the color.
6. Set the wires into the patch panel connector. Place all 8 wires into the 110 style
connector of the patch panel in the patch panel outlet that has been chosen to
receive that cable. There will be a color code label on the patch panel that
indicates which wire is to be placed into which connector pin. Make sure that
each wire spans both sets of teeth of the insulation displacement connector.
7. Make the connections. Use a patch panel push tool to firmly press down on
each wire so that it is grasped by both sets of teeth of the insulation
displacement connector. Patch panel push tools are available at electronic
supply outlets and electrical supply stores. If the patch panel push tool has a
cutting edge, make sure that the cutting edge is placed over the cut ends of the
Cable testing
Networks are everywhere, and even as home Wi-Fi routers proliferate, there
is still a tremendous need for wired networks. Wired networks are more robust,
faster, and often less expensive than wireless ones. Best of all, wired networks never
have to worry about interference because the neighbors are on the same channel. The
one issue with wired networks is that when they stop working, it can be difficult to
troubleshoot. This is where a network cable tester comes in. This simple device is
vital for checking cable continuity to ensure that the signal is getting through, and
eliminating cable connectivity issues when troubleshooting network problems.
Network Cables
Most network cable testers can test two basic types of cable: coaxial
and twisted pair.. Coaxial cable, the kind used for cable TV, uses a single shielded
conductor that runs down the center of the cable. Twisted pair relies on multiple
pairs of wire wrapped together. Both kinds of twisted pair use similar connectors,
but the one for an is larger than that for telephone. Coaxial cable normally uses the
same kind of barrel connectors found in cable TV installations
This system provides a quick and easy reference for any technician to see
exactly what is going on with any given network cable. The last two LEDs on the
main unit are for testing ground and coaxial cable. The remote has a corresponding
LED for ground testing, but not for coaxial cable.
II. Acronym
Direction: Give the meaning of each letter on the given acronym.
34. __________________________________ OSI
35. __________________________________ TCP
36. __________________________________ LAN
37. __________________________________ NIC
38. __________________________________ FTP
39. __________________________________ WAN
40. __________________________________ UTP
41. __________________________________ STP
42. __________________________________ RJ-45
49. __________________________________
50. __________________________________
51. __________________________________
52. __________________________________
53. __________________________________
54. __________________________________
55. __________________________________
56. __________________________________
57. __________________________________
58. __________________________________
59. __________________________________
60. __________________________________
61. __________________________________
49. Bus
50. Star
51. Ring
52. Mesh
53. LAN
54. WAN
Performance Objective: Provided with required information you should be able to:
Supplies/Materials:
1. UTP cable
2. RJ 45
Equipment:
1. Splicer
2. Crimper
3. LAN tester
-
Steps/Procedures:
Performance Objective: Provided with required information you should be able to:
Supplies/Materials:
UTP cable
RJ 45
Equipment:
Splicer
Crimper
LAN tester
-
Steps/Procedures:
Performance Objective: Provided with required information you should be able to:
Supplies/Materials:
UTP cable
RJ 45
Equipment:
Splicer
Crimper
LAN tester
-
Steps/Procedures:
CRITERIA YES NO
I Can …
1. Identify the different type of networks.
2. Identify the different type of cable.
3. Create Class A Ethernet cable.
4. Create Class B Ethernet cable.
5. Create Cross over Ethernet cable.
6. Test Ethernet cable.
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
Checked network connectivity of each terminal in accordance with
network design.
Diagnose and remedy any fault or problem in the network system
in line with the standard operating procedures.
Configure network interface card (NIC) settings in accordance
with network design.
carry out communication checking between terminals in
accordance with OS network configuration guides
Responded to unplanned events or conditions in accordance with
established procedures
INTRODUCTION
Network design refers to the planning of the implementation of a computer
network infrastructure. Network design is generally performed by network designers,
engineers, IT administrators and other related staff. It is done before the
implementation of a network infrastructure.
Network design
Network design involves evaluating, understanding and scoping the network
to be implemented. The whole network design is usually represented as a network
diagram that serves as the blueprint for implementing the network physically.
Typically, network design includes the following:
IP address configuration
Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version
6. Each version defines an IP address differently. Because of its prevalence, the generic
term IP address typically still refers to the addresses defined by IPv4. The gap in
version sequence between IPv4 and IPv6 resulted from the assignment of number 5 to
the experimental Internet Stream Protocol in 1979, which however was never referred
to as IPv5.
IP by itself can be compared to something like the postal system. It allows you
to address a package and drop it in the system, but there's no direct link between you
and the recipient. TCP/IP, on the other hand, establishes a connection between
two hosts so that they can send messages back and forth for a period of time.
IPV4
IPv4 (Internet Protocol Version 4) is the fourth revision of the Internet Protocol
(IP) used to identify devices on a network through an addressing system. The Internet
Protocol is designed for use in interconnected systems of packet-switched computer
communication networks. IPv4 is the most widely deployed Internet protocol used to
connect devices to the Internet. IPv4 uses a 32-bit address scheme allowing for a total
of 2^32 addresses (just over 4 billion addresses). With the growth of the Internet it is
expected that the number of unused IPv4 addresses will eventually run out because
every device -- including computers, smartphones and game consoles -- that connects
to the Internet requires an address.
The rapid exhaustion of IPv4 address space prompted the Internet Engineering
Task Force (IETF) to explore new technologies to expand the addressing capability in
the Internet. The permanent solution was deemed to be a redesign of the Internet
Protocol itself. This new generation of the Internet Protocol was eventually
named Internet Protocol Version 6 (IPv6) in 1995. The address size was increased from
32 to 128 bits (16 octets), thus providing up to 2128 (approximately3.403×1038)
addresses. This is deemed sufficient for the foreseeable future.
IPv6 (Internet Protocol Version 6) is also called IPng (Internet Protocol next generation)
and it is the newest version of the Internet Protocol (IP) reviewed in
the IETF standards committees to replace the current version of IPv4 (Internet
Protocol Version 4).
IPv6 is often referred to as the "next generation" Internet standard and has been under
development now since the mid-1990s. IPv6 was born out of concern that the demand
for IP addresses would exceed the available supply. While increasing the pool of
addresses is one of the most often-talked about benefit of IPv6, there are other
important technological changes in IPv6 that will improve the IP protocol:
Sometimes in order to gain connectivity in certain networks where a DHCP server is not
running, the configuration of a static IP address is required.
The steps required to setup up a static IP address are rather straightforward, but the
process is a bit different from Windows Vista and XP.
When you sign up with an Internet Service Provider you will either end up
with a static IP address or a dynamic IP address, depending on the nature of your
account. In this article, you'll learn the difference between the two.
But also, you'll find out what type of IP address you have, why you have it and
how it works. And if you decide you'd rather switch sides, for reasons you'll learn
about here, you can look into making that change.
IP address basics.
But first, a quick review. An IP address (the IPv4 version, which is the most
common) consists of a string of numbers, separated by periods (dots). Each IP address
is separated into four segments by three periods. Here's an example: 10.48.29.12
Haven't you ever marveled how the Internet knows how to get information
directly to your computer? It's not magic: your IP address is the key (along with many
other factors).
For the purposes of this article, we'll put you at home on your computer and
talk about the IP address you likely use most often.
So here's the question: Is the IP address you use at home static or dynamic?
The prefix dyna means "power": however, dynamic IP addresses aren't more powerful,
but they do have the power to change (or be changed).
If your IP address at home is static, it means that it will remain the same every
time you connect...from home. Just keep in mind that an IP address doesn't travel with
you. If you took your laptop to a coffee shop and used their wireless network, that IP
address would be different. But at home, it would always be the same if it's the static
type.
Because of these advantages, it shouldn't be a surprise to learn that it costs more to get
one.
Also, it takes some good technical skills to set it up. And remember, if for some reason
you wanted a different IP address at home, you wouldn't be able to get one—although
there are ways to "mask" any IP address using a Virtual Private Network (VPN).
You'll read most everywhere that a dynamic IP address can change "at any
time." True, but not likely. The fact is, even if you have a dynamic IP address it's
possible that it won't change for months on end. And if it does, it's not really a big
The "dynamic" part comes from something called DHCP, or Dynamic Host
Control Protocol. It all happens in the background. Technically, your computer or
device "leases" (at no extra charge) an IP address to get connected.
Is there a drawback? It's possible that your upload and download speeds would
be faster if you had a static IP address, but you'll likely get used to the service and
speeds you get. Besides, you could possibly increase your speed with a plan upgrade.
Also, you couldn't set up a reliable server with a changeable IP address. But
most of us don't care about that.
As you can see, a dynamic IP address is the "standard" for most Internet
connections. Static IP addresses are requested by people who want more control and
say in their connection, and more capabilities with it.
Chances are that's not you. If you're not planning to host websites or setup
servers, your reliable and sometimes changing dynamic IP address should be just fine.
The first thing that must be done is to gain access to the Network and Sharing
Center in Windows 7. This can be done in one of two ways; the first way to access it is via
the control panel.
Select the Windows 7 Or on the bottom left-hand corner and select the control panel
option as shown below:
Once the Network and Sharing Center is open there is an option which allows
the change of adapter settings which is shown in the upper left hand corner of the
window. This is shown highlighted in the following figure (click on the image to enlarge):
For the purposes of this article the wired interface will be used as the interface
being given a static IP Address.
Since we want to change the interface IPv4 IP address this option must be selected
from the window. Once this option is selected the properties button will be enabled; press
the properties button.
These options are shown in their correct locations in the following figure:
Once these options have been entered on the screen simply press Ok on both property
screens and the configuration of a static IP is complete.
The point of configuring a static IP is so the network device doesn't change IPs.
The DHCP server on the network keeps track of which IP addresses are available and
which are in use. When you configure a machine with a static IP, then the DHCP
server will ping that IP and know that it is in use before handing it out. If a DHCP
server is ready to hand a specific IP and does not receive a ping response, then it will
hand out that available IP.
Any device on the network which provides a resource like file sharing, printing
etc. should have a static IP. Network devices like servers, routers, switches and
printers should all have static IP addresses configured to ensure the users can always
communicate with them.
This type of IP address is called dynamic because it changes when it's lease is
up. The DHCP server hands out an IP address and it has a lease to expire. When it
expires, the DHCP server will renew the lease or hand out a new IP address. That's
why its not a good idea to have your server configured with a dynamic IP, your users
will lose connectivity soon when the IP address changes. Imagine having to go around
and change all your computer's IP addresses back to the original?
Windows 8 begins with a new cool looking screen which lets you check your
mail, music, videos and many more quick access features. There is one window which
you will click to get to the Windows 8 desktop.
2.) Click the "Windows Explorer" icon in the bottom left corner of the Taskbar.
Windows Explorer window opens. Right-Click "Network" and click "Properties"
6.) In the next window, make sure "Obtain an IP address automatically" and "Obtain
DNS server address automatically" are selected.
Click "OK"
Windows 8 has a faster way to access the network Ethernet adapter settings to
configure an IP Address.
1.) In the bottom right corner of the desktop, right-click the "Network Icon".
6.) In the next window, click "Use the following IP address:" and now you can type
in the IP address, Subnet Mask and Default gateway that you want for this device on
your network.
You can now configure the "Preferred DNS server" and "Alternate DNS server".
Remember if you don't want your device to communicate with the Internet or have
access outside of your local network, then leave the "Default Gateway" field empty.
This would be a great strategy when you have a home server in which you don't want
a hacker from the Internet to access it. A little extra security tip : )
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP
address into network address and host address. Subnet Mask is made by setting
network bits to all "1"s and setting host bits to all "0"s. Within a given network, two
host addresses are reserved for special purpose, and cannot be assigned to hosts. The
"0" address is assigned a network address and "255" is assigned to a broadcast address,
and they cannot be assigned to hosts.
Ethernet Connection
Since Ethernet is so widely used, most modern computers have a NIC built into
the motherboard. A separate network card is not required unless some other type of
network is used. Here you can see an Ethernet connection built into a motherboard.
Several other connections are located directly adjacent to the Ethernet connection.
This cable plugs into the Ethernet connection of a computer. Small LED lights
built into the connection will show that a connection is active and whether data is
being transferred.
Network interface cards, usually referred to as NICs, act as the physical interface
or connection between the computer and the network cable. Figure 2.24 shows a NIC
with a coaxial-cable connection. The cards are installed in an expansion slot in each
computer and server on the network.
After the NIC has been installed, the network cable is attached to the card's port
to make the actual physical connection between the computer and the rest of the
network.
Data moves through a computer along paths called buses. These are actually
several data paths placed side by side. Because the paths are side by side (parallel),
data can move along them in lateral groups instead of in a single (serial) data stream.
Older buses, such as those used in the original IBM personal computer, were
known as 8-bit buses because they could move data 8 bits at a time. The IBM PC/AT
computer used a 16-bit bus, which means it could move data 16 bits at a time.
Computers manufactured today use 32-bit buses. When data travels on a computer's
bus, it is said to be traveling in parallel because the 32 bits are moving along side by
side. Think of a 32-bit bus as a 32-lane highway with 32 cars moving side by side
(moving in parallel), each carrying one bit of data.
On the network cable, however, data must travel in a single stream of bits. When
data travels on a network cable it is said to be traveling as a serial transmission because
one bit follows another. In other words, the cable is a one-lane highway, and the data
always travels in one direction. The computer is either sending or receiving data, but
never both at the same time.
The NIC takes data that is traveling in parallel as a group and restructures it so
that it will flow through the 1-bit-serial path of the network cable. Figure 2.25 shows
a server converting parallel data to serial data on the network. This is accomplished
through the translation of the computer's digital signals into electrical or optical
signals that can travel on the network's cables. The component responsible for this is
the transceiver (transmitter/receiver).
Interrupt (IRQ)
Base input/output (I/O) port address
Base memory address
Transceiver
NOTE
Network configuration
Router configuration: Specifies the correct IP addresses and route settings, etc.
Host configuration: Sets up a network connection on a host computer/laptop
by logging the default network settings, such as IP addressing, proxy, network
name and ID/password, to enable network connection and communication.
Software configuration: Any network-based software, like an intrusion
detection system (IDS), is allowed access and provided with the appropriate
credentials to monitor network traffic..
Moreover, network configuration includes Internet/network sharing,
software/application installation and firewall installation/configuration.
One of the things you should do is to check that a computer can communicate with
others.
Wired Networking
After installing the operating systems on the computers that will primarily
participate in the network, you can "physically" connect the workstations to the router.
You can start connecting the pieces whether the computers are on or off.
To connect the computers:
HUB
A hub is a common connection point for devices in a network. Hubs are
commonly used to connect segments of a LAN. A hub contains multiple ports. When
a packet arrives at one port, it is copied to the other ports so that all segments of the
LAN can see all packets.
What Hubs Do
Hubs and switches serve as a central connection for all of your network
equipment and handles a data type known as frames. Frames carry your data. When
a frame is received, it is amplified and then transmitted on to the port of the
destination PC.
In a hub, a frame is passed along or "broadcast" to every one of its ports. It
doesn't matter that the frame is only destined for one port. The hub has no way of
distinguishing which port a frame should be sent to. Passing it along to every port
Accessing Network
After installing the operating systems on the computers, a network, named a
homegroup, is automatically created, and that network is called Homegroup.
If you see it, click it. A new window may come up:
If you plan to let some computers access the network wirelessly (using a router that
has wireless capability), you may need to use one computer to set it up.
To do this:
a. Start the computer you will use to setup the router (you
should turn the others off):
Because the steps to perform depend on the router (or the manufacturer), we
will let you perform as described by their documentation
c. After installing and setting up the wireless router, turn it off and turn the
computer off
d. For any computer that doesn't have a wireless network card but has a wired
network card, connect it to a port of the wireless router using an RJ-45 cable.
The computers that have a network card will not need a physical connection
to the wireless router:
If the computer
connects using a
cable (wired
connection), the first
thing you should
check is whether the
network cable is
connected. If it's not,
connect it and check
the icon again. If the
cable is connected,
the next thing is to
check whether the
driver for the
network card is
installed and up-to-
date. To check it,
click Start, right-
click Computer, and
click Manage. On the
left, click Device Manager. Check how Ethernet Controller and/or Network
Controller appear. If either or both have an exclamation mark in their icon, ...
Network Discovery
Probably the most fundamental way a computer can make a resource available is to
share one or its resources or files. Of course, you must first create the resources.
Of course, to create a folder, open Windows Explorer or any file utility of your
choice. select the drive. Right-click it or right-click the right frame, position the
mouse on New, and click Folder:
a. Start Windows Explorer and display the drive where the folder is located
b. Right-click the folder -> Share With -> Specific Prople...
d. Then:
i. If you want to control access of the folder for all user accounts, click
Everyone
ii. If you want to control access for a specific account and that account is
in the list, select it
iii. If you want to control access for a certain user but his or her account is
not listed, click Create A New User... and create the new account
e. Under Permission Level click the down-pointing arrow for the account you
selected
h. Click Done
When a folder is shared in a computer, the other computers can access it. To access
such a folder from another computer, you must use an account that exists in the
computer where the folder is shared.
CLI allows a user to perform tasks by entering commands. Its working mechanism is
very easy, but it is not user friendly. Users enter the specific command, press
“Enter”, and then wait for a response. After receiving the command, the CLI
processes it accordingly and shows the output/result on the same screen; command
line interpreter is used for this purpose.
CLI was introduced with the teletypewriter machine. This system was based on
batched processing. Modern computers support CLI, batch processing and GUI in
one interface.
In order to best make use of CLI, a user must be able to enter a bundle of commands
(one by one) quickly. There are many applications (mono-processing systems) that
still use CLI for their operators. In addition, some programming languages, such as
Forth, Python and BASIC, offer CLI. Command line interpreter is used to implement
the text-based interface.
PING
The ping command is a Command Prompt command used to test the ability of the
source computer to reach a specified destination computer. The ping command is
usually used as a simple way verify that a computer can communicate over the
network with another computer or network device.
The ping command operates by sending Internet Control Message Protocol (ICMP)
Echo Request messages to the destination computer and waiting for a response. How
ping -a 192.168.1.22
In this example I'm asking the ping command to find the hostname assigned to
the 192.168.1.22 IP address but otherwise ping it as normal.
Pinging J3RTY22 [192.168.1.22] with 32 bytes of data: Reply from 192.168.1.22:
bytes=32 time<1ms TTL=64 Reply from 192.168.1.22: bytes=32 time<1ms TTL=64
Reply from 192.168.1.22: bytes=32 time=1ms TTL=64 Reply from 192.168.1.22:
bytes=32 time<1ms TTL=64 Ping statistics for 192.168.1.22: Packets: Sent = 4, Received
= 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum =
0ms, Maximum = 1ms, Average = 0ms
As you can see, the ping command resolved the IP address I entered, 192.168.1.22, as
the hostnameJ3RTY22 and then executed the remainder of the ping with default
settings.
The ping command is available from within the Command Prompt in Windows
10, Windows 8,Windows 7, Windows Vista, and Windows XP operating systems.
The ping command is also available in older versions of Windows like Windows 98
and 95.
The ping command can also be found in Command Prompt in the Advanced Startup
Options and System Recovery Options repair/recovery menus.
Note: The availability of certain ping command switches and other ping command
syntax may differ from operating system to operating system.
IPCONFIG
From the command prompt, type 'ipconfig' to run the utility with default options.
The output of the default command contains the IP address, network mask and
gateway for all physical and virtual network adapters.
Ipconfig is a MS-DOS command-line tool used to display and manage the network
settings of your computer. Ipconfig is available on Windows machines, and it
displays the current network connection details and DHCP client settings.
C:\> ipconfig /?
USAGE:
ipconfig [/? | /all | /renew [adapter] | /release [adapter] |
/flushdns | /displaydns | /registerdns |
/showclassid adapter |
/setclassid adapter [classid] ]
where
adapter Connection name
(wildcard characters * and ? allowed, see examples)
Options:
/? Display this help message
/all Display full configuration information.
/release Release the IP address for the specified adapter.
/renew Renew the IP address for the specified adapter.
/flushdns Purges the DNS Resolver cache.
/registerdns Refreshes all DHCP leases and re-registers DNS names
/displaydns Display the contents of the DNS Resolver Cache.
/showclassid Displays all the dhcp class IDs allowed for adapter.
/setclassid Modifies the dhcp class id.
Windows IP Configuration
Ethernet adapter Wireless Network Connection:
DxDiag
To run DxDiag, click Start, and in the run line, type dxdiag and press enter.
DxDiag commands
The dxdiag also has a few command options, as shown in the below syntax.
dxdiag [/dontskip] [/whql:on] [/whql:off] [/64bit] [/x outfile] [/t outfile]
dxdiag /t dxdiag_output.txt
In the above example, DxDiag would save the output into the Users folder.
Additional information
13.
14.
15.
16.
17. IP
18. IETF
19. IPng
20. VPN
21. DHCP
22. DNS
23. LAN
24. Wi-Fi
25. CLI
26. DxDiag
27. _____________________________________________________________
28. _____________________________________________________________
29. _____________________________________________________________
30. _____________________________________________________________
1. Network design
2. Internet Protocol address
3. Static Internet Protocol address
4. DirectX
5. Network design
6. Internet Protocol address
7. Packet
8. Network design
9. Dynamic Internet Protocol address
10. Ping command
11. packet
12. ipconfig
1. Configure IP address.
2. Configure workgroup.
3. Configure home group.
Supplies/Materials:
1. Lecture notes.
Equipment:
1. PC unit
Steps/Procedures:
1. Configure IP address.
2. Configure workgroup.
3. Configure home group.
Supplies/Materials:
1. Lecture notes.
Equipment:
2. PC unit
Steps/Procedures:
1. Manipulate CLI.
2. Display computer on network.
Supplies/Materials:
1. Lecture notes.
Equipment:
1. PC unit
Steps/Procedures:
CRITERIA YES NO
I Can …
1. Setup IP address.
2. Setup network on Win7.
3. Setup network on Win8.
4. Test network connectivity.
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure client Device systems settings in accordance with
manufacturers’ instructions and end-user preferences
2. Configure local area network (LAN) port in accordance with
manufacturers’ instructions and network design
3. Configure wide area network (WAN) port in accordance with
manufacturers’ instructions and network design
4. Configure wireless settings in accordance manufacturers’ instructions,
network design and end-user preferences
5. Configure Security/Firewall/Advance settings in accordance with
manufacturers’ instructions and end-user preferences
INTRODUCTION:
Installing a router is the first step to creating a solid home network, but how do
you choose the right one? And once you've purchased your router, how do you go
about setting it up? Follow this guide to get the right router configured for a secure
wireless (Wi-Fi) network. A router is a networking device that forwards data packets
between computer networks. Routers perform the traffic directing functions on the
Internet.
Before you can set up your wireless network, here’s what you’ll need:
Wireless router. A router sends info between your network and the Internet. With a
wireless router, you can connect PCs to your network using radio signals instead of
wires. There are several different kinds of wireless network technologies,
which include 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.
1. Select the Start button, type device manager in the search box, and then
select Device Manager.
2. Expand Network adapters.
3. Look for a network adapter that might have wireless in the name.
Setting up the modem and Internet connection
After you have all the equipment, you'll need to set up your modem and Internet
connection. If your modem wasn't set up for you by your Internet service provider
(ISP), follow the instructions that came with your modem to connect it to your PC
and the Internet. If you're using Digital Subscriber Line (DSL), connect your modem
to a phone jack. If you’re using cable, connect your modem to a cable jack. modem:
Modulator-demodulator. Electronic device that allows computers to communicate
over telephone wires
Put your wireless router somewhere where it will receive the strongest signal with
the least amount of interference. For better results, follow these tips:
Place your wireless router in a central location. Place the router as close to the center
of your home as possible to increase the strength of the wireless signal throughout
your home.
Position the wireless router off the floor and away from walls and metal objects,
such as metal file cabinets. The fewer physical obstructions between your PC and the
router's signal, the more likely that you'll be using the router's full signal strength.
Reduce interference. Some networking equipment uses a 2.4 gigahertz (GHz) radio
frequency. This is the same frequency as most microwaves and many cordless phones.
If you turn on the microwave or get a call on a cordless phone, your wireless signal
might be temporarily interrupted. You can avoid most of these issues by using a
cordless phone with a higher frequency, such as 5.8 GHz.
Security is always important; with a wireless network, it's even more important
because your network's signal could be broadcast outside your home. If you don't
help secure your network, people with PCs nearby could access info stored on your
network PCs and use your Internet connection.
Change the default user name and password. This helps protect your router. Most
router manufacturers have a default user name and password on the router and a
default network name (also known as the SSID). Someone could use this info to access
your router without you knowing it. To help avoid that, change the default user name
and password for your router. See the documentation for your device for instructions.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and
it’s connected to the network, follow these steps to set up a network security key:
1. Select the Start button, start typing Network and Sharing Center, and then choose it
in the list.
2. Select Set up a new connection or network.
3. Select Set up a new network, then choose Next.
The wizard will walk you through creating a network name and a security key. If
your router supports it, the wizard will default to Wi-Fi Protected Access (WPA or
WPA2) security. We recommend that you use WPA2, because it offers better security
than WPA or Wired Equivalent Privacy (WEP) security. With WPA2 or WPA you
can also use a passphrase, so you don’t have to remember a cryptic sequence of
letters and numbers.
Write down your security key and keep it in a safe place. You can also save your
security key on a USB flash drive by following the instructions in the wizard. (Saving
your security key to a USB flash drive is available in Windows 8 and Windows 7, but
not in Windows 10.)
Use a firewall. A firewall is hardware or software that can help protect your PC
from unauthorized users or malicious software (malware). Running a firewall on each
PC on your network can help control the spread of malicious software on your
network, and help protect your PCs when you're accessing the Internet. Windows
Firewall is included with this version of Windows.
Connect a PC to your wireless network
An access point is a wireless network device that acts as a portal for devices to connect
to a local area network. Access points are used for extending the wireless coverage of
an existing network and for increasing the number of users that can connect to it.
A high-speed Ethernet cable runs from a router to an access point, which transforms
the wired signal into a wireless one. Wireless connectivity is typically the only
available option for access points, establishing links with end-devices using Wi-Fi.
To connect the access point to one of the ports of your existing wired/wireless router
then configure the access point's wireless settings. Step 1: Open the access
point's web-based setup page by entering the default IP Address “192.168.1.245” on
the Address bar then press enter.
Repeater
A repeater is a network device that is used to regenerate or replicate signals that are
weakened or distorted by transmission over long distances and through areas with
high levels of electromagnetic interference (EMI). The purpose of a repeater is to
extend the LAN segment beyond its physical limits.
https://support.microsoft.com/en-us/help/17137/windows-setting-up-wireless-
network
https://www.ligowave.com/difference-between-access-point-and-router
http://www.linfo.org/repeater.html
1. ____________________ ISP
2. ____________________ DSL
3. ____________________ Modem
1. Router
2. Wireless Networks
3. Broadband Internet Connection
4. Wireless
5. Modem
Performance Objective: Provided with required information you should be able to:
Supplies/Materials:
1. CBLM
Equipment:
1. PC unit.
2. Ethernet cable.
3. Router.
Steps/Procedures:
CRITERIA YES NO
I Can …
1. Connect router to PC.
2. Configure name for router.
3. Configure password for router.
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Undertake final inspections to ensure that the configuration done on the
computer networks conforms with the manufacturer’s instruction/manual
2. Check computer networks to ensure safe operation.
3. Prepare/Complete reports according to company requirements
INTRODUCTION
You’ve set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network finished:
You must verify that the network works as expected.
A network performance test primarily tests the uplink and downlink speed of a
network. It defines how quick and responsive a network is to user/data
communication. It is done by uploading and downloading a data object from the
network and measuring both upload and download speeds, throughput, successful
message delivery rate and more. Some of the different types of network performance
tests include:
Here are a few simple tests you can conduct to make sure your network is
functional.
Check that the Link light — the little red or green light next to the RJ-45 port
— is lit on every computer. You must check this light both on the computer
itself and on the switch or router the computer is plugged into. If this light is
not on, you have a connection problem — most likely a bad cable.
When you’re sure the physical connections are good, you should attempt to
log on to each of your network computers using a valid domain user account.
Click the Start button, type cmd and press Enter. Then, enter the
command ipconfig /all and press Enter.
This command will spit out numerous lines of information. The line you’re
looking for should resemble this:
If this part of the output does not show a valid IP address, you need to check
that your IP configuration is set correctly and that your DHCP server is
working.
command prompt to make sure that the computers on your network can
Do several ping tests. First, make sure that TCP/IP is up and running by
having the computer try to ping itself. Open a command prompt and
type ping localhost. The output from this command will indicate whether or
Next, try to ping your servers by name. For example, if your file server is
named FileServer01, use the command ping FileServer01.
http://www.dummies.com/programming/networking/testing-your-computer-
network/
https://www.techopedia.com/definition/29991/network-performance-test
Performance Objective: Provided with required information you should be able to:
Supplies/Materials:
1. CBLM
Equipment:
1. PC unit
Steps/Procedures:
1. Do the following:
Check the physical connections.
Verify that you can log on.
Check the network configuration.
Verify that the computers can ping each other.
CRITERIA YES NO
I Can …
1. Check the physical connections.
2. Verify that you can log on.
3. Check the network configuration.
4. Verify that the computers can ping each other.