Professional Documents
Culture Documents
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
Learning Guide # 2
Unit of Competence: Administer Network Hardware
Module Title:
LG Code: ICT ITS1 M06 LO4
TTLM Code: ICT ITS1 TTLM06 1011
The term topology, or more specifically, network topology, refers to the arrangement or physical layout of
computers, cables, and other components on the network. “Topology” is the standard term that most network
professionals use when they refer to the network’s basic design. In addition, the term “topology” you will find
several other terms that are used to define a network’s:
Physical design
Diagram
Map
1. Bus Topology
It is often referred to as a “linear bus” because the computers are connected in a straight line. This is
the simplest and most common method of networking computers.
In a bus topology, all computers are connected to a shared communication line, called a trunk or a
backbone.
The computers are connected to the backbone using T-connectors.
Both ends of the backbone use terminators in order to prevent reflection of signals.
If the terminator is missing or is deliberately removed, the data transmissions are disrupted.
There is no central device or any special configuration.
Advantages
2. Star Topology
In a star topology, computers (also called nodes) connect to each other through a central device, called
a hub or a switch
A star network is a local area network (LAN) in which all nodes (workstations or other devices) are
directly connected to a common central Hub or Switch.
Every workstation is indirectly connected to each other through the central Hub or Switch.
Advantages
A star network is easy to implement.
It can be easily expanded without affecting
the network operation
Failure of a single node or the connecting
cable does not affect the entire network’s
operation.
It is easy to isolate nodes in order to
troubleshoot problems.
Disadvantages
Failure of the central device (hub or switch)
can bring down the entire network.
The length of cable required is much more
than ring and bus networks because each node is connected separately.
Cable length from the central device can be a limiting factor, depending on the type of cable used.
3. Ring Topology
In a ring topology, each computer is
connected to its neighboring computer to form a
logical ring.
Data travels in the ring in a circular fashion
from one computer to another, forming a
Advantages
A ring network is relatively easy to install.
There are fewer collisions because only
one computer transmits at a time.
Disadvantages
A break-in cable or a faulty computer can
bring down the entire network.
It is not as efficient as a star network.
It is difficult to troubleshoot a ring network.
The addition or removal of computers can disrupt network operation
4. Mesh Topology
In a mesh topology, all computers in the network are connected to every other computer, forming a
mesh of connections.
Each computer makes a point-to-point connection to every other computer.
Advantages
A mesh network is highly reliable because of
redundant multiple paths between
computers.
The failure of a single computer or a cable fault does not affect network operations.
Computers can be added or removed without affecting the network.
Disadvantages
It is difficult to install and troubleshoot.
It is very expensive because of the length of cable required to make multiple redundant connections.
Only a limited number of computers can be connected in a mesh topology.
Transmission Media is the physical path between the transmitter and the receiver in a data communication
system.
A. Wire/Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path.
The data signals are bound by the "cabling" system. Guided Media is also known as Bound Media. Cabling is
meant in a generic sense in the previous sentences and is not meant to be interpreted as copper wire cabling
only.
B. Wireless/Unguided Transmission Media consists of a means for the data signals to travel but nothing to
guide them along a specific path. The data signals are not bound to a cabling media and as such are often
called Unbound Media.
Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.
The oldest, least expensive and most commonly used transmission media.
Unshielded twisted-pair
(UTP)
TTLM Development Manual Date: 22-07-2013 E.C Page 7 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Shielded twisted-pair (STP) cable.
Unshielded Twisted Pair (UTP):- is the most popular and is generally the best option for school networks. The
quality of UTP may vary from telephone-grade wire to high-speed cable. The cable has four pairs of wire inside
the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from
adjacent pairs and other electrical devices.
Uses a woven copper braid jacket and higher quality protective jacket. Also uses foil wrap b/n and
around the wire pairs
Much less susceptible to interference and supports higher transmission rates than UTP
shielding makes it somewhat harder to install
same 100 meters limit as UTP
uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs.
telephone’s 4 wires)
2. Coaxial Cable
Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other
conductor woven around it providing a shield. An insulating protective coating called a jacket covers the outer
conductor.
The outer shield protects the inner conductor from outside electrical signals. The distance between the outer
conductor (shield) and inner conductor plus the type of material used for insulating the inner conductor
determine the cable properties or impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV,
TTLM Development Manual Date: 22-07-2013 E.C Page 8 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
50 ohms for Ethernet Thinnet and Thicknet. The excellent control of the impedance characteristics of the cable
allow higher data rates to be transferred than Twisted Pair cable.
3. Optical Fiber
An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric
layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is easier to install, but
cannot carry the light pulses for as long a distance as glass.
Multimode fiber (MMF) has a larger core than single-mode. This larger core allows hundreds of light
rays to flow through the fiber simultaneously.
Single-mode fiber (SMF), on the other hand, has a small core that allows only a single light beam to
pass. The light transmissions in single-mode fiber pass through the core in a direct line, like a flashlight
beam.
The numerous ligt beams in multimode fiber bounce around inside the core, inching toward their
destination. Because light beams bounce within the core, the light beams slow down, reduce in
strength, and take some time to travel along the cable.
For this reason, single-mode fiber's speed and distance are superior to those of multimode.
Single-mode fiber is used for long runs because it can transmit data 50 times further than multimode
fiber and at a faster rate. For example, single-mode fiber might be used on an organization’s corporate
campus between buildings.
Multimode fiber provides high bandwidth at high speeds over medium distances (up to about 3000
feet) but can be inconsistent for very long runs.
Cabling system
1: Transmit
2: Transmit
3: Receive
4: Not used
5: Not used
6: Receive
7: Not used
8: Not used
1: Receive
2: Receive
3: Transmit
10Base-T: T568-B
4: Not used
5: Not used
10Base-T: T568-A 6: Transmit
7: Not used
8: Not used
1: White Orange
2: Orange
3: White Green
4: Blue
5: White Blue
6: Green
7: White Brown PC
8: Brown
The straight-through cable is used to connect
1: White
Host to switch or hub
Router Orange
to switch or hub
2: Orange
3: White
Green
4: Blue
5: White
Blue
6: Green
7: White
Brown
8: Brown
Rolled Cable
you can use a rolled Ethernet cable to connect a host to a router console serial communication (com)
port.
To complete our examination of networking on a physical level, this chapter looks at the network devices used
to create networks.
Hubs
Switches
Bridges
Repeaters
Routers
TTLM Development Manual Date: 22-07-2013 E.C Page 13 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Gateways
Wireless access points (WAPs)
Modems
Network interface cards (NICs)
Firewalls
Hub
Hubs are simple network devices, and their simplicity is reflected in their low cost.
Small hubs with four or five ports (often referred to as workgroup hubs) provide everything needed to
create a small network.
Most hubs are referred to as either active or passive.
Active regenerate a signal before forwarding it to all the ports on the device and requires a power
supply.
Passive hubs, which today are seen only on older networks, do not need power and they don't
regenerate the data signal
The basic function of a hub is to take data from one of the connected devices and forward it to all the other
ports on the hub. The method of sending data to all systems regardless of the intended recipient is referred to
as broadcasting.
Switch
On the surface, a switch looks much like a hub. Despite their similar appearance, switches are far
more efficient than hubs and are far more desirable for today's network environments.
As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple switches are
often
TTLM Development Manual Date: 22-07-2013 E.C Page 14 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Rather than forwarding data to all the connected ports, a switch forwards data only to the port on which
the destination system is connected.
It looks at the Media Access Control (MAC) addresses of the devices connected to it to determine the
correct port. A MAC address is a unique number that is stamped into every NIC. By forwarding data
only to the system to which the data is addressed, the switch decreases the amount of traffic on each
network link dramatically.
Collisions occur on the network when two devices attempt to transmit at the same time. Such collisions
cause the performance of the network to degrade. By channeling data only to the connections that
should receive it, switches reduce the number of collisions that occur on the network.
Switches can also further improve performance over the performance of hubs by using a mechanism
called full-duplex. On a standard network connection, the communication between the system and the
hub is said to be half-duplex.
Switching Methods
Cut-through
the switch begins to forward the packet as soon as it is received.
No error checking is performed on the packet,
so the packet is moved through quickly.
the switch can propagate errors
30 times faster than store-and-forward switching
Store-and-forward
The switch waits to receive the entire packet before beginning to forward it.
TTLM Development Manual Date: 22-07-2013 E.C Page 15 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Also performs basic error checking.
Fragment-free
works by reading only the part of the packet that enables it to identify fragments of a
transmission.
On some managed switches, you can select the switching method you want to use.
Hubs and switches have two types of ports: medium dependent interface (MDI) or uplink port and
medium dependent interface crossed (MDI-X).
Uplink port allows you to connect two hubs and switches to create larger networks.
Bridges
Bridges are networking devices that connect networks.
Sometimes it is necessary to divide networks into
subnets to reduce the amount of traffic on each larger subnet
or for security reasons.
Once divided, the bridge connects the two subnets and manages the traffic flow between them. Today,
network switches have largely replaced bridges.
A bridge functions by blocking or forwarding data, based on the destination MAC address written into
each frame of data.
If the bridge believes the destination address is on a network other than that from which the data was
received, it can forward the data to the other networks to which it is connected.
If the address is not on the other side of the bridge, the data is blocked from passing. Bridges "learn"
the MAC addresses of devices on connected networks by "listening" to network traffic and recording
the network from which the traffic originates.
The advantages of bridges are simple and significant. By preventing unnecessary traffic from crossing
onto other network segments, a bridge can dramatically reduce the amount of network traffic on a
segment.
Routers
Routers are network devices that literally route data around the network.
By examining data as it arrives, the router can determine the destination address for the data; then, by
using tables of defined routes, the router determines the best way for the data to continue its journey.
Unlike bridges and switches, which use the hardware-configured MAC address to determine the
destination of the data, routers use the software-configured network address to make decisions.
This approach makes routers more functional than bridges or switches, and it also makes them more
complex because they have to work harder to determine the information.
A router is used to provide connectivity across wide area network (WAN) links and route information
between two LAN segments.
The figure below shows a router with two LAN ports (marked AUI 0 and AUI 1) and two WAN ports
(marked Serial 0 and Serial 1). This router is capable of routing data between two LAN segments and
two WAN segments.
Firewall
a hardware or software system that is used to separate one computer or network from another one.
The most common type is used to protect a computer or an entire network from unauthorized access
from the Internet.
can also be used to control the flow of data to and from multiple networks within the same
organization. Firewalls
can be programmed to filter data packets based on the information that is contained in the packets.
Private IP Addresses
Subnet Masks
A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the network ID
portion of the IP address from the host ID portion of the IP address.
The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
The 1s in the subnet mask represent the positions that refer to the network or subnet addresses.
IP Addressing