You are on page 1of 23

Ethiopian TVET System NTVET institution

Training, Teaching and Learning Materials Development

Ethiopian TVET-System

INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II

Learning Guide # 2
Unit of Competence: Administer Network Hardware
Module Title:
LG Code: ICT ITS1 M06 LO4
TTLM Code: ICT ITS1 TTLM06 1011

LO4: Install peripherals to a network

TTLM Development Manual Date: 22-07-2013 E.C Page 1 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics –
 What is computer network?
 Categorizing network
 Network transmission media
*Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher
shall advice you on additional work. But if satisfactory you can proceed to the next topic.
What is computer network?
• A Computer network is any collection of independent computers that communicate with one another
over a shared network medium.
• A System in which a number of independent Computers are linked together to share data or
information and peripherals such as hard disks and printers.
When computers and other devices connected together is called a Network.
- The concept of connected computers sharing resources such like files and/or peripheral devices
(Printer, Scanner) is called Networking.
Advantage of Networking:
- Share Documents
- Exchange e-mail messages
- Live audio and video broadcast
- Using one device for many computers like printer
- Sharing external memory like Hard disk.
- Security.
Categorizing Network
Categorizing network by Functional Relationship:
1. Peer-to-Peer
2. Client-Server
Categorizing network by Its Coverage:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3. WAN (Wind Area Network)
Categorizing network by Network Topology:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Hybrid Topology
Category by Functional Relationship:
1. Peer-to-Peer Networking:
Peer-to-Peer (or P2P) network is a simpler network in which each workstation has equivalent capabilities and
responsibilities. In other word a pure peer-to-peer file transfer network does not have the notion of clients or
servers, but only equal peer nodes that simultaneously function as both "clients" and "servers“.

TTLM Development Manual Date: 22-07-2013 E.C Page 2 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Peer-to-Peer computer network is a network that relies on computing power at the edges of a connection,
there is no hierarchy among the computers.
Advantages of a peer-to-peer network
 Less initial capital – no need for a dedicated server
 No need for system administration (administrator)
 Setup – an operating system (such as windows XP) already in place may only need to be configured for
peer-to-peer operations.
 The way security established – users can set their own security and shared resources can exist on any
computer rather than a centralized server only.
Disadvantages of a peer-to-peer network
 Decentralized – no central repository for the files and application.
 Security – does not provide the security available on a client/server network.
2. Client-Server Network
In the environment with more than 10 users, a peer to peer network will not adequate. There need comes to
use a dedicated computer which optimized (increase) the service of network to clients quickly and ensure the
security of files. Therefore, there will be one or more server computers which serve other station (client)
computers to optimized network system. A dedicated computer with software that carries out some task on
behalf of users.
What is Server?
 Server is a dedicated computer that provide resources to Network users or Client computers.
Advantages of server-based network
 Centralized – resources and data security are controlled through the server
 Scalability – any or all elements can be replaced individually as need increase.
 Flexibility – new technology can be easily integrated into system
 Interoperability – all components (client/network/server) work together
 Accessibility – server can be accessed remotely and across multiple platforms.
Disadvantages of server-Based computer networks
 Expensive – requires initial investment in dedicated server
 Maintenance – large networks will require a staff to ensure efficient operations
 Dependence- when a server goes down, operations will cease across the network.
 Server may fail- incase the server failed, the entire network goes down
Types of Server:
- File and Printer server
- Mail server
- Communication server
- Directory service server
- Application server
- Fax server
- Backup Server

Category by Its Coverage

TTLM Development Manual Date: 22-07-2013 E.C Page 3 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
1. LAN (Local Area Network)
 A Local Area Network (LAN) is a network that is confined (restricted) to a relatively small area. It is
generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN
computers more than a A kilometer apart.
 When using ethernet the computers are usually wired to a hub or to a switch.

2. MAN (Metropolitan Area Network):


 Is a network that interconnects users with computer resources in a geographic area or region larger
than that covered by even a large local area network (LAN) but smaller than the area covered by a wide
area network (WAN).
 The term is applied to the interconnection of networks in a city or town into a single larger network.

3. WAN (Wide Area Networks)


 Often a network (LAN) is located in multiple physical places. Wide area networking combines multiple
LANs that are geographically separate. This is accomplished by connecting the different LANs using
services such as dedicated leased phone lines, dial-up phone lines, satellite links, and data packet
carrier services.
 Wide area networking can be as simple as a modem and remote access server for employees to dial
into, or it can be as complex as hundreds of branch offices globally linked using special routing
protocols and filters to minimize the expense of sending data sent over vast distances. Example
Internet.

Categorizing network by Network Topology:

The term topology, or more specifically, network topology, refers to the arrangement or physical layout of
computers, cables, and other components on the network. “Topology” is the standard term that most network
professionals use when they refer to the network’s basic design. In addition, the term “topology” you will find
several other terms that are used to define a network’s:
 Physical design
 Diagram
 Map

1. Bus Topology
 It is often referred to as a “linear bus” because the computers are connected in a straight line. This is
the simplest and most common method of networking computers.
 In a bus topology, all computers are connected to a shared communication line, called a trunk or a
backbone.
 The computers are connected to the backbone using T-connectors.
 Both ends of the backbone use terminators in order to prevent reflection of signals.
 If the terminator is missing or is deliberately removed, the data transmissions are disrupted.
 There is no central device or any special configuration.

Advantages

TTLM Development Manual Date: 22-07-2013 E.C Page 4 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
 A bus network is the cheapest of all topologies.
 No special configuration is required.
 It is easy to install, and no special equipment is
needed for installation.
 It needs less cable length than do other topologies.
Disadvantages
 A break in cable or a missing terminator can
bring down the entire network.
 It is not possible to add or remove computers
without disrupting the network.
 It is difficult to troubleshoot and administer.
 Addition of more computers degrades performance.

2. Star Topology
 In a star topology, computers (also called nodes) connect to each other through a central device, called
a hub or a switch
 A star network is a local area network (LAN) in which all nodes (workstations or other devices) are
directly connected to a common central Hub or Switch.
 Every workstation is indirectly connected to each other through the central Hub or Switch.

Advantages
 A star network is easy to implement.
 It can be easily expanded without affecting
the network operation
 Failure of a single node or the connecting
cable does not affect the entire network’s
operation.
 It is easy to isolate nodes in order to
troubleshoot problems.

Disadvantages
 Failure of the central device (hub or switch)
can bring down the entire network.
 The length of cable required is much more
than ring and bus networks because each node is connected separately.
 Cable length from the central device can be a limiting factor, depending on the type of cable used.

3. Ring Topology
 In a ring topology, each computer is
connected to its neighboring computer to form a
logical ring.
 Data travels in the ring in a circular fashion
from one computer to another, forming a

TTLM Development Manual Date: 22-07-2013 E.C Page 5 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
logical ring.

Advantages
 A ring network is relatively easy to install.
 There are fewer collisions because only
one computer transmits at a time.

Disadvantages
 A break-in cable or a faulty computer can
bring down the entire network.
 It is not as efficient as a star network.
 It is difficult to troubleshoot a ring network.
 The addition or removal of computers can disrupt network operation

4. Mesh Topology
 In a mesh topology, all computers in the network are connected to every other computer, forming a
mesh of connections.
 Each computer makes a point-to-point connection to every other computer.

Two types of mesh topology

 In the full mesh topology, each node


(workstation or other device) is connected
directly to each of the others.
 In the partial mesh topology, some nodes are
connected to all the others, but some of the
nodes are connected only to those other
nodes with which they exchange the most
data.

Advantages
 A mesh network is highly reliable because of
redundant multiple paths between
computers.
 The failure of a single computer or a cable fault does not affect network operations.
 Computers can be added or removed without affecting the network.

Disadvantages
 It is difficult to install and troubleshoot.
 It is very expensive because of the length of cable required to make multiple redundant connections.
 Only a limited number of computers can be connected in a mesh topology.

TTLM Development Manual Date: 22-07-2013 E.C Page 6 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
5. Hybrid Topology
It is combination of any two or more network
topologies. These instances can occur where two
basic network topologies, when connected together, can still
retain the basic network character, and therefore not be a
hybrid network.

Network Transmission Media

Transmission Media is the physical path between the transmitter and the receiver in a data communication
system.

There are 2 basic categories of Transmission Media:


A. Wire/Guided
B. Wireless/Unguided.

A. Wire/Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path.
The data signals are bound by the "cabling" system. Guided Media is also known as Bound Media. Cabling is
meant in a generic sense in the previous sentences and is not meant to be interpreted as copper wire cabling
only.

B. Wireless/Unguided Transmission Media consists of a means for the data signals to travel but nothing to
guide them along a specific path. The data signals are not bound to a cabling media and as such are often
called Unbound Media.

Commonly there are three types of guided transmission cable:-


1. Twisted Pair Cable
2. Coaxial Cable
3. Optical fiber cable

1. Twisted pair cable

Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.
The oldest, least expensive and most commonly used transmission media.

Two types of twisted-pair cable:-

 Unshielded twisted-pair
(UTP)
TTLM Development Manual Date: 22-07-2013 E.C Page 7 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
 Shielded twisted-pair (STP) cable.

Unshielded Twisted Pair (UTP):- is the most popular and is generally the best option for school networks. The
quality of UTP may vary from telephone-grade wire to high-speed cable. The cable has four pairs of wire inside
the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from
adjacent pairs and other electrical devices.

 It is the most commonly used cable types in LANs.


 It is made up of four twisted pairs enclosed in a plastic jacket.
 Depending on the bandwidth offered there are seven types of UTP cables such as Cat-1,Cat-2,cat-3,cat-
4,cat-5,cat-6 and cat-7
 The Most commonly used UTP cables are category-5 cables and its bandwidth is 1000Mbps.

Shielded Twisted Pair (STP) cable

 Uses a woven copper braid jacket and higher quality protective jacket. Also uses foil wrap b/n and
around the wire pairs
 Much less susceptible to interference and supports higher transmission rates than UTP
 shielding makes it somewhat harder to install
 same 100 meters limit as UTP
 uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs.
telephone’s 4 wires)

2. Coaxial Cable

Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other
conductor woven around it providing a shield. An insulating protective coating called a jacket covers the outer
conductor.

The outer shield protects the inner conductor from outside electrical signals. The distance between the outer
conductor (shield) and inner conductor plus the type of material used for insulating the inner conductor
determine the cable properties or impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV,
TTLM Development Manual Date: 22-07-2013 E.C Page 8 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
50 ohms for Ethernet Thinnet and Thicknet. The excellent control of the impedance characteristics of the cable
allow higher data rates to be transferred than Twisted Pair cable.

3. Optical Fiber

An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric
layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is easier to install, but
cannot carry the light pulses for as long a distance as glass.

Two types of optical fiber


are commonly available:
single-mode and
multimode.

 Multimode fiber (MMF) has a larger core than single-mode. This larger core allows hundreds of light
rays to flow through the fiber simultaneously.
 Single-mode fiber (SMF), on the other hand, has a small core that allows only a single light beam to
pass. The light transmissions in single-mode fiber pass through the core in a direct line, like a flashlight
beam.
 The numerous ligt beams in multimode fiber bounce around inside the core, inching toward their
destination. Because light beams bounce within the core, the light beams slow down, reduce in
strength, and take some time to travel along the cable.

For this reason, single-mode fiber's speed and distance are superior to those of multimode.

 Single-mode fiber is used for long runs because it can transmit data 50 times further than multimode
fiber and at a faster rate. For example, single-mode fiber might be used on an organization’s corporate
campus between buildings.
 Multimode fiber provides high bandwidth at high speeds over medium distances (up to about 3000
feet) but can be inconsistent for very long runs.

TTLM Development Manual Date: 22-07-2013 E.C Page 9 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development

LAN cables and connectors

Cable Type Maximum Maximum Advantages Disadvantages Connector


Speed Cable length used
STP 100Mbps 185m Resistant to EMI Expensive D-shell
connector
UPT 100Mbps 185m Inexpensive Not resistant to EMI RJ-45
Easy to install connector
Resistant to
physical stress
Coaxial 10Mbps 185m, 500m or 10 Easy to install Not resistant to BNC
km Less sensitive to physical stress Connector
EMI than UTP/STP Expensive compared T-connector
to UTP Terminator
Optical 155Mbps- 10km depending Resistant to EMI Expensive SMA
Fiber 1000Mbps on the fiber type High data transfer Difficult to install connector
rate

Cabling system

Two cables at each work area:


• Voice:
– Unshielded twisted-pair, UTP cable.
• Data:
– Shielded twisted-pair, STP cable.
– Unshielded twisted-pair, UTP cable.
– Filer-optic cable.
– Coaxial cable.

TTLM Development Manual Date: 22-07-2013 E.C Page 10 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Three types of Ethernet cables are available :
• Straight-through cable
• Crossover cable
• Rolled cable

Making Ethernet 10Base-T cables:


– Straight-thru cable: PC-to-HUB.
– Crossover cable: PC-to-PC.
• Making console cables:
– Rollover cable:
Serial port-to-console port of Cisco equipments

10Base-T: NIC network port 10Base-T: HUB network port

1: Transmit
2: Transmit
3: Receive
4: Not used
5: Not used
6: Receive
7: Not used
8: Not used

1: Receive
2: Receive
3: Transmit
10Base-T: T568-B
4: Not used
5: Not used
10Base-T: T568-A 6: Transmit
7: Not used
8: Not used

TTLM Development Manual Date: 22-07-2013 E.C Page 11 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
1: White Orange
Green
10Base-T: Straight-Through1:
cable
White Orange
2: Green
Orange Green
3: White Orange
2: Orange 4: Blue
3: White 5: White Blue
Green Green
6: Orange
4: Blue
7: White Brown
5: White Blue
8: Brown
6: Green
7: White
Brown
PC HUB 8: Brown
10Base-T: Crossover cable

1: White Orange
2: Orange
3: White Green
4: Blue
5: White Blue
6: Green
7: White Brown PC
8: Brown
The straight-through cable is used to connect
 1: White
Host to switch or hub
 Router Orange
to switch or hub
2: Orange
3: White
Green
4: Blue
5: White
Blue
6: Green
7: White
Brown
8: Brown

TTLM Development Manual Date: 22-07-2013 E.C Page 12 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development

The crossover cable can be used to connect


 Switch to switch
 Hub to hub
 Host to host
 Hub to switch
 Router direct to host

Rolled Cable

 you can use a rolled Ethernet cable to connect a host to a router console serial communication (com)
port.

Networking Components and Devices

To complete our examination of networking on a physical level, this chapter looks at the network devices used
to create networks.
 Hubs
 Switches
 Bridges
 Repeaters
 Routers
TTLM Development Manual Date: 22-07-2013 E.C Page 13 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
 Gateways
 Wireless access points (WAPs)
 Modems
 Network interface cards (NICs)
 Firewalls

Hub
 Hubs are simple network devices, and their simplicity is reflected in their low cost.
 Small hubs with four or five ports (often referred to as workgroup hubs) provide everything needed to
create a small network.
 Most hubs are referred to as either active or passive.
 Active regenerate a signal before forwarding it to all the ports on the device and requires a power
supply.
 Passive hubs, which today are seen only on older networks, do not need power and they don't
regenerate the data signal

The basic function of a hub is to take data from one of the connected devices and forward it to all the other
ports on the hub. The method of sending data to all systems regardless of the intended recipient is referred to
as broadcasting.

Switch
 On the surface, a switch looks much like a hub. Despite their similar appearance, switches are far
more efficient than hubs and are far more desirable for today's network environments.
 As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple switches are
often

TTLM Development Manual Date: 22-07-2013 E.C Page 14 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development

 Interconnected to create larger networks.

Rather than forwarding data to all the connected ports, a switch forwards data only to the port on which
the destination system is connected.
 It looks at the Media Access Control (MAC) addresses of the devices connected to it to determine the
correct port. A MAC address is a unique number that is stamped into every NIC. By forwarding data
only to the system to which the data is addressed, the switch decreases the amount of traffic on each
network link dramatically.

 Collisions occur on the network when two devices attempt to transmit at the same time. Such collisions
cause the performance of the network to degrade. By channeling data only to the connections that
should receive it, switches reduce the number of collisions that occur on the network.
 Switches can also further improve performance over the performance of hubs by using a mechanism
called full-duplex. On a standard network connection, the communication between the system and the
hub is said to be half-duplex.

Switching Methods

Cut-through
 the switch begins to forward the packet as soon as it is received.
 No error checking is performed on the packet,
 so the packet is moved through quickly.
 the switch can propagate errors
 30 times faster than store-and-forward switching

Store-and-forward
 The switch waits to receive the entire packet before beginning to forward it.
TTLM Development Manual Date: 22-07-2013 E.C Page 15 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
 Also performs basic error checking.

Fragment-free
 works by reading only the part of the packet that enables it to identify fragments of a
transmission.
 On some managed switches, you can select the switching method you want to use.

Working with Hubs and Switches

 Hubs and switches have two types of ports: medium dependent interface (MDI) or uplink port and
medium dependent interface crossed (MDI-X).
 Uplink port allows you to connect two hubs and switches to create larger networks.

Bridges
 Bridges are networking devices that connect networks.
 Sometimes it is necessary to divide networks into
subnets to reduce the amount of traffic on each larger subnet
or for security reasons.
 Once divided, the bridge connects the two subnets and manages the traffic flow between them. Today,
network switches have largely replaced bridges.

 A bridge functions by blocking or forwarding data, based on the destination MAC address written into
each frame of data.
 If the bridge believes the destination address is on a network other than that from which the data was
received, it can forward the data to the other networks to which it is connected.
 If the address is not on the other side of the bridge, the data is blocked from passing. Bridges "learn"
the MAC addresses of devices on connected networks by "listening" to network traffic and recording
the network from which the traffic originates.
 The advantages of bridges are simple and significant. By preventing unnecessary traffic from crossing
onto other network segments, a bridge can dramatically reduce the amount of network traffic on a
segment.

TTLM Development Manual Date: 22-07-2013 E.C Page 16 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Repeater
 Repeaters are usually used to strengthen signals going long distances.
 A repeater amplifies the signal it receives on one port before it transmits it on other ports.
 Because the repeater does not check on the contents of the data it receives or retransmits, frames that
are corrupted by noise and other factors can also be repeated.
 The development of the hub replaced the repeater for all practical purposes, because it performs the
same functions, and can include additional features.

Routers
 Routers are network devices that literally route data around the network.
 By examining data as it arrives, the router can determine the destination address for the data; then, by
using tables of defined routes, the router determines the best way for the data to continue its journey.
 Unlike bridges and switches, which use the hardware-configured MAC address to determine the
destination of the data, routers use the software-configured network address to make decisions.
 This approach makes routers more functional than bridges or switches, and it also makes them more
complex because they have to work harder to determine the information.

 A router is used to provide connectivity across wide area network (WAN) links and route information
between two LAN segments.
 The figure below shows a router with two LAN ports (marked AUI 0 and AUI 1) and two WAN ports
(marked Serial 0 and Serial 1). This router is capable of routing data between two LAN segments and
two WAN segments.

The definition of gateways is vague, it's because


there is no definite answer. The function of a gateway
is very specific, but how the gateway functionality is
implemented is not.

TTLM Development Manual Date: 22-07-2013 E.C Page 17 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Modems
 Modem is a contraction of the terms modulator and demodulator.
 Modems perform a simple function: They translate digital signals from a computer into analog signals
that can travel across conventional phone lines.
 Modems provide a relatively slow method of communication. In fact, the fastest modem available on
the market today has a maximum speed of 56Kbps.
 available as
o internal devices that plug into PCI/ISA slots
o external devices that plug into serial or USB ports;
o PCMCIA cards designed for use in
laptops

Network Interface Cards (NICs)


 NICs are the mechanisms by which
computers connect to a network.
 NICs come in all shapes and sizes, and they
come in prices to suit all budgets.
 Known as network card, network adapter,
and LAN adapter, etc.
 When buying one consider
o Network compatibility – Ethernet/Token Ring
o Bus compatibility – PCI/ ISA /PCI-e
o Port compatibility – UTP/ Fibre
o Hardware compatibility – Easy to install / Recognized by many OS’s

Wireless Access Point (WAP)


 are a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals.
 Depending on the size of the network, one or more WAPs may be required. Additional WAPs are used
to allow access to more wireless clients and to expand the range of the wireless network.
 Communication depends on
o Distance between the client and the WAP
TTLM Development Manual Date: 22-07-2013 E.C Page 18 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
o Environmental conditions

Firewall
 a hardware or software system that is used to separate one computer or network from another one.
 The most common type is used to protect a computer or an entire network from unauthorized access
from the Internet.
 can also be used to control the flow of data to and from multiple networks within the same
organization. Firewalls
 can be programmed to filter data packets based on the information that is contained in the packets.

Summary of the three classes of networks

Network Address Range: Class A


 0xxxxxxx
 00000000 = 0
 01111111 = 127

Network Address Range: Class B


 10000000 = 128
 10111111 = 191

TTLM Development Manual Date: 22-07-2013 E.C Page 19 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
Network Address Range: Class C
 11000000 = 192
 11011111 = 223

Network Address Ranges: Classes D and E


 The addresses between 224 to 255 are reserved for Class D and E networks.
 Class D (224–239) is used for multicast addresses and Class E (240–255) for scientific purposes

Private IP Addresses

Subnet Masks
 A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the network ID
portion of the IP address from the host ID portion of the IP address.
 The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
 The 1s in the subnet mask represent the positions that refer to the network or subnet addresses.

TTLM Development Manual Date: 22-07-2013 E.C Page 20 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development

IP Addressing

IP addresses are divided into classes to define the large, medium,


and small networks. Class A addresses are assigned to larger
networks. Class B addresses are used for medium-sized networks,
and Class C for small networks. The first step in determining
which part of the address identifies the network and which part
identifies the host is identifying the class of an IP address

SELF CHECK QUESTIONS


Instruction I: Choose the best Answer
1. A device that used to connect all nodes in star topology in one place is
A. Repeater B. Hub C. Switch D. B&C
2. The type of network cable that commonly used in TV system
A. UTP B. Coaxial C. fiber optics D. all
3. Terminator in a bus topology is used for
A. to transmit the signal on networks B. Connect all nodes to each other
C. Stop the signal on bouncing over the back bone & make the main cable free
D. all
4. _________ Is a network adopter that is used to connect PC to N/W.
A. NIC B. Bridges C. Repeaters D. none
5. Is device that can be used to connect N/Ws that use different technologies (LANs, MANs
TTLM Development Manual Date: 22-07-2013 E.C Page 21 of 23
Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
& WANs)
A. Bridges B. Repeaters C. Routers D. Switches
6. Which one of the following is the function of NIC?
A. Prepare data from the computer for the network cable
B.Send the data to another computer
C.Control the flow of data b/n computer & cabling system
D.all of the above
7_______cable is good for very high speed, high capacity data transmission.
A. Coaxial cable B. Twisted Pair cable C. Fiber optic cable D.all
8. Which net work device can amplify or regenerate the weak signal
A. Bridge B. Switch C. Repeater D. all
9. Which one of the following net work device used to connect different net work that uses
the same net work protocol?
A. Switch B. Bridge C.HUB D.repeater
10.Which type of cable arrangement is used to connect similar devices?
A. Cross over B. Rollover C. Straight trough D. All
11. A device that are used to connect RJ45 with UTP cable
A. Cable Cutter B. Crimper C.cable taster D. all
12. How many wires are there in cat- 5e UTP Cable?
A.2 Pairs B.4 Pairs C. 8 wires D.B &C
13. Which one of the following is false?
A.In a peer to peer net work configuration two PCs can have the same type of IP
Address
B. In a peer to peer net work two PCs must use the same type of work group name.
C. Both PCs have equal right to access a net work
D. All

SELF CHECK QUESTIONS

Instruction I: Choose the best Answer


1._______is a computer that provide shared resources for a net work users.
A. Client B. Server C. Media D. all
2. Which net work type has no geographical limitation?
A.LAN B.WAN C.MAN D. None
3. Which of the following one is not the use of computer Net Work?
A. Sharing file B. Sharing printerC. Sharing hard disk D. Process data
4.____ is the arrangement or the physical layout of computer, cables and other component on the net work.
A. Topology B. Protocol C.IP addresses D. None
5._____topology connects computers on a single circle of cable.
A .Bus B. Ring C. Star D. Mesh

Instruction II Match column “A” with Column “B”


Column “A” Column “B”
_____1. Server based net work A. Centralized device in star Topology
_____2. 255.255.255.0 B. The sub net mask of Class C
_____3. Peer to peer net work C. The standard type of net work
_____4. 192.168.100.1 D. a node acts as both client and server

TTLM Development Manual Date: 22-07-2013 E.C Page 22 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com
Ethiopian TVET System NTVET institution
Training, Teaching and Learning Materials Development
_____5. HUB E. Class C IP Address
F. Class B IP address
G. The sub net mask of class A
Answer for Instruction 1
Multiple choices
1. B
2. B
3. D
4. A
5. B

Answer for Instruction 2


Matching
1. C
2. B
3. D
4. E
5. A

TTLM Development Manual Date: 22-07-2013 E.C Page 23 of 23


Author: Jamara Bayou (Email/ Gmail)
Bilisummaaibsaa@gmail.com

You might also like