You are on page 1of 6

Lesson 01 – Networking Overview

Networking Overview

Required Materials:
 Category 5e / 6 (CAT 5e / 6) Unshielded Twisted Pair (UTP)  Network Cable Tester & Cabling continuity tester
Cable (3 meters)  RJ45 Connector (10 pieces)
 Crimping Tool  Rubber Boots (6 pieces)
 Wire Stripper

Objectives:
After studying this, you should be able to:
 determine the importance of network in our society;
 describe the function of a network;
 differentiate the advantages and disadvantages of Peer-to-Peer Networking;
 determine the significance of Client / Server Networking Model;
 build a crossover cable to T568-B or T568-A standards for connection from a workstation to workstation or from a switch to a switch;
 build a straight through Ethernet patch cable standards for connection from workstation to hub/switch or patch panel to hub/switch;
 build a rollover cable for connection from a workstation to the console port on a router or switch.

Definition of Terms:
 Internetworks = form a basic building blocks use for constructing larger networks or a network of networks.
 Local Area Network (LAN) = a small network, limited to a single collection of machines and one or more cables and other peripheral equipment
for purely local access.
 Metropolitan Area Network (MAN) = it uses wan technologies to interconnect LANs within a specific geographic region such as a country or a
city. It is for citywide access.
 Personal Area Network (PAN) = is a small network design typically associated with a single person. Example is wireless technology.
 Sneaker net = it is an old & well known alternatives to networking namely, passing a floppy disk from machine to machine.
 Stand-alone computer = any single computer that is not attach to a network.
 Wide Area Network (WAN) = it spans distances measured in miles and links together two or more separate LANs. These LANs maybe in
locations just down the road from one another or at opposite ends of the planet, for access to remote sites elsewhere in the country or around
the world, example is the internet.
 Wireless PAN (WPAN) = refers to the technologies involved in connecting devices in close proximity to exchange data or resources. Example
is laptop to cellphone or an adhoc network.

Introduction to Networks & Networking Concepts


Computer networks use a large variety of components that work together for the purpose of sending bits from one computing device to
another (Odom, 2013).
Network is a group of connected computers. Allow to communicate & share data & resources. Networking means sharing resources on a
network.

Table 1.1 Functions of a Network


Function Description
Increased communication is one of the primary purposes of a network. Networks allow a variety of
Communications
communication including video conferencing, real time chats and e-mail.
Sharing Hardware Examples are printer, scanners, Optical drives (CD-ROM/DVD-ROM), tape drives & other removable media.
Linking users on the same system makes it easy for them to share files with others on the network, but access
Data Sharing
to both the data and the network must be carefully controlled.
It is important for centralized systems such as databases, users rely on networks to access and use such
Application Sharing
systems. Networking makes it possible for numerous users to share a single application.
A network makes it possible to store data in a central location. When the data is in a central location, it is
Data Backup
easier to backup and retrieve.

Computers can communicate with other computers through a series of connections and associated hardware called a network. The
advantage of a network is that data can be exchanged rapidly, and software and hardware resources, such as hard-disk space or printers, can be
shared. Networks also allow remote use of a computer by a user who cannot physically access the computer.

Table 1.2 Network Types


Network Types Description
Server It is a computer that shares its resources across the network. It responds to such request.
Client It is one that accesses shared resources it request information.
Peer-to-Peer Share and request resources from one another.

Prepared by: Mr. Jeffrey A. Diaz GrrV1.7-2020 Innovative Computer Organization for New Society
Lesson 01 – Networking Overview

Peer-to-Peer Networking (P2P)


 Sometimes referred to as a workgroup, is a low-cost, easily implemented network solution generally used in small network environments that
need to share a few files and maybe some hardware. All systems are equal.
 Any computer can act as a server to share resources with other machines and as a client to access resources from other machines.
 It works well on networks that have 10 or fewer computers.
 It is often refer to as decentralized networking because the network files, data and administration are not handled from a central location.

Table 1.3 Peer-to-Peer Networking (P2P) Advantages and Disadvantages


Advantages Disadvantages
Easy to install and configure. Network security applies only to single resources at a time.
Individual machines do not depend on the presence of a dedicated Users may be forced to use, as many passwords as there are shared
server. resources.
Each machine must be backed up individually to protect all shared
Individual users control their own-shared resources.
data.
Every time a user accesses a shared resource, the user at the
Inexpensive to purchase and operate.
machine where the resource resides suffers reduced performance.
Need no additional equipment or software beyond a suitable Operating There is no centralized organizational scheme to locate or control
System access to data.
No dedicated administrators are needed to run the network.
It does not usually work well with more than 10 users.
It works best for networks with 10 or fewer users.

The Client / Server Networking Model


 A server based networking as it is commonly called. A completely scalable, allowing additional computers or other networked devices to be
added with little difficulty.
 Server based networks rely on special purpose computers called servers that provide centralized repositories for network resources &
incorporate centralized security & access controls that determine who can access what network privileges.

Table 1.4 Server-Based Networking Advantages and Disadvantages


Advantages Disadvantages
Centralized user accounts, security & access controls simplify network At worst, server failure renders a network unusable; at best, it results
administration. in loss of network resources.
Equipment that is more powerful means more efficient access to
network resources. Complex, special-purpose server software requires allocation of expert
staff that increases expenses.
A single password for network log-on delivers access to all resources.
Server-based networking makes the most sense for networks with 10
Dedicated hardware & specialized software add to the cost.
or more users or any networks where resources are used heavily.

Storage-Area Networks (SANs)


 For the largest scale networks, especially those with many thousands of users, or with particularly large collections of data to manage.
 Uses high-speed network links between servers that may be located anywhere in an enterprise and centralized storage systems where data
and applications reside.
 The link that connects a server to a SAN storage device uses a high-speed network technology such as gigabit Ethernet. Solely for connecting
servers to an extremely fast and highly reliable storage cluster somewhere else on an organizations premises.
 SANs provide centralized control over network storage, primarily by consolidating storage in a single location at the site level. Such systems
are considerably more expensive than conventional storage, but they offer considerable advantages as well.

Table 1.5 Specialized Servers


Server Description
It supplies the server side of client/server applications & often the data. They provide processing services as
Application Servers
well as handling requests for file or print services.
Not only supplies query (processing & data analysis facilities), but also acts as the repository for the huge
Database server
amounts of data that often reside within a database.

it provides a mechanism for users outside a (inbound communication) network to access that networks
Communication Servers resources & sometimes also permit users on the network to access resources outside the networks local
scope (outbound communication).

It permits users to locate, store & secure information about a network and resources available from a network.
Domain Controllers / Directory It handles the log-on service and manages the collection of computers, users and so on in a domain. Any user
Servers who belongs to a specific domain can obtain access to all resources and information that he or she has
permission to use simply by logging on to the domain.

It manage fax traffic for a network, receiving incoming faxes via telephone and distributing them to their
Fax Server recipients over the network, and collecting outgoing faxes across the network before sending them via
telephone.

Prepared by: Mr. Jeffrey A. Diaz GrrV1.7-2020 Innovative Computer Organization for New Society
Lesson 01 – Networking Overview
Table 1.5 Specialized Servers (continued)
Server Description
Mainstay of the server world in that they provide basic networked file storage and retrieval services, and
File and Print Servers access to networked printers, functions that define the fundamental uses of most business networks. Such
servers let users run applications locally but keep their data files on the server.

Handle E-mail messages on behalf of network users, which may involve simply acting as a clearinghouse for a
Mail Server local exchange of messages. However, mail servers also commonly provide “store-and-forward” services, in
which the server holds incoming e-mail messages while waiting for users to access them.

Transmission Control Protocol / Internet Protocol (TCP/IP) protocol the one used on the internet. Windows
Web Server New Technology (WinNT) & Windows 2000 (Win 2K) server include web server called internet information
server (IIS). Netware and Linux are also built specifically to deliver such capabilities and services.

Selecting the right type of Network


Given the limitations inherent in Peer-to-Peer networking, there are several easy methods to decide what type of network is right for a
given set of circumstances. It is appropriate to choose Peer to Peer networking exclusively only when all of the following conditions hold:
 The network includes no more than 10 users (preferably no more than 5).
 All networked machines are close enough to fit with in the span of a single LAN.
 Budget considerations are paramount
 No specialized servers are needed.

On the other hand, if a server-based network is already in use, adding groups that also use Peer-to-Peer capabilities is acceptable as
long as none of those groups exceeds 10 users. A server-based network, by contrast, makes sense when one or more of the following conditions
are true:
 More than 10 users must share network access.
 Centralized control, security, resource management, or back up is desirable.
 Users need access to specialized servers, or place heavy demands for network resources.
 An internetwork (more than one LAN) is in use, or WAN access is required.

Figure 1e. Router and Internet Connection

Network Management Overview


Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
and provisioning of networked systems. Network management is essential to command and control practices and is generally carried out of a
network operations center.
 Operation deals with keeping the network (and the services that the network provides) up and running smoothly. It includes
monitoring the network to spot problems as soon as possible, ideally before users are affected.
 Administration deals with keeping track of resources in the network and how they are assigned. It includes all the "housekeeping"
that is necessary to keep the network under control.
 Maintenance is concerned with performing repairs and upgrades – for example, when equipment must be replaced, when a router
needs a patch for an operating system image, when a new switch is added to a network. Maintenance also involves corrective and
preventive measures to make the managed network run "better", such as adjusting device configuration parameters.
 Provisioning is concerned with configuring resources in the network to support a given service. For example, this might include
setting up the network so that a new customer can receive voice service.
A common way of characterizing network management functions is FCAPS – Fault, Configuration, Accounting, Performance and
Security.
Functions that are performed as part of network management accordingly include controlling, planning, allocating, deploying,
coordinating, and monitoring the resources of a network, network planning, frequency allocation, predetermined traffic routing to support load
balancing, cryptographic key distribution authorization, configuration management, fault management, security management, performance
management, bandwidth management, Route analytics and accounting management.
Data for network management is collected through several mechanisms, including agents installed on infrastructure, synthetic monitoring
that simulates transactions, logs of activity, sniffers and real user monitoring. In the past network management mainly consisted of monitoring
whether devices were up or down; today performance management has become a crucial part of the IT team's role which brings about a host of
challenges – especially for global organizations.

Note: Network management does not include user terminal equipment.

Prepared by: Mr. Jeffrey A. Diaz GrrV1.7-2020 Innovative Computer Organization for New Society
Lesson 01 – Networking Overview
Technologies and Solutions
A large number of access methods exist to support network and network device management. Access methods include the SNMP,
command-line interface (CLIs), custom XML, CMIP, Windows Management Instrumentation (WMI), Transaction Language 1, CORBA, NETCONF,
and the Java Management Extensions (JMX). Schemas include the WBEM, the Common Information Model, and MTOSI amongst others.

Medical Service Providers provide a niche marketing utility for managed service providers; as HIPAA legislation consistently increases
demands for knowledgeable providers. Medical Service Providers are liable for the protection of their clients’ confidential information, including in an
electronic realm. This liability creates a significant need for managed service providers who can provide secure infrastructure for transportation of
medical data.
Network management refers to the broad subject of managing computer networks. There exists a wide variety of software and hardware
products that help network system administrators manage a network. Network management covers a wide area, including:
 Security = Ensuring that the network is protected from unauthorized users.
 Performance = Eliminating bottlenecks in the network.
 Reliability = Making sure the network is available to users and responding to hardware and software malfunctions.

What is Network?
A group of computers or other devices, such as printers and scanners, that communicates either wirelessly or by using a physical
connection, such as an Ethernet cable or a phone line.

Creating a Network
A network can be any size. For example, a small business can create a network by connecting as low as two computers for sharing files.
A network can also connect millions of computers to exchange information all over the world. The world’s largest network is the Internet.

Logging On
Network users are usually required to identify themselves before they can gain access to the information on a network. This is known as
logging on. Each user must enter a personalized login name and password to access a network. By keeping the information secret, users can
prevent unauthorized people from accessing the network.

NETWORK FORMAT

Sneakernet
Before networks, people used floppy disks to exchange information between computers. This method of exchanging information is known
as a sneakernet. Sneakernet is slower and less reliable than a computer network. A computer network eliminates the need for sneakernet.

Permanent Networks
Most companies use a permanent network to transfer information. Most permanent networks use cables to link computers together. The
computers and cables on a permanent network stay connected and in place at all times.

Temporary Networks
A temporary network is a network connection that is established for a brief time and then disconnected. The most common type of
temporary network occurs when an employee connects a computer at home to a computer at work using a modem.

NETWORK ADVANTAGES

Sharing Information
You can use a network to exchange information with other people. Information can be any form of data, such as a document created in a
word processing program or information provided by a database.

Sharing Resources
Computer connected to a network can share equipment and devices, called resources. The ability to share resources reduces the cost of
buying computer hardware. For example, instead of having to buy a printer for each person on a network, everyone can share one central printer.

Sharing Programs
Networks also allow people to access a copy of a program stored on a central computer, such a spreadsheet or word processing
program. Individuals can use their own computers to access and run the programs. By sharing programs, a company can avoid having to install a
copy of the program on each person’s computer.

Working Together
Before computer networks, many companies used one large, expensive computer to perform complex tasks. Now most companies use a
network with several smaller computers. The computers on a network are less expensive and make it easier to complete complicated tasks.
For example, multiple computers can be set up to help keep track of sales. One computer can process orders, another computer can
keep track of inventory and the last can arrange for delivery.

Communication
Networks allow people to communicate and exchange messages with each other easily and efficiently. Communicating with the other
people on a network is especially useful when people are working together on the same project. Messages are often delivered within seconds of
being sent.
Using a network also makes it possible to hold meetings with people in another office or even on the other side of the world.

Prepared by: Mr. Jeffrey A. Diaz GrrV1.7-2020 Innovative Computer Organization for New Society
Lesson 01 – Networking Overview
TYPES OF NETWORKS

There are many different types of networks used by businesses and organizations. Since each business and organization has its own
needs, each network is unique.

Network Size
The size of a network can often determine which type of network a business or organization should use. Different sized networks transmit
data in different ways.
For example, a network with over 1,000 users is organized differently and requires a variety of components not found on a network with
only five users.

Network Cost
The size and type of a network determine its cost. The larger the network, the more costly the network is to build, set up and maintain. In
addition to needing extra hardware and cables, a large network also requires specialized cabling and computers to link users and devices that are
far apart.

Local Area Networks


A Local Area Networks (LAN) is the most common type of network found in businesses. Local area networks connect computers and
devices located close to each other, such as in one building. Usually, local area networks connect no more than 100 computers.

Metropolitan Area Networks


A Metropolitan Area Network (MAN) is a collection of local area networks. Metropolitan area networks connect computers located in the
same geographic area, such as a city or town.

Wide Area Networks


A Wide Area Networks (WAN) connects local and metropolitan area networks together. The networks that make up a wide area network
may be located throughout a country or even around the world. When a single company owns and controls a wide area network, the WAN is often
referred to as an enterprise network.

NETWORK HARDWARE

Network hardware includes the physical components that make up a network. All networks require special network hardware.

Computers
The most important job of a network is to link computers together. When computers are linked, the people using the computers can work
more efficiently. Computers connected to a network do not have to be the same type. Many networks contain different types of computers.

Resources
A network resource is any device computers on a network can use. The most common type of resource is a printer. All of the people on a
network can send documents to a printer that is connected to the network.

Connectors
A connector is any device that joins two networks together. When two networks are connected, all the computers on both networks can
exchange information. The most common type of connector is called a bridge.

Network Interface Cards


A Network Interface Card (NIC) is a device that joins a cable to a computer. Most network interface cards are installed inside a computer.
The edge of the card can be seen at the back of the computer. An NIC has a port where the network cable plugs in.

Networking Cable
Cable is the oldest and most commonly used type of transmission medium. Cable usually consists of copper wires covered with a
protective plastic coating. Cable is inexpensive compared other types of transmission media. Networking cables are used to connect one network
device to other networking devices or to connect two or more computers to share printer, scanner etc. Many different kinds of cables can be used,
depending on the type and size of the network. The type of cable used often determines how quickly information will transfer through the network.
For some networks, many miles of cable may be required. Different types of cables are Coaxial cable, Optical fiber cable, Twisted Pair cables are
used depending on the network’s topology, protocol and size.
 Coaxial Cable = Coaxial cable is one of the most common types of transmission media used create networks. Coaxial cable has a
core of solid copper wire surrounded by a layer of plastic. An outer layer of metal mesh of foil surrounds the plastic layer. The entire
cable is then covered in a protective plastic coating. Coaxial cable must be linked using devices called British Naval Connectors
(BNC). A BNC connector that links a computer or other device to a coaxial cable is called a T connector. Coaxial cable is rated using
an RG number. The most common types of coaxial cable are RG-11, RG-58 and RG-62.
 Optical Fiber
o Single-mode fiber (SMF) uses a narrow core (less than 10 microns in diameter) through which light generated by a laser
travels over one path, reflecting very little. Because it reflects little, the light does not disperse as the signal travels along the
fiber. This continuity allows single-mode fiber to accommodate the highest bandwidths and longest distances (without requiring
repeaters) of all network transmission media. Single-mode fiber may be used to connect a carrier’s two facilities. However, it
costs too much to be considered for use on typical LANs and WANs.
o Multimode Fiber (MMF) contains a core with a large diameter than single-mode fiber (between 50 and 115 microns in
diameter; the most common size is 62.5 microns) over which many pulses of light generated by a laser or LED travel at
different angles. It is commonly found on cables that connect a router to a switch or a server on the backbone of a network.
 Unshielded Twisted Pair = Unshielded Twisted Pair (UTP) cable is the most popular type of cable used to build new networks.
Unshielded twisted pair cable has a pair of copper wires that are twisted around each other. By twisting the wires around each other,
the cable is less prone to interference from other electrical signals, such as the signals emitted by photocopiers or other nearby
electrical equipment. There are commonly 2, 4, 6 or 8 wires in an unshielded twisted pair cable. Each wire in an unshielded twisted
pair cable is usually a different color. The entire cable is covered in a protective plastic coating.

Prepared by: Mr. Jeffrey A. Diaz GrrV1.7-2020 Innovative Computer Organization for New Society
Lesson 01 – Networking Overview
 Shielded Twisted Pair Cable = Shielded Twisted Pair (STP) cable is similar to unshielded twisted pair cable, except that it includes
a protective metal or foil covering. A shielded twisted pair cable can contain a single pair of wires or several pairs of wires. Twisted
pair cables are often shielded in an attempt to prevent electromagnetic interference. Because the shielding is made of metal, it may
also serve as a ground. Usually a shielded or a screened twisted pair cable has a special grounding wire added called a drain wire
which is electrically connected to the shield or screen. The drain wire simplifies connection to ground at the connectors. This
shielding can be applied to individual pairs, or to the collection of pairs. When shielding is applied to the collection of pairs, this is
referred to as screening. Shielding provides an electric conductive barrier to attenuate electromagnetic waves external to the shield
and provides conduction path by which induced currents can be circulated and returned to the source, via ground reference
connection.

Table 1.6 Types of Network Cable and Uses


Straight-through Cable Crossover Cable Rollover Cable
Hub
ADSL ADSL Patch Patch Computer
Computer (Uplink) to
Modem to Modem to Panel to Panel to to Cisco Proprietary Router
to Modem Hub
Computer Router Hub Switch Computer
(Uplink)
Computer Computer Computer Computer Computer Modem to Modem to
to Hub to Modem to Router to Switch to Router Router Switch Workstation to Console port on a Router
Modem to Modem to Modem to Router to Router to Switch to
Hub to Hub
Hub Router Switch Computer Hub Switch
Router to Router to Router to Switch to Router to Router to Router to Workstation to Console port on a Switch
Hub Router Switch Switch Modem Router Switch

SUMMARY
Network management is a broad range of functions including activities, methods, procedures and the use of tools to administrate,
operate, and reliably maintain computer network systems. Strictly speaking, Network Management does not include terminal equipment (PCs,
workstations, printers, etc.). Rather, it concerns the reliability, efficiency and capacity/capabilities of data transfer channels.
 Network Administration = This involves tracking and inventorying the many network resources such as monitoring transmission lines,
hubs, switches, routers, and servers; it also involves monitoring their performance and updating their associated software –
especially network management software, network operating systems, and distributed software applications used by network users.
 Network Operation = This involves smooth network functioning as designed and intended, including close monitoring of activities to
quickly and efficiently address and fix problems as they occur and preferably even before users are aware of the problem.
 Network Maintenance = This involves timely repair and necessary upgrades to all network resources as well as preventive and
corrective measures through close communication and collaboration with network administrators. Example work includes replacing
or upgrading network equipment such as switches, routers and damaged transmission lines.
 Network Provisioning = This involves configuring network resources to support the requirements of a particular service; example
services may be voice capabilities or increasing broadband requirements to facilitate more users.
The medium used to transmit information limits the speed of the network, the effective distance between computers, and the network
topology. Copper wires and coaxial cable provide transmission speeds of a few thousand bits per second for long distances and about 100 million
bits per second for short distances. (A million bits is equal to one megabit, and one megabit per second is abbreviated Mbps.) Optical fibers carry
100 million to 40 billion bits of information per second over long distances. (A billion bits is equal to one gigabit, and a billion bits per second is
abbreviated Gbps.)

Networking Cables
Networking Cables are used to connect one network device to other network devices or to connect two or more computers to share
printer, scanner, etc. Different types of network cable like Coaxial cable, Optical fiber cable, Twister Pair cables are used depending on the
network’s topology, protocol and size.

For more information:


 Beal, V. (2020). Network Management. Retrieved from Webopedia.com: https://www.webopedia.com/TERM/N/network_management.html
 Janssen, C. (2017, January 19). Network Management. Retrieved from Technopedia: https://www.techopedia.com/definition/20974/network-
management
 Maran, R., Maran, R., Maran, J., Maran, R., Maran, S., Maran, J., & Maran, M. (1997). Teach Yourself Networking VISUALLY™. Mississauga,
Ontario, Canada: IDG Books Worldwide, Inc.
 Microsoft Student 2009 DVD. (1993-2008). (16.0.0.1117). Redmond, WA, United States of America.
 Network management. (2020, September 15). Retrieved from Wikipedia, the free encyclopedia:
https://en.wikipedia.org/wiki/Network_management
 Odom, W. (2013). Introduction to Networking. United States of America: Pearson Education, Inc.

Prepared by: Mr. Jeffrey A. Diaz GrrV1.7-2020 Innovative Computer Organization for New Society

You might also like