You are on page 1of 46

PLAN AND PREPARE MAINTENANCE PROCEDURES

Planning and preparing systematic maintenance procedure will save time,


money and frustration. It is a good idea and opportunity to learn the proper care and
maintenance of your computer.
PC maintenance is an important topic for anyone who owns a PC.
Looking after your PC properly ensures you of trouble-free use. Regular PC
maintenance also keeps the machine’s performance optimal.

A. Plan Maintenance Procedures for Computer System and Networking.

1. Design a systematic maintenance plan for hardware.


 Monitoring, evaluating and updating plan.
 Place your computer in a well-ventilated area
 Schedule use of computers for its longer life.
 Move computers only when it is turned off and unplugged.
 Treat your computer properly.
 Maintain your hard disk

2. Design a systematic maintenance plan for your software.


 Backup your files
 Install or secure passwords
 Delete temporary files
 Update antivirus and spy ware

MAINTENANCE PROGRAM DEFINITION OF TERMS

Maintenance Program- is a comprehensive list of maintenance and its incidents.


This would include all maintenance activities to be undertaken, manpower needed,
maintenance methods to be used, all the materials and supplies needed for the
maintenance and cost involved in the maintenance.

Maintenance Schedule- Is a list allocating specific maintenance of an area,


equipment and tools to a specific period. The maintenance schedule is just a part of
the maintenance program.

Quality management- is a method for ensuring that all the activities necessary to
design, develop and implement a product or service are effective with respect to the
system and its performance.

What can we gain from maintaining our facilities?

 Ensured SAFE environment


 Improve MORALE of human resources
 Reduced operational COST
 Increased PRODUCTION
 Prolonged LIFE facilities
 Prompt DELIVERY of services/ product
How to maintain?

The question on how do we implement the maintenance program will center on the 5Ms are
as follows:

 Manpower
 Money (Financial Resources)
 Methods and System
 Machines (Facilities)
 Materials and Supplies
Sample Equipment Maintenance Schedule for computer in practical work area

SAMPLE TEMPLATE NO. 1 EQUIPMENT MAINTENANCE SCHEDULE

EQUIPMENT TYPE Personal Computer

EQUIPMENT CODE PC 1

LOCATION Practical Work Area

Schedule for the Month of ____________ 201__

ACTIVITIES MANPOWER
Daily Every Weekly Every Monthly Remarks
Other 15th
Day Day
1. Clean x
PC Trainer/utility/trainees
2. Check
Hardisk Trainer/utility x
3. Check
power source Trainer x
and lines

SAMPLE EQUIPMENT INSPECTION CHECKLIST

This checklist will confirm if the maintenance activities have been performed in order to prolong the
life of this particular equipment.

Sample Template No. 2 : MAINTENANCE INSPECTION CHECKLIST

Equipment Type : PERSONAL COMPUTER


Property Code :
Number : pc1
Location : Practical Work Area

YES NO INSPECTION ITEMS


√ 1. Is the PC turned off after use?
√ 2. Are internal parts check for damage?
√ 3. Are terminals, connections check for loose?
√ 4. Is the PC regularly cleaned?
√ 5. Is the PC used properly according to
manufacturers spec?
SAFETY MEASURES IN MAINTAINING COMPUTER SYSTEMS

Computers are expensive, and with all major purchases you probably want to protect your
investment. Luckily, it is not difficult to keep your computer healthy and in good working order.
Maintaining a computer involves three things: keeping it physically clean, protecting it from
malware, and backing up important files.

Computer Safety Measures

• Anti-virus software is your computer's best defense against malware (e.g., viruses, Trojan horses,
worms, spyware) – install and update anti-virus software on your computer and regularly scan your
computer to make sure it is free from malware

• Download the latest system and application updates for your computer, which may include important
security patches

• Make sure that the security tools on your computer are up to date, and select the automatic update
option if possible

• Do not access the Internet without first enabling an updated firewall, especially when using
DSL or a cable modem

• If your security software has identified malware on your computer, you need to remove it and then
change your Online Banking password

• Avoid clicking attachments or links in unsolicited email messages, doing so could lead to the
installation of malware on to your computer

• For your security, always type the Internet address (e.g., www.key.com) directly into your browser

• Always sign out and close your browser after using a secure website

• When your computer is not in use, consider shutting it down or disconnecting it from the Internet

SELF CHECK CO4.2-1


SAFETY MEASURES IN MAINTAINING COMPUTER SYSTEM

Write T if the answer is True and write F if the answer is False.


F 1. An antivirus adds Trojan horse, worms, and spywares on your system.

F 2. You don’t have to enable an updated firewall when accessing the internet especially when using
DSL or a cable modem

F 3. It is very difficult to maintain a computer healthy.


T 4. Avoid clicking attachments or links in unsolicited email messages
T 5. Always sign out and close your browser after using a secure website

Essential Questions
• What is hazard? risk?
• What are the types of workplace hazards?

• How to keep the computer laboratory safe?

• How to control hazards and risks in the workplace?

• What are the common hazards in the computer laboratory?

Occupational Health and Safety Procedures

Hazard Identification, Risk Assessment, and Risk Control

Occupational safety and health (OSH) are a planned system of working to prevent illness and injury
where you work by recognizing and identifying hazards and risks. Health and safety procedure is the
responsibility of all persons in the computer and technology industries. You must identify the hazards
where you are working and decide how dangerous they are. Eliminate the hazard or modify the risk
that it presents.

There are three steps used to manage health and safety at work:

1. Spot the Hazard (Hazard Identification)

2. Assess the Risk (Risk Assessment)

3. Make the Changes (Risk Control)

At work you can use these three Think Safe steps to help prevent accidents

1. Spot the Hazard

Key Point

A hazard is anything that could hurt you or someone else.

Examples of workplace hazards include:

*frayed electrical cords (could result in electrical shock)

*boxes stacked precariously (they could fall on someone)

*noisy machinery (could result in damage to your hearing)

During work experience, you must remain alert to anything that may be dangerous. If you

see, hear or smell anything odd, take note. If you think it could be a hazard, tell someone.

2. Assess the Risk

Key Point

Assessing the risk means working out how likely it is that a hazard will harm someone and how
serious the harm could be.

Whenever you spot a hazard, assess the risk by asking yourself two questions:
* How likely is it that the hazard could harm me or someone else?

* How badly could I or someone else be harmed?

Always tell someone (your employer, your supervisor or your health and safety representative) about
hazards you can't fix yourself, especially if the hazard could cause serious harm to anyone.

For example:

*Ask your supervisor for instructions and training before using equipment.

* Ask for help moving or lifting heavy objects.

* Tell your supervisor if you think a work practice could be dangerous.

If you are not sure of the safest way to do something during work experience, always ask

your work experience supervisor.

3. Make the Changes

Key Point

It is your employer's responsibility to fix hazards. Sometimes you may be able to fix simple

hazards yourself, as long as you don't put yourself or others at risk. For example, you can

pick up things from the floor and put them away to eliminate a trip hazard.

Common hazards encountered by computer technicians and users

A hazard is a situation in the workplace that has the potential to harm the health and safety of people
or to damage plant and equipment. The situation could involve a task, chemical or equipment used.

Hazard management is a continuous process that can be used to improve the health and safety of
all workplaces.

What is the difference between a 'hazard' and a ‘risk ‘?

• A risk is the chance, high or low, that any hazard will actually cause somebody harm

• A hazard is something that can cause harm, e.g. electricity, chemicals, working up a ladder,
noise, a keyboard, a bully at work, stress, etc.
Common hazards encountered by computer technicians and users

Physical Hazard- it is factor or circumstance that can cause harm with contact

Cables running across the floor.

If someone trips, falls, and hurts himself because of a cable you ran across the floor, someone (you,
your employer, or your customer) has a serious legal negligence problem. If you need to temporarily
run a cable across the floor, place a Danger sign similar to those "wet floor" signs used by cleaning
services. For cables that are temporary but will need to run across the floor for a longer period of
time, use "gaffers’ tape". Gaffers tape is a heavy tape with strong adhesive to stick to the floor. It
comes in a wide range of colors, from matte black to hazard warning red. Although it has strong
adhesive, it can be removed easily and cleanly. For long term cable routing there is a wide variety of
cable organizing devices like cable ties, cable wraps, and cable raceways which can be used to run
cable safely along the wall or ceiling.

Other common physical hazards include leaving tools on top of ladders and placing electronic
equipment in precarious positions or on support that is not sturdy enough or not designed for holding
electronic equipment.

Mechanical Hazard- it is result of either powered or manual (human) use of tools, equipment
or machinery and plant.

When working on electronic equipment, ask yourself "Is there any way this equipment could hurt me?
‖. You might stick your hand in a printer and suddenly the paper feed arm moves, feeding not only
paper through the printer, but a piece of your finger too.

You might move your hand past a computer chassis and lose a chunk of flesh because it is razor
sharp. When working on electronic equipment always be alert to any possibility of being hurt by
moving parts, hot components, or sharp edges.

Chemical Hazard- is a type of occupational hazard caused by exposure to chemicals in the


workplace.

There is a wide array of chemicals used with electronic equipment. There are display cleaning
chemicals, keyboard cleaning chemicals, compressed gas dirt and dust removers, and many cleaning
solvents. Some of these chemicals can be harmful if accidentally swallowed, get on bare skin, or get
in eyes. Before using any chemicals for electronic equipment always read the warnings and
instructions on the label. Also be very careful when dealing with inkjet printer cartridges, or lase
printer toner cartridges. Ink and toner can stain skin, clothing, and carpet.

Electric Shock Hazard- It occurs when there is a voltage difference that a person may come into
contact with.

Inside computers and electronic equipment, there is a range of voltages from 3.3 volts to 25 volts,
most of these are harmless. But at the power supply, you'll find line voltage, which is a lethal 220
volts.

Most of the time while working inside computers and electronic equipment, you'll want them
unplugged from the wall socket. If you need to work on equipment while it is still plugged in or
powered up, remove all jewelry and wrist watches. If you must work inside a line power distribution
box, wear an electrician’s rubber insulated

gloves and safety glasses. You might think you don't need these safety devices because you are
going to be extra careful, but one little slip could cause a flaming explosion that could take off your
hand, embed shrapnel in your eyes, or conduct electricity through your heart, where it takes only 10
milliamps (0.01) to kill a human.

Definition of Terms

Chemical hazard- any hazard that results from the accident caused by toxic chemical.

Desktop computer- is a personal computer (PC) in a form intended for stationary use.

Electric shock- characterized by pain and muscular spasm cause by an electric current.

Elimination- the process of removing the hazard from the workplace.

Ergonomics- the science of designing the workplace environment to fit the user.

Hazard- a situation that has the potential to harm the health and safety of people.

Hazard control- the development of systems to prevent accidents or injuries.

Health- The general condition of a person in all aspects.

Housekeeping- is the systematic process of making a home neat and clean and in order.

Risk A potential condition that a chosen action or activity causes.

Risk management- the process of analyzing exposure to risk and managing it.

Safety- The state of being "safe".

Standards -Something accepted as a basis for comparison.

Tree structure- an algorithm for placing and locating files in an organized database.

How to Clean the Inside of a Computer

1. Gather the tools you need.  You need compressed air and a screwdriver. A small vacuum might
clean up the mess you make around the computer, but should never be used inside it. A dust mask
is suggested because it can save you a bit of sneezing if you need to clean a computer quickly.
2. Shut down and unplug your computer

3. Disconnect the LAN cable and all peripherals, such as monitors, scanners, printers,
keyboards, mice and speakers.

4. Move to a suitable work area. If you haven't cleaned your computer in a while, a suitable work
area is suggested. While you can clean your computer where it sits, it is not recommended. The job
can be very messy and you'll want to work somewhere where you can adequately ventilate dust.

5. Open your computer. Once you have a suitable work area, open your computer. This will vary
greatly depending on your machine. If you have a user's manual, consulting it would be a good idea.
Most machines have screws holding a side panel down. After removing these, you can then slip the
side off your machine.
6. Prepare to clean.  After opening the computer, use compressed air. Additionally, you might want
to wear a dust mask. Never touch the inside of your computer unless it is absolutely necessary. You
may discharge a static shock to vital internal components (such as CPU and RAM) and damage
them. If you must touch the inside of your machine, discharge any static by tapping your finger to the
computer's metal case before unplugging it.

7. Begin dusting. Use your compressed air to blow out the inside of your machine. It is usually a
good idea to start on the upper region of the computer, then work your way down. In this manner you
can sweep out all the dust that settles on lower components in one run. Do not worry if you cause the
blades of internal fans to spin. This is expected and it is important to keep these components clean.
Be thorough, but do not press on cords or components. Also keep your air source a moderate
distance from the component you're working on

8. Make sure the heatsink fan is clean. The heat sink sits over the processor, and it is a collection
of metal ridges that stick up away from the motherboard. If this fan does not function properly, the
processor will overheat, resulting in degraded performance or permanent damage.
9. Look around the entire inside and outside for any dust you may have missed. Once you are
sure it is cleaned thoroughly, carefully replace the sides. Do not try to force them into place.

10. Clean up your work space. The initial run will churn up a lot of particulates. Depending on your
workspace, you may need to get a small vacuum and clean the area around the computer. Do not
use a vacuum on the inside of the computer. You might want to consider leaving your machine open
while you do this. Airborne dust inside the computer will begin to settle and you can make your effort
exceptionally productive if you make a second run.

11. Close your computer. After you've finished dusting, replace the side of your machine and any
screws. Once the machine is tightly shut, return it to its usual spot and reattach the power cord and
other cables. (You might consider cleaning this entire area to remove excess materials that can
contribute to dust intake.) If you flipped the master power switch on the back of your machine off, be
sure to turn it on again or your machine will not start. A clean computer will run significantly cooler
and last much longer than a computer clogged up with dust and debris.

9. Look around the entire inside and outside for any dust you may have missed. Once you are
sure it is cleaned thoroughly, carefully replace the sides. Do not try to force them into place
HOW TO OPEN A COMPUTER

Opening a desktop computer for the first time is a little confusing. With the help of a friend who knows
how to operate the desktop computer you can be guided properly on how to open it. If there is no one
to ask for help, this step by step guide will help you open the computer properly.
Ad

1. Make sure all the cords of the monitor, System Unit, keyboard, and mouse are connected in
the right places.

2. Plug the power cords of the monitor and System Unit to the AVR.

3. Plug the AVR cord to an outlet.

4. Switch on the AVR. You will see a red-light button after you switch on the AVR.
5. Switch on the computer.

6. Switch on the monitor.

7. Depending on the configuration of the machine, a username and password may be


requested; otherwise, the Operating System may be loaded directly to display the desktop to
the user.
8. The proper way to shut down or turn off the computer system is by clicking on the 'Start'
button and choosing the 'Turn Off Computer' option. This will display the options to 'Standby',
'Restart', or 'Turn Off' the machine.

NETWORK CABLING CONFIGURATION

UTP Cable
A UTP cable (category 5) is one of the most popular LAN cables. This cable consists of 4 twisted pairs of metal
wires (that means there are 8 wires in the cable). Adding RJ45 connectors at both ends of the UTP cable it
becomes a LAN cable they usually use. Preparation
You need a UTP Cable, Crimping Tool, RJ45, and Cutter
Making Cable
Follow the steps below:

1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-side).
2. Arrange the metal wires in parallel (refer the each section's wire arrangement table). Don't remove the
shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable. (Any cable in this page is
directionless --- that means you can set either end of the cable to either device.)

How to see the wire arrangement


Take the UTP cable with your left hand and a RJ45 connector with your right hand. Hold the RJ45
connector in the way you can see the contact metal face of the RJ45 connector.

The tables below are for the case where the UTP cable consists of green/green-white, orange/orange-
white, blue/blue-white, brown/brown-white twisted pairs.

10 Base T / 100 Base T Straight


10BaseT and 100BaseT are most common mode of LAN. You can use UTP category-5 cable for both mode.
(You can use UTP category-3 cable for 10BaseT, in which there are only 3 wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it to connect 2 hubs in the case one
of the hubs has an uplink port (and you use normal port on the other hub).
Pin ID side A side B
1 orange- orange-
white white
2 orange orange
3 green- green-
white white
10 Base T / 100 Base T Cross 4 blue blue
5 blue- blue-
A cross cable for white white 10BaseT and 100BaseT is used to connect
2 computers directly (with 6 green green ONLY the UTP cable). It is also used
when you connect 2 hubs with 7 brown- brown- a normal port on both hubs. (In other
white white
words, the cross cable is used relatively in a rare case.)
8 brown brown
Pin ID side A side B
1 orange green-
-white white
2 orange green
3 green- orange
white -white
4 blue blue
5 blue- blue-
white white
6 green orange
7 brown brown
-white -white
8 brown brown

Configure Computer Network

How to Configure a Static IP Address in Windows 7

Sometimes in order to gain connectivity in certain networks where a DHCP server is not running, the
configuration of a static IP address is required.

The steps required to setup up a static IP address are rather straightforward, but the process is a bit
different from Windows Vista and XP.

Let’s go through the steps now and configure a static IPv4 address in Windows 7.
Static IPv4 Configuration in Windows 7

The first thing that must be done is to gain access to the


Network and Sharing Center in Windows 7. This can be
done in one of two ways; the first way to access it is via the
control panel.

Select the Windows 7 or on the bottom left-hand corner


and select the control panel option as shown below:

There are several views which are available for the control panel;
by default, the category view is used. When using the category view
the option that you need to select is called View network status
and Tasks, as highlighted below. This will bring you to the Network
and Sharing Center.

The second way to gain access to the Network and


Sharing Center is to utilize the network icon which is
displayed in the system tray when a network
interface has been enabled.

When this icon is right-clicked the option to open


the Network and Sharing Center is given as shown
below:

Once the Network and Sharing Center is open there is an option which allows the change of adapter settings
which is shown in the upper left hand corner of the window. This is shown highlighted in the following figure
(click on the image to enlarge):
Once in the Network Connections window, an interface must be selected which is going to be configured
with the static IP address. In the following example, both a wired and wireless interface is shown as
examples.

For the purposes of this article the wired interface will be used as the interface being given a static IP
Address.

By right-clicking on the correct interface a sub-menu is shown; from this menu select the properties option.

Once the properties option is selected the


interface properties windows will be
displayed. This screen gives the option to
configure a number of different network
parameters.

Since we want to change the interface IPv4


IP address this option must be selected
from the window. Once this option is
selected the properties button will be
enabled; press the properties button.

Once the properties button is pressed the IPv4 properties window is displayed which shows that the
interface is currently configured to obtain both its IP address and its DNS server information
automatically.
In order to change to a static IP address the option to Use the
following IP address must be selected; once this is done the
option to enter the IP address parameters is enabled and the Use
the following DNS server addresses option is selected.

For the purpose of this article the IP address


192.168.1.100 is used with a subnet mask of
255.255.255.0 and a default gateway of 192.168.1.1. The DNS server which will be configured is 4.2.2.2.

Once these options have been entered on the


screen simply press Ok on both property screens
and the configuration of a static IP is complete.

The knowledge of static IP configuration is vital in


modern organizational environments as many do
not completely utilize automatic IP assignment; it is also vital knowledge when trying to troubleshoot
IPv4.
TYPES OF NETWORK

Personal Area Network (PAN)

• A personal area network (PAN) is a computer network used for communication among computer
devices close to one person. Some examples of devices that may be used in a PAN are printers, fax
machines, telephones, PDA’s or scanners. The reach of a PAN is typically within about 20-30 feet
(approximately 6-9 meters).

• Personal area networks may be wired with computer buses such as and FireWire. A wireless
personal area network (WPAN) can also be made possible with network technologies such as
Bluetooth. USB]

Local Area Network (LAN)

• A network covering a small geographic area, like a home, office, or building. Current LANs are most
likely to be based on Ethernet technology. For example, a library will have a wired or wireless LAN for
users to interconnect local devices (e.g., printers and servers) and to connect to the internet.

Local Area Network (LAN)

• All of the PCs in the library are connected by category 5 (Cat5) cable, running the IEEE 802.3
protocol through a system of interconnection devices and eventually connect to the internet. The
cables to the servers are on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 GB/s.

Client/Server vs Peer to Peer Network

Although every computer on a LAN is connected to every other, they do not necessarily mean all
communicate with each other. There are two basic types of LAN, based on communication patterns
between the machines, called client/server networks and peer-to-peer networks

Client/Server Networks

Every computer has a distinct role, that of either a client or a server. A server is designed to share its
resources among client computers on the network. The Client/Server is composed of:

Servers

Clients
Servers

 These are located in secured areas, such as locked closets and data centers, because they hold
the organization's most valuable data and do not have the accessed by operators on a continuous
basis.

 The server runs a special network operating system such as: Windows NT Server, Windows 2000
or Novell Netware.

Clients

The rest of the computers on the network functions as client. A client standard PC that is running an
operating system such as DOS or Windows.

Peer-to-Peer Network

In a peer-to-peer network, every computer is equal and can communicate with other computer on a
network to which it has been granted access rights. Essentially, every computer in this network
functions as both server and client. Peer-to-peer network can be as small as two computers as many
as hundreds of units.

There is no theoretical limit to the size of a peer-to-peer network, performance drops significantly and
security becomes a major headache on peer -based network with more than 10 computers.

Also, Microsoft imposes a 10-station limit on computers running Windows 2000 Professional who are
sharing resources with other system. For this reason, it is better you switch to a client/server network
when your network climbs to 10 stations.

Example of Peer-to-Peer Network

CAMPUS AREA NETWORK (CAN)

A network that connects two or more LANs but that is limited to a specific and contiguous
geographical area such as a college campus, industrial complex, or a military base.

A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to an
area that is smaller than a typical MAN.

CAMPUS AREA NETWORK (CAN)

This term is most often used to discuss the implementation of networks for a

Contiguous area. This should not be confused with a Controller Area

Network.

Metropolitan Area Network (MAN)


•A Metropolitan Area Network is a network that connects two or more Local Area Networks or
Campus Area Networks together but does not extend beyond the boundaries of the immediate town,
city, or metropolitan area. Multiple routers, switches & hubs are connected to create a MAN.

Example of Metropolitan Area Network

Global Area Network (GAN)

• Global area networks (GAN) specifications are in development by several groups, and there is no
common definition. In general, however, a GAN is a model for supporting mobile communications
across an arbitrary number of wireless LANs, satellite coverage areas, etc.

Global Area Network (GAN)

•The key challenge in mobile communications is "handing off" the user communications from one
local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial Wireless
Local Area Network.

Example of Global Area Network (GAN)

Internet

•A specific internetwork, consisting of a worldwide interconnection of governmental, academic, public,


and private networks based upon the Advanced Research Projects Agency Network (ARPANET)
developed by ARPA of the U.S. Department of Defense – also home to the World Wide Web (WWW)
and referred to as the 'Internet' with a capital 'I' to distinguish it from other generic internetworks.

Internet

•Participants in the Internet, or their service providers, use IP Addressesobtained from address
registries that control assignments. Service providers and large enterprises also exchange
information on the reach ability of their address ranges through the Border Gateway Protocol (BGP).

Example of Metropolitan Area Network

Global Area Network (GAN)

•Global area networks (GAN) specifications are in development by several groups, and there is no
common definition. In general, however, a GAN is a model for supporting mobile communications
across an arbitrary number of wireless LANs, satellite coverage areas, etc.

Global Area Network (GAN)

•The key challenge in mobile communications is "handing off" the user communications from one
local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial Wireless
Local Area Network
NETWORK TOPOLOGY

WHAT IS A NETWORK COMPUTER?

A computer network is an interconnected group of computers.

In general, the term network can refer to any interconnected group or system. More specifically, a
network is any method of sharing information between two systems (human or mechanical).

BENEFITS OF SHARING INFORMATION VIA NETWORK

In addition to reducing hardware costs by sharing expensive printers and other peripherals among
multiple users, networks provide additional benefits to the users.

•Software and data files can be shared for access by multiple users

•Electronic mail or e-mail can be sent and received

•Collaboration features allow contributions by multiple users to a single document

•Remote-control programs can be used to troubleshoot problems or show new users how to perform
a task

SHARED HARDWARE COMPONENTS

Virtually, any storage or output device can be shared over a network, but the most common devices
to be used over a network include:

•Printers

•Disk drives

•CD-ROM and optical drives

•Modems

•Fax

•Tape backup units

NETWORK TOPOLOGY

 Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer
network. Essentially, it is the topological structure of a network, and may be depicted physically or
logically. Physical topology refers to the placement of the network’s various components, including
device location and cable installation, while logical topology shows how data flows within a network,
regardless of its physical design
TYPES OF NETWORK TOPOLOGY

BUS TOPOLOGY

 In local area networks where bus topology is used, each node is connected to a single cable. Each
computer or server is connected to the single bus cable. A

signal from the source travels in both directions to all machines connected on the bus cable until it
finds the intended recipient. If the machine address does not match the intended address for the data,
the machine ignores the data. Alternatively, if the data matches the machine address, the data is
accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement.
Terminators stop signals after reaching end of wire

Advantages-

 Relatively inexpensive to implement

 Easy to install and use.

 Cables are less used then star or ring topology.

Disadvantages-

 Disorder in any node may lead to failure of entire data transmission.

 It is difficult to add a new node to the structure.

STAR TOPOLOGY

In local area networks with a tar topology, each

network host is connected to a central hub with a point- to-point connection. In Star topology every
node (computer workstation or any other peripheral) is connected to central node called hub or
switch. The switch is the server and the peripherals are the clients. The network does not necessarily
have to resemble a star to be classified as a star network, but all of the nodes on the network must be
connected to one central device. All traffic that traverses the network passes through the central hub.
The hub acts as a signal repeater. The star topology is considered the easiest topology to design and
implement.

Advantages-

An advantage of the star topology is the simplicity of adding additional nodes.

Good option for modern networks

Low startup costs

Easy to maopportunities nage

Offers for expansion

Most popular topology in use; wide variety of equipment available

Disadvantages-

Hub is a single point of failure

Requires more cable than the bus


RING TOPOLOGY

A network topology that is set up in a circular fashion in which data travels around the ring in one
direction and each device on the ring acts as a repeater to keep the signal strong as it travels. Each
device incorporates a receiver for the incoming signal and a transmitter to send the data on to the
next device in the ring. The network is dependent on the ability of the signal to travel around the

ring. When a device sends data, it must travel through each device on the ring until it reaches its
destination. Every node is a critical link.

Advantages-

Easier to manage; easier to locate a defective node or cable problem

Handles high-volume network traffic

Enables reliable communication

Disadvantage-

Expensive

Requires more cable and network equipment at the start

 Not used as widely as bus topology

 Fewer equipment options

TREE TOPOLOGY

This particular type of network topology is based on a hierarchy of nodes. The highest level of any
tree network consists of a single, 'root' node, this node connected either a single (or, more commonly,
multiple) node(s) in the level below by (a) point-to-point link(s). These lower level nodes are also
connected to a single or multiple node in the next level down. Each node in the network has a
specific, fixed number of nodes connected to it at the next lower level in the hierarchy, this number
referred to as the ‘branching factor' of the tree

Advantages –

It is scalable. Secondary nodes allow more devices to be connected to a central node.

Point to point connection of devices.

Having different levels of the network makes it more manageable hence easier fault identification
and isolation.

Disadvantages-

Maintenance of the network may be an issue when the network spans a great area.

Since it is a variation of bus topology, if the backbone fails, the entire network is crippled.

MESH TOPOLOGY

It is also known as graph topology. In this topology each node is connected in another node
“Directly". So, there is a mesh in the network as there are so many wires that are connected to each
and every node.

Fully Connected- A fully connected network is a communication network in which each of the nodes
is connected to each other. A fully connected network doesn't need to use switching nor
broadcasting.

Partially Connected- The type of network topology in which some of the nodes of the network are
connected to more than one other node in the network with a point-to-point link.

NETWORK OPERATING SYSTEM

Network operating systems co-ordinate the activities of multiple computers across a network 
The two major types of network OS are:

Peer-to-peer

Client/server

PEER TO PEER NETWORK OS

In peer to peer network OS, there is no file server or central management source; all computers are
considered equal

Peer to peer networks are design primarily for small to medium LANS

AppleShare and Windows for Workgroups are examples of programs that can function as peer to
peer

CLIENT/SERVER NETWORK OS

Client/server network OS centralize functions and applications in one or more dedicated file servers.

The file server provides access to resources and provides security.

Novel Netware and Windows NT Server are examples of client/server network operating systems.
Performing Main Cable Installation
Glossary of Terms:

Core Competencies - are the specific skills and knowledge needed in a particular area of work - industry
sector/occupation/job role

Aerial Cable – suspended and attached on telephone pole for distribution purposes.

Communication Cable – is used for the distribution and small copper wires for voice and data signals Copper

cable -- Electric power cables made from twisted pair copper wire.

Environment - The area surrounding the work site which can be directly or indirectly affected by occurrences at
the work site. It includes the atmosphere, soils, drains, underground water tables, and the ecosystem. Protection
of the environment would require the proper disposal of waste materials, restriction of burning off, the correct
handling of toxic substances, the containment of CFCs and the like.

Hazardous Materials - Flammable gases and vapors and combustible dusts.

Pre-cautions - A measure taken in advance to avert possible evil or to secure good results

LIST OF TOOLS, MATERIALS and EQUIPMENT

POLYETHYLENE KNIFE OR SLITTING KNIFE is used for cutting polyethylene cable sheath so as to make
cable openings, also for cutting lead sheath.

TABBING SHEARS Used for cutting tabs in the ends of the polyethylene jacket to permit placement of bullet
bond clip
ELECTRICIAN SCISSORS Is a nickel plate finish tool used for stripping and cutting small wires.

TARPAULIN OR MANHOLE tent 10’ x 15’ lightweight or black with canvass, used on underground works
or trenches especially during inclement weather.

LEATHER TOOL POUCH - Used as side pouch of light tools such as a side cutters, pliers, screwdrivers etc. and
is supported by a leather belt.
AERIAL HANDLINE - Consist of 60 ft. of ½” rope. A one sleeve block, a ring spliced in one end of the rope
and a hook in the hand end, used on aerial cable work to raise and lower tools and materials.

7. CANVASS BUCKET OR TOOL BAG- used for conveniently transporting all necessary tools and equipment
used by cable splicer is mad of canvass materials and pocket on its sides for small tools.
Outside Plant Cable Types

COMMUNICATION CABLE Are small copper wires, properly insulated, twisted together placed in a casing to
provide communication channels.

1. AERIAL CABLE - Cable suspended in the air usually in utility poles.

2. BURIED CABLES A cable that is buried directly in the ground without being placed in under ground
conduits.

3. DISTRIBUTION CABLE A cable used for distribution of telephone service to subscribers.

4. EXCHANGE CABLE Used to provide service in the local area around an exchange.

5. 5. STUB CABLE A short length of cable attached at the factory to a set of terminal block, loading coil
case, and other apparatus.

6. 6. SWITCHBOARD - Used for connection central office equipment.

7. 7. TERMINATING CABLE - A multi-paired cable usually with thin conductors and always with fire
resistant insulator that is used primarily between the cable vault and the main distribution frames. 8.
TRUNKING CABLE Used to connect or link central offices.

CABLE TYPES ACCORDING TO CONDUCTOR INSULATION


1. PAPER INSULATED CABLE - Cable in which the conductors are insulated with paper ribbon either
spirally or longitudinally applied.

2. PLASTIC INSULATED CABLE - Cable wherein the conductors are insulated with plastic.

3. FOAM SKIN INSULATED CABLE - A cable is which the conductors are insulated directly with foam
skin
Installing Public Old Telephone System (POTS) Subscriber Line
Glossary of Terms:

Drop wire - Wire suitable for extending an open wire or cable pair from a pole or cable terminal to a building

Ground Rod - Ground rods can be made from steel with a copper clad surface. These are driven vertically into
the ground and bonded together with bare copper wire.

First class condition - is a simple logical connection between protasis and apodosis, simplified as good and
nothing to worry about.

Line wire - Two copper wires (tip and ring) for each telephone line run from a home or other small building to a
local telephone exchange.

Non-metallic construction - Minimizes potential wire abrasion and reduces the possibility of magnetic
interference with communication sign.

OSP(Outside Plant) - Refers to all of the physical cabling and supporting infrastructure (such as conduit,
cabinets, tower or poles), and any associated hardware (such as repeaters) located between a demarcation point
in a switching facility and a demarcation point in another switching center or customer premises.

Personal protective equipment (PPE) - Refers to protective clothing, helmets, goggles, or other garment or
equipment designed to protect the wearer's body from injury by blunt impacts, electrical hazards, heat, chemicals,
and infection, for job-related occupational safety and health purposes

Pre-cautions - A measure taken in advance to avert possible evil or to secure good results

LIST OF TOOLS AND MATERIALS


SCREWDRIVER Is used for driving screw available in many sizes, 6”, 12”

2) Tool 216 – B/C – Used for tightening /loosening of terminal covers and Protector nuts.
LONG NOSE PLIERS Have long slender jaws that are flat on the inside used for such purposes as gripping small
particles reaching places not accessible by hand.

DIAGONAL SIDE CUTTER Are equipped with cutting jaws that are cut at an angle of about 15 degrees used
for wire cutting and in general of any work of this type.

Bridle Ring reduces potential wire abrasion, minimizes magnetic interference to communication signals, and is
easier to install. The shape and flexibility of the improved bridle ring enable it to be opened wider than existing
metallic bridle rings, allowing easier insertion of wires. Non-metallic construction minimizes potential wire
abrasion and reduces the possibility of magnetic interference with communication sign

EXTENSION LADDER. Is on the most important cable splicers equipment made of fiber glass on a strap
attached on a messenger wire on a aerial operations and place on a pole when testing on terminals.
Hard Hat Protect worker from falling object or debris

Safety Belt and Strap Used to support workman while working ladders or any location when it affords safely
to the wearer and at the same time it allows freedom of the arms, hands and feet in the performance of the
required task.

Distribution Point or Cable TerminalsConventional Binding-Post Type Cable Terminals


Marconi Communications WP (formerly Reliable and Reltec) Marconi terminals can be identified with
its light green color metal housing.

Screw-Type Cable Terminals Schiederwerk Terminal Distribution Box from Alcatel

Schiederwerk terminals can be identified with its off-white color housing.


B. Ericsson Terminal Box
Ercisson terminals can be identified with its black color dome-type housing.
C. Sealed IDC (Insulation Displacement Connection) Cable Terminals
• Raychem DTerminator 1 terminals can be identified with its light gray color housing for the 10-pair type
and anodized aluminum housing for the 25-pair type.

D. Raychem D Terminator
2 terminals can be identified with its light gray color housing for the 10-pair type and anodized aluminum
housing for the 25-pair type
E. Marconi Insealator terminals can be identified with its light green color metal housing

LIST OF TOOLS AND MATERIALS


Dropwires – There are two types of dropwires used in PLDT SIM plant. These are:

Single-Pair #18 AWG Copper-Clad Steel Dropwire – The conductors of this dropwire is made of steel with
copper cladding. The jacket is made of polyethylene (PE) or polyvinyl chloride (PVC).

Single-Pair #22 AWG Copper Fiber-Reinforced Dropwire – The conductors are made of softannealed
copper and insulated with polyethylene (PE). The outer jacket is made of polyvinyl chloride (PVC).

POLE ATTACHMENTS FOR POLE TO POLE and POLE TO


BUILDING RUNS
Pole Clamp with Hook Nuts on Wooden Poles Power utilities may not allow the use of drive hooks on
their wooden poles. Pole clamp with hook nuts can be used as shown in Figure A. Pole clamp with hook
nut installations on concrete pole with dropwires on pole-to-pole and pole-to-building runs is shown in Figure
B.
Placing Additional Pole Clamp with Hook Nuts on Concrete Poles Additional pole clamps with
hook nuts can be installed to accommodate additional dropwires.

Additional pole clamps with hook nuts can be installed to accommodate additional dropwires.

Placing Pole Clamp with Hook Nuts on Concrete Poles without Existing
Attachments (i.e., messenger wire and pole clamp)
Placing Drive Hooks (“J” Hooks) on Wooden Poles

Drive hook can be used only on wooden poles owned by PLDT. Pole clamps with hook nuts shall be used
on wooden poles not owned by PLDT.

• Capacity of Drive Hooks (“J” Hooks) or Hook Nuts The maximum number of Pclamps,
dropwires, or spans that may be attached to one drive hook or hook nut is five (5), regardless of
direction of spans.
Dropwire There are two types of dropwire clamps used in PLDT SIM plant. These are:

Stainless Steel Dropwire Clamp ― The clamp consists of a stainless steel shell, wedge, wire bail (or tail
wire), and a plastic (polyethylene) shim.

Two sizes are available to accommodate the #18 AWG copper-clad, single-line #22 AWG fiberreinforced
and 6-line #18 AWG fiber-reinforced dropwire. The clamp can be used in corrosive and non-corrosive
areas.

Plastic Dropwire Clamp ― The clamp consists of a stainless steel wire bail integrally molded within a plastic
wedge clamp.
A joining plastic member contains a corresponding wedge with serrations for gripping the dropwire. The clamps
can only accommodate #18 AWG copper-clad and singleline #22 AWG fiberreinforced dropwires.
The clamp can be used in corrosive and non-corrosive areas.

Maximum Number of Pole-to-Pole (Span) Runs and Pole-to-Building (Drop)


Runs

1) Regular Installation ― From the cable terminal or last communication pole, four
(4) pole-to-pole runs and one (1) pole-tobuilding run is allowed.

2) ver-Span Installation ― From the cable terminal or last communication pole, six (6) pole-topole runs and
one (1) pole-tobuilding run or 304.8 meters (1000 feet) is allowed. This, however, will require clearance from
the Exchange Head and over-span installation cost (OIC) shall be paid for by the subscriber.

Building Attachment, Station Protector, and Station Protector Grounding

House Bracket ― It is used for the first building attachment where the dropwire clamps are attached.
Installation Requirements:
For wood surfaces ― House bracket can be mounted directly using wood screws.

For concrete walls ― House bracket can be mounted using plastic anchors and wood screws.
IMPORTANT NOTES:

a. One shape of drip loop is allowed (down position). The purpose is to prevent water from going through the C-
knob, thus preventing the surface – particularly wood – from rotting.

b. If there are several dropwires to be installed, use bridle rings.

c. Never use dropwire clamp to dropwire clamp on house bracket to protector dropwire installation.

STATION PROTECTOR
Fuseless Type – No fused but Gas tube inserted between ground side and Line side. It has three terminals/
port, one for parallel wire, the other one for Jacketed wire and the third terminal is for ground connection.
Primary use is to protect Life and Property

GROUND ROD
Driven to the soil to make an electrical contact to earth. To discharge high voltages / high current.

Mechanical Ground Rod Driver Use to drive ground rod


Gun Heller stapling - use to secure (jacketed ) inside wire on wood surfaces

Inside Wire (Jacketed Wire) - used as a medium to connect the station protector and connecting block. These
wires were typically copper, although aluminum has also been used, and were carried in pairs
Connecting block - Use to terminate interior wire as final attachment. It provides point of connection between
instrument line cord and interior wire
Telephone Instrument

is defined as “an apparatus for reproducing sound, especially that of the human voice (speech) at a great
distance, by means of electricity, consisting of transmitting and receiving instruments connected by a line or
wire which conveys the electric current”.
Do’s and Don’ts after Installation

1) Be always neat about your appearance and work.

2) Make your work permanent.

3) Be sure all tools are all accounted and excess materials are removed within the customer’s premises.

4) Do test telephone instrument after the installation for correct dial speed, transmission, reception and low
level noise.

5) Always leave the new customer with the thought that you have done your work properly.

6) 6) Don’t leave customer’s premises unless customer is familiar with the operation of the particular
telephone set .

7) 7) Don’t drop a hint to the customer that you are hungry or thirsty.

8) 8) Do not tell customers or people who question you about additional lines, etc. that lots of facilities are
available you could be wrong.

9) 9) Don’t tell customer or people who question you about facilities to call executive of a company.
you represent the company. Make note and give it to your supervisor

You might also like