Professional Documents
Culture Documents
Under
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
Learning Guide #3
Unit of Competence: Administrator and Network Hardware Peripherals
Module Title: Administrating Network Hardware
Peripherals
LG Code: ICT ITS2 M03 LO1
TTLM Code: ICT ITS2 TTLM3 013
Page 2
Training, Teaching and Learning Materials Development Lo
Whether you provide a service to internal or external clients, it is worth remembering and following the
fundamental principle of client service:
If your service responds to clients needs and makes your client feel valued, you and your organisation will build
and maintain a strong reputation.
The process of identifying and documenting client requirements can take many forms. It can be an informal
process where you are asked to provide help for a friend selecting a new printer. In a business environment it is
usually a more formal process, where your supervisor assigns you the task of working with a client group to
select or develop new computer resources.
The general steps to follow in identifying clients’ needs are summarised below. Note: not all these steps are
performed every time.
1 Preparation
2 Understand the business goals. This would include knowing if any budget is applicable or if there are there
plans for future expansion.
3 Understand the organisational guidelines. Ask questions to determine what organisational guidelines are to
be adhered to.
4 Define the client’s requirements clearly. This will be done in conjunction with the next two steps and can
involve interviewing, preparation of questionnaires or direct observation. Your questioning skills are very
important at this stage and are discussed in detail in the next section.
5 Identify the roles of stakeholders — those people who have an interest in identifying the requirements. This
can include end-users or customers, managers and other technical staff.
6 Identify sources of information
7 Investigation
8 Develop an understanding of the existing system
9 Investigate alternatives to the existing system
10 Document the client requirements.
There is also additional information that you’ll need from the outset of the job or project. You may need to
provide some of this information to the client if it is part of your organisation’s policies. For example, your
organisation may have a policy for charging predetermined extra fees and other charges for certain services
outside of the service requested by the client. This information will be discussed in more detail when we look
later at ‘information you and your client need to agree to’. For now, it includes information such as:
extra costs
scope of the job
specifications
agreement or contract
changing of the brief
options
possibilities
recommendations
Page 3
Training, Teaching and Learning Materials Development Lo
process
consultation with the client
contact person
timelines
job guarantee.
Page 4
Training, Teaching and Learning Materials Development Lo
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
Learning Guide #3
Unit of Competence: Administrator and Network Hardware Peripherals
Module Title: Administrating Network Hardware
Peripherals
LG Code: ICT ITS2 M03 LO1
TTLM Code: ICT ITS2 TTLM3 013
Page 5
Training, Teaching and Learning Materials Development Lo
Continuous interaction with clients is crucial to determine exactly what they require on their network to meet
their organisational needs. The help desk data base can also often inform IT staff as to what might need to be
purchased to overcome consistent problems or improve work flow. New components may of-course also be
required because of breakdowns.
Once you have decided that new components are required, you need to contact vendors that stock the
component, obtain information as to warranty and licensing as well as any technical specifications needed to
check that the component is compatible with other hardware and software on the network. For fragile
components, the delivery method and packaging of the component must be appropriate and agreed upon also.
After this, the recommendations would normally need to be documented and submitted to a supervisor or
manager for approval.
Wired technologies
Twisted pair wire is the most widely used medium for telecommunication. Twisted-pair wires are
ordinary telephone wires which consist of two insulated copper wires twisted into pairs and are used for
both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and
electromagnetic induction. The transmission speed ranges from 2 million bits per second to 100 million
bits per second.
Coaxial cable is widely used for cable television systems, office buildings, and other worksites for local
area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of
a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The
layers of insulation help minimize interference and distortion. Transmission speed range from 200
million to more than 500 million bits per second.
Page 6
Training, Teaching and Learning Materials Development Lo
Optical fiber cable consists of one or more filaments of glass fiber wrapped in protective layers. It
transmits light which can travel over extended distances without signal loss. Fiber-optic cables are not
affected by electromagnetic radiation. Transmission speed may reach trillions of bits per second. The
transmission speed of fiber optics is hundreds of times faster than for coaxial cables and thousands of
times faster than for twisted-pair wire.
Wireless technologies
Terrestrial Microwave – Terrestrial microwaves use Earth-based transmitter and receiver. The
equipment look similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits
all communications to line-of-sight. Path between relay stations spaced approx. 30 miles apart.
Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks.
Communications Satellites – The satellites use microwave radio as their telecommunications medium
which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 22,000
miles (for geosynchronous satellites) above the equator. These Earth-orbiting systems are capable of
receiving and relaying voice, data, and TV signals.
Cellular and PCS Systems – Use several radio communications technologies. The systems are divided to
different geographic area. Each area has low-power transmitter or radio relay antenna device to relay
calls from one area to the next area.
Wireless LANs – Wireless local area network use a high-frequency radio technology similar to digital
cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to
enable communication between multiple devices in a limited area. An example of open-standards
wireless radio-wave technology is IEEE 802.11b.
Bluetooth – A short range wireless technology. Operate at approx. 1Mbps with range from 10 to 100
meters. Bluetooth is an open wireless protocol for data exchange over short distances.
Network topology
Computer networks may be classified according to the network topology upon which the network is
based, such as bus network, star network, ring network, mesh network, star-bus network, tree or
hierarchical topology network. Network topology is the coordination by which devices in the
network are arranged in their logical relations to one another, independent of physical arrangement.
Even if networked computers are physically placed in a linear arrangement and are connected to a
hub, the network has a star topology, rather than a bus topology.
Types of networks
Page 7
Training, Teaching and Learning Materials Development Lo
A personal area network (PAN) is a computer network used for communication among computer and different
information technological devices close to one person. Some examples of devices that are used in a PAN are
personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN
may include wired and wireless connections between devices. The reach of a PAN typically extends to 10
meters.[2] A wired PAN is usually constructed with USB and Firewire connections while technologies such as
Bluetooth and infrared communication typically form a wireless PAN
A local area network (LAN) is a network that connects computers and devices in a limited geographical area
such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each
computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet
technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing
home wires (coaxial cables, phone lines and power lines).[3]
Typical library network, in a branching tree topology and controlled access to resources
All interconnected devices must understand the network layer (layer 3), because they are handling multiple
subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to
the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches"
because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access
routers, where the router at the top is a distribution router that connects to the Internet and academic networks'
customer access routers.
The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data
transfer rates, smaller geographic range, and no need for leased telecommunication lines. Current Ethernet or
other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has
projects investigating the standardization of 40 and 100 Gbit/s.[4]
A home area network is a residential LAN which is used for communication between digital devices typically
deployed in the home, usually a small number of personal computers and accessories, such as printers and
mobile computing devices. An important function is the sharing of Internet access, often a broadband service
through a CATV or Digital Subscriber Line (DSL) provider.
Campus network
A campus network is a computer network made up of an interconnection of local area networks (LANs) within
a limited geographical area. The networking equipments (switches, routers) and transmission media (optical
Page 8
Training, Teaching and Learning Materials Development Lo
fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise,
university, government etc.).
In the case of a university campus-based campus network, the network is likely to link a variety of campus
buildings including; academic departments, the university library and student residence halls.
A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country,
or spans even intercontinental distances, using a communications channel that combines many types of media
such as telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common
carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the
OSI reference model: the physical layer, the data link layer, and the network layer.
A global area network (GAN) is a network used for supporting mobile communications across an arbitrary
number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is handing
off the user communications from one local coverage area to the next. In IEEE Project 802, this involves a
succession of terrestrial WIRELESS local area networks (WLAN).[5]
An Enterprise Private Network is a network build by an enterprise to interconnect the various company sites
(production sites, head offices, remote offices, shops etc.) in order to share computer resources over the
network.
Sample EPN made of Frame relay WAN connections and dialup remote access.
Beginning with the digitalization of telecommunication networks started in the 70's in the USA (by AT&T) and
propelled by the growth in computer systems availability and demands private networks have been built for
decades without the need to append the term private to them. The networks were operated over
telecommunication networks and as per voice communications a certain amount of security and secrecy was
expected and assumed.
But with the Internet in the 90's came a new type of network built over this Public infrastructure, using
encryption to protect the data traffic from eaves-dropping (VPN). So the enterprise networks are now
commonly referred to Enterprise Private Network in order to clarify that these are private networks (in
opposition to public networks).
A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by
open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The
data link layer protocols of the virtual network are said to be tunneled through the larger network when this is
the case. One common application is secure communications through the public Internet, but a VPN need not
Page 9
Training, Teaching and Learning Materials Development Lo
have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to
separate the traffic of different user communities over an underlying network with strong security features.
A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the
VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-
point.
The cable can be categorized as Cat 5, Cat 5e, Cat 6 UTP cable. Cat 5 UTP cable can support 10/100 Mbps Ethernet network,
whereas Cat 5e and Cat 6 UTP cable can support Ethernet network running at 10/100/1000 Mbps. You might heard about Cat 3 UTP
cable, it's not popular anymore since it can only support 10 Mbps Ethernet network.
Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only difference is each type will have different wire
arrangement in the cable for serving different purposes.
Straight Cable
You usually use straight cable to connect different type of devices. This type of cable will be used most of the time and can be used to:
If you need to check how straight cable looks like, it's easy. Both side (side A and side B) of cable have wire arrangement with
same color. Check out different types of straight cable that are available in the market here.
Page 10
Training, Teaching and Learning Materials Development Lo
Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover cable can be used to:
In you need to check how crossover cable looks like, both side (side A and side B) of cable have wire arrangement with following
different color . Have a look on these crossover cables if you plan to buy one. You can also find more network cable choices and
information from Comtrad Cables.
Page 11
Training, Teaching and Learning Materials Development Lo
In case you need to make a crossover cable yourself! You can use this
Page 12
Training, Teaching and Learning Materials Development Lo
Under
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
Learning Guide #3
Unit of Competence: Administrator and Network Hardware Peripherals
Module Title: Administrating Network Hardware
Peripherals
LG Code: ICT ITS2 M03 LO1
TTLM Code: ICT ITS2 TTLM3 013
Your workspace
One resource your installation plan needs to address is a suitable working environment and adequate tools for
the task. You will generally need the all of the following if you are installing any hardware:
a clean, tidy and well-lit working space or bench
sufficient power points
a toolkit comprising screwdrivers (flat and Philips) and some long nose pliers
an anti-static wrist strap to avoid static discharges on your components
Page 14
Training, Teaching and Learning Materials Development Lo
Sources of information
The next resource that your installation plan needs to address is the necessary information regarding the
procedure for installation — this needs to be gathered prior to the installation.
Read the manual. The first place to look for information on installing a component or software is the user’s
manual which will normally come with the component.
You may be supplied with the manual in paper format, but increasingly manufacturers are supplying manuals in
digital format on the installation CD. Take the time to print out any user manual or installation guide.
Page 15
Training, Teaching and Learning Materials Development Lo
all the accessories provided with the component such as screws and cables
hardware installation
driver installation for various operating systems
Your installation CD may contain the following information and/or software:
installation guide
user manual
drivers for different operating systems
additional software. Examples include:
– Adobe Acrobat Reader — many manuals are published in PDF format
– video or audio players such as DirectX
– software specific to the component being installed, for example, answering machine software for an
internal modem, to allow the computer to be used as an answering machine.
Installation tips
Here are a few useful tips to follow when carrying out an installation.
The safety first approach should be adopted when you are dealing with a client’s computers. You must
ensure that you do not pose a risk to the data on the computers you are servicing. Remember, you do not
own the data on the computers, the client does.
Duplicate the set up you plan to implement on a test computer first to ensure all the modifications will
behave as you anticipate.
If you do not have a suitable spare computer, use one of the client’s computers when it is not in use. This
may require work outside usual office hours.
Always backup the client’s computers prior to starting any modifications.
Another option is to image the client’s hard drive to a spare drive of your own, using a program such as
GHOST. Then use the spare drive to test all modifications. (Refer to http://www.symantec.com). If you
use this option, remember that the data contained on your client’s hard drive belongs to the client and
must be deleted after successful installation.
The use of an imaged drive will also allow you to test any modifications you make to the operating
system configuration, and will fully test the interaction of software applications with the newly modified
system hardware and drivers.
Once you have proven the new modifications, you can start the implementation to other computers.
Page 16
Training, Teaching and Learning Materials Development Lo
Licensing
Prior to the installation of any software application, you should check that the organisation has licenses for the
software to be installed, and that all terms and conditions of the license have been adhered to. Record any serial
numbers or product keys that will be required during the installation.
Most licenses allow you to make a backup copy of the software. Make any backup copies prior to the software
installation.
Backup
Determine what data will need to be backed up before the installation. If you are installing a new application
such as a database, you need to ensure that the user will be able to access old information. This may require that
data stored in the old database format is converted to a format that can be read by the new database application.
Page 17
Training, Teaching and Learning Materials Development Lo
Planning the installation of motherboards is a complex task and you will need to consult the user manual for a
specific motherboard. You will need to ensure that the form factor of the motherboard is compatible with the
form factor of the case.
CPUs
The main point to consider in planning the installation of a CPU is to ensure that it is supported by the
motherboard. You will need to check that the physical socket size is compatible and then that the CPU speed is
supported. Read your motherboard manual to find out whether the new CPU will be automatically detected or
you may need to change a jumper setting on the motherboard.
RAM memory
Again, the main point to consider here is compatibility with the motherboard. You will need to ensure that there
are vacant slots for the new memory modules, that the memory speeds of the new modules are supported and
then that the maximum memory supported by the motherboard is not exceeded. After physical installation of the
new memory modules, BIOS should automatically detect the new RAM memory.
ROM memory
As the ROM is an integral part of the motherboard, physical replacement is not possible. Software updates are
— consult the website of the relevant motherboard manufacturer for further information.
You will need to set jumpers on your drive to be either the master or slave. Consult your user manual
Page 18
Training, Teaching and Learning Materials Development Lo
After completing the physical hardware installation, the drive will need to be configured and formatted. Unlike
floppy drives, hard disk drives vary greatly in storage capacity. The disk is electronically blank to begin with.
The manufacturer generally performs a ‘low-level format’. Here are the basic steps in the preparation of a hard
disk:
1 Configure the CMOS for the drive you have installed.
2 Perform a low-level format.
3 Partition the drive.
4 Perform a high-level format.
5 Restore the client’s data to the installed drive if necessary.
Video cards
Most video cards today use the AGP interface. If you are planning to install an AGP video card, you will first
need to examine your computer system to ensure that there is a physical slot that you can use.
Some of the cheaper motherboards use the AGP interface but incorporate the video within the chipset and have
an integrated video output. Physically there is no AGP slot available. It is not possible to upgrade the video card
in this situation.
Other motherboards also have an integrated video output, but have an AGPl slot if you which to upgrade the
video. Check that the motherboard BIOS allows you to disable the on-board video.
After physical installation of the video card, typically you will need further installation of drivers and other
additional software. Consult your user manual.
Expansion cards
You will need to ensure that there is a spare expansion slot available. Typically this will be a PCI expansion
slot. You need to ensure that your computer system meets the minimum system requirements (both hardware
and software) of the new expansion card.
After physical installation of the expansion card, typically you will need further installation of drivers and other
additional software. Consult your user manual
Page 19
Training, Teaching and Learning Materials Development Lo
Under
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
Learning Guide #3
Unit of Competence: Administrator and Network Hardware Peripherals
Module Title: Administrating Network Hardware
Peripherals
LG Code: ICT ITS2 M03 LO1
TTLM Code: ICT ITS2 TTLM3 013
Page 20
Training, Teaching and Learning Materials Development Lo
Organizational policies
The maintenance procedures in an organisation will be determined by a number of factors, including:
how critical the IT components and/or software are
cost constraints
the risk to business continuity
pre-existing commitments
Expectations of service by the organisation’s business units.
Page 21
Training, Teaching and Learning Materials Development Lo
The benefit of the fixed service type of maintenance agreement is that you receive a dedicated and, typically,
faster response. Depending on the terms of the agreement, your maintenance costs are also likely to be covered.
A per-call basis means you receive maintenance services from the supplier as required. The problem with this
type of agreement is that you have to wait until a technician is available and you are charged for labour and
parts. A benefit is this cost can often be less expensive than a maintenance contract.
Software should also be covered by a warranty or maintenance agreement. Software warranty only lasts for a
short period of time, so a maintenance agreement for critical software should be in place. If customised software
has been developed in-house, a maintenance agreement will not be necessary because it will be maintained
internally.
A software maintenance agreement may include, for example, a free or discounted upgrade of packaged
software.
Equipment documentation
Each item of IT equipment should be accompanied by documentation. This may be provided in hard copy, as a
manual, on CD, or on a support website. If original documentation provided as hard copy is missing, it can
usually also be downloaded from the manufacturer’s website. IT Support staff need to be able to read and
interpret all such technical documentation.
Page 22
Training, Teaching and Learning Materials Development Lo
Documentation for a system should outline the manufacturer’s recommended maintenance procedures for the
unit. The procedures should state:
how often maintenance procedures should be done
any equipment/material/consumables that are required
The actual steps to complete the maintenance task, including all relevant safety precautions for the task.
The system’s documentation should also identify any components of a system that should not have any
preventative maintenance applied to it for safety reasons. Generally speaking, hardware manufacturers will
include instructions for:
cleaning
care
consumables — handling, installing and disposing
making adjustments
Troubleshooting.
Apart from documentation, the supplier’s website will supply software patches and driver updates as they
become available.
Safety first
Page 23
Training, Teaching and Learning Materials Development Lo
Remember that ALL preventative maintenance must be carried out within the regulations associated with the
Occupational Health and Safety Act, 2000 and relevant government licensing frameworks. Your own safety is
far more important than the preventative maintenance of any device.
Cleaning
The following table gives suggestions for cleaning the parts of a computer.
Page 24
Training, Teaching and Learning Materials Development Lo
Page 25
Training, Teaching and Learning Materials Development Lo
Printers
Most maintenance on printers relates to print quality and paper handling. Maintenance on printers may
include the following.
Tape drive Cleaning drive heads. This should be done Head cleaning kit and original
regularly. Consult the manufacturer’s instructions. tape drive documentation
Backup Regular viewing of backup logs for errors Backup software documentation
software
Tape media Checking media for errors and tape age against the Backup software documentation
recommended tape life. Perform test restores to and media specifications
confirm reliability of media and backup process.
Hub/switch Checking systems log and port statistics for large Original manufacturer’s
error counts documentation
Scanner Glass cleaning with recommended products; Viewing POST diagnostics test
ensuring a dust free environment results
Other devices Viewing POST diagnostics test results; running Viewing POST diagnostics test
regular tasks to ensure the device is functional results
Page 26
Training, Teaching and Learning Materials Development Lo
Scheduling maintenance
Many organisations with a preventative maintenance program will have maintenance tasks organised on a
schedule. The goal of a schedule is to ensure that regular maintenance occurs. Given the time pressures of
working as an IT Support person, a schedule will assist you in organising your workload to ensure that the best
possible service is provided to the client.
If a maintenance schedule does not exist, consider designing one. A schedule should simply include:
1 each preventative maintenance task that should be completed
2 how often the task should be repeated
3 an estimate of the time required to complete the task.
These tasks can then be allocated time in your schedule at the required intervals.
Cost effectiveness
It is important that any preventative maintenance be cost effective. It is possible to spend significant amounts of
time cleaning and testing devices such as keyboards and mice to extend their life. However, the replacement
cost of those devices, including the cost of having an inventory of such items on hand, may mean that it is
cheaper to purchase new devices rather than extend the life of the existing devices.
Every maintenance issue must be examined from a cost point of view.
Practicality
Preventative maintenance must be practical within the working of a business. If the process of preventative
maintenance causes a major interruption to the daily working of a business, the maintenance program will fail.
Always try to consider the impact on the users of the computers when considering a preventative maintenance
program.
Page 27
Training, Teaching and Learning Materials Development Lo
Any maintenance program must meet the needs of the business if it is going to be successful. While this should
have been considered when an SLA was written, the maintenance work must be carried out within the
organisation’s guidelines and requirements.
Page 28
Training, Teaching and Learning Materials Development Lo
Reporting problems
Your preventative maintenance schedule will occasionally alert you to potential problems. When this happens,
you should be aware of the appropriate person to inform. Your organisational guidelines and/or service level
agreements should indicate who this is. It may be your supervisor, authorised business representative, external
supplier, or client.
Page 29
Training, Teaching and Learning Materials Development Lo
Under
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
Learning Guide #3
Unit of Competence: Administrator and Network Hardware Peripherals
Module Title: Administrating Network Hardware
Peripherals
LG Code: ICT ITS2 M03 LO1
TTLM Code: ICT ITS2 TTLM3 013
Page 30
Training, Teaching and Learning Materials Development Lo
Page 31
Training, Teaching and Learning Materials Development Lo
Syntax Description
ipconfig Displays information on the local PC’s network connection in the LAN,
and the PPP protocol connection to the Internet.
ipconfig/all Displays the same information as the ipconfig command, but has more
information including the network card.
The screen below shows an ipconfig command. All information configured in the computer is displayed.
The next screen below shows an ipconfig/all command. Again, all information configured in the computer is
displayed.
Page 32
Training, Teaching and Learning Materials Development Lo
Using ping
The ping command checks the basic connectivity between you and the target IP address. It sends out an echo
request, the target system receives it and sends back a response. If you receive a response, then there is an active
computer or device at the target address. You also get the time (distance) taken to reach the target, and back.
The screen below shows a ping command and the resulting output showing that it was successful.
Notice the (0% Loss) near the mouse pointer. This indicates that the target address exists and is available.
Success!
Page 33
Training, Teaching and Learning Materials Development Lo
Notice the (100% Loss) near the mouse pointer. This indicates that the target address is not responding so is not
connected to the network. Failure!
In this case, the request for a response has timed out or taken too long. When using ping with the –t option, you
may get many Request timed out messages, but when you get things working again, you will start receiving
Reply from X.X.X.X. This option is useful on a network with little or no other activity to ensure that something
is happening when you are looking at the network hardware later.
Using tracert
The tracert (trace route) command checks the connectivity between you and the target IP address, just as ping
does, but it also shows all intermediate nodes such as routers and gateways. It sends out an echo request and
gets back information about the network route that was followed to the target system.
If the ping command doesn’t work, then generally you will have similar trouble with tracert and get will
messages like Destination unreachable or Request timed out. You use the tracert command from the
Windows command prompt in the following form:
tracert IP_address tracert 172.16.157.200 Using tracert to trace the route within a
single LAN (Local Area Network). This
gives similar results to the ping
command.
tracert IP_address tracert 224.44.168.13 Using tracert to trace the intermediate
routers and gateways, This gives similar
results to ping for each of these devices
or systems as well.
Page 34
Training, Teaching and Learning Materials Development Lo
The following screen shows using tracert through a router or gateway to another LAN.
Connectivity in an IP network
By viewing the results from a number of network commands, you should be able to check if the networked
computer that has the printer attached is reachable over the network. To check that the computer with the
networked printer is reachable use the Ping command. Use the Tracert command, if the networked printer is
accessed through another LAN.
By examining the results of your computer searches, you will be able to narrow down the cause of the problem.
For example, a user’s computer cannot find another computer with a shared printer attached. You are trying to
locate both computers and solve the problem for the user.
The searches you’ve carried out and the direction for further action shouldn’t take too long, and they will give
Remember, you must ask in a way that will encourage the user to help you. You cannot ask in a way that seems
to accuse the user of doing something wrong. It is not an interrogation but an investigation. You are there to
help.
Page 35
Training, Teaching and Learning Materials Development Lo
There are a number of IP addresses that cannot be used on networks. They are used for special purposes such as
Internet testing, local testing, or can only be used for LANs.
In a Class A network the first octet, being the network portion, must be the same on each computer, and
the following three octets, the host portion, must be unique to each computer.
Page 36
Training, Teaching and Learning Materials Development Lo
In a Class B network, the first two octets must be the same on each computer and the host portion (being
the last two octets) must be unique to each computer.
In a Class C network, the first three octets must be the same on each computer for the network portion,
and the last octet must be unique as this is the host portion.
A host computer can have an IP address set as a static number. This means they will always have the same IP
address. On larger networks, DHCP is used for the client computers. This means that each time the computer is
turned on it is given an IP address and other configuration information from the DHCP server. In this case, the
DHCP server is software that is installed, often in the main login server, such as the domain controller.
Page 37
Training, Teaching and Learning Materials Development Lo
Common configurations
A common IP address used in many private networks is 192.168.0.x, where x is the unique number for each
host on the network. A private network is not part of the Internet. A host is usually a computer or a networked
printer. Often the first few numbers on a network are reserved for servers. For example:
192.168.0.1 Main login server
192.168.0.2 Backup login server
192.168.0.3 Database server
192.168.0.4 Web server
192.168.0.5 File and data server
192.168.0.6 to 192.168.0.9 Reserved for new servers
192.168.0.10 to 192.168.254 Clients, ie. Individual computers.
If there are only a few computers in a network, each one may have the setting configured manually. This is
known as a static setting. In larger networks, a DHCP server will issue each of the computers an IP address as
they are turned on. This is known as a dynamic setting.
You access local area connection properties from the computer desktop. For example, select Start, Connect to,
Show All Connections, then right-click on Local Area Connection and choose Properties.
To install File and print sharing, just tick the box. To install the ‘Client for Microsoft Networks’ you choose
Install, then Client, and then follow the prompts. To install TCP/IP, choose Install, then Protocol, then
TCP/IP and follow the prompts.
Page 38
Training, Teaching and Learning Materials Development Lo
Figure 2: Screen to
figure 1: Window to adjust the TCP/IP adjust the default gateway and DNS
setting or view it after protocol is installed settings
To adjust the TCP/IP setting or view it after the protocol has been installed, you access Local Area Connection
Properties, highlight Internet Protocol (TCP/IP) then choose Properties, as in Figure 2.
Reflection activity
Page 39
Training, Teaching and Learning Materials Development Lo
Table 3: When the user cannot access a peripheral on the network — typical techniques for troubleshooting
Item Commands
Check that the network cables are securely in place at the back of the computer.
Check that cables to hubs, switches, bridges and routers are fixed securely in their
sockets.
Check the network configuration on Use the commands ‘ipconfig/all’
workstations involved, to ensure that they are and ‘ping’.
correct.
Check that you can access other computers Use the commands ‘ping’ or
and peripherals on the network. ‘tracert’ if part of your network is
on the other side of a router.
Check the permissions to ensure that the user has the right levels of access
network resources.
Check that an individual user is in the correct group that has access to network
resources
Check and replace the network cards and drivers, as required.
Page 40