You are on page 1of 39

Unit Five: Configure peripheral services

The following content coverage :


. Manage local area network-connected peripherals
. Meaningful name for peripherals and control queues
. Configure Security and access to use of peripherals
. Configure Workstation to allow applications
Install required software to Configure/manage local area
network
5.1.1Network Peripherals

A network peripheral refers to equipment which typically enables


computers to communicate each others.
A local peripherals is a peripheral that can be connected to the
stand alone (a single) computer.
Examples of Network peripherals include: - routers, Switches,
Access points, Network interface cards and other hardware devices.
Hub
Hubs are simple network devices, and they are simply low
cost. Most hubs are referred to as either active or passive.
Switch
On the surface, a switch looks much like a hub.
Despite their similar appearance, switches are far more
efficient than hubs and are far more desirable for today's
network environments.
Repeater
A repeater amplifies the signal it receives on one port
before it transmits it on other ports.
Because the repeater does not check on the
contents of the data it receives or retransmits,
frames that are corrupted by noise and other
factors can also be repeated.
 The development of the hub replaced the
repeater for all practical purposes, because it
performs the same functions, and can include
additional features.
Routers
 A router is a special computer which has the ability
to perform such tasks as routing and forwarding
information with use of software and hardware.
 A router is used to provide connectivity across
wide area network (WAN) links and route
information between two LAN segments.
Types of routers
Core router
Edge router
Distribution router
Wireless router
Virtual router
Gateways
The term gateway is applied to any device,
system, or software application that can
perform the function of translating data
from one format to another.
Actually, the term gateway refers more to a
network role than a network device.
Gateways
The term gateway is applied to any device, system,
or software application that can perform the
function of translating data from one format to
another.
Actually, the term gateway refers more to a
network role than a network device.
. Modems
Modems perform a simple function:
They translate digital signals from a computer into analog
signals that can travel across conventional phone lines.
It is a contraction of the terms modulator and demodulator.
The word "modem" stands for "modulator-demodulator".
A modem's purpose is to convert digital information to analog signals
(modulation),

and to convert analog signals back into useful digital information (demodulation).
Network Interface Cards (NICs)
NICs are the mechanisms by which computers
connect to a network.
NICs come in all shapes and sizes, and they
come in prices to suit all budgets.

 Known as network card, network adapter, and


LAN adapter, etc.
Transceivers

The term transceiver does not necessarily


describe a separate network device but rather an
integrated technology embedded in devices. I.e.
transceiver = transmitter and a receiver device
that receives data, converts it, and then sends it to
another location.
transceiver is a combination transmitter/receiver in a single package.

While the term typically applies to wireless communications devices,


it can also be used for transmitter/receiver devices in cable or optical
fiber systems.
Firewall

A hardware or software system that is used to separate one computer


or network from another one.
The most common type is used to protect a computer or an entire
Using meaningful name for peripherals
and control queues
A peripheral device is typically a device that
is external to a computer and connected
either wirelessly or via a cable, although
some are internal to the digital system.
Control queues are data structures used in computer systems to
manage the flow of control information between different components
or processes.
They are typically used to prioritize and schedule tasks, commands, or
messages within a system.
Control queues help ensure that tasks are executed in the correct order
and that resources are allocated efficiently.
They play a crucial role in coordinating the activities of various
components in a computer system, such as processors, input/output
devices, and memory units.
As you install and configure a printer you
should keep to the network standards of the
organisation, which should include naming
conventions for peripherals and other devices.

Each organization will have its own standards,


but it is important that users can identify
peripherals easily.
Configuring security and access to make use of peripherals.

Basics of Peer to peer Network

In a peer-to-peer network, computers on the network are equal, with

each workstation providing access to resources and data.

 This is a simple type of network where computers are able to

communicate with one another and share what is on or attached to

their computer with other users.


Configuring peripherals to access and use security

 User Privileges
Windows 10 allows providing security to files and folders;
this feature is available because of the NTFS (New
Technology File System).
There are different levels of security, such as read,
modify, full control etc.
Full control permissions include:
 Read
 Write
 execute
 delete
 change permissions
Where as modify includes 4 permissions that is, read, write, execute and delete.

Sharing Network resources

Sharing allows an object to be accessed from network. By default in windows 10,

there are some hidden shares, these shares end with a $ symbol.

To view these default shares open computer management (right click on my

computer and choose manage) and select shared folders and then shares.

Most devices support access control lists.

Example: printers, sharing data using folders, and manage devices, etc
Configuring workstation to allow applications work with peripherals.
5.4.1 Configuring workstation

 Perform appropriate steps to set up a basic workstation includes:


. Plug in cables
. Power on computer
. Follow initial operating system setup wizard
. Install security software,
. Configure peripherals (if applicable)
. Install and Uninstall unneeded software (if applicable)
. Configure and verify Internet connection
. Run software and security updates
. Other user accounts (if applicable)
. Basic cable management
. Software version identification and compatibility
. Configure keyboard, mouse, display, sound, etc.
IP Networking Basics
IP Addresses
Each device on an IP network requires 3 different
pieces of information in order to correctly
communicate with other devices on the network an
IP address, a subnet mask, and a broadcast address.
You will usually see each of these numbers written
as four "octets"
(e.g. 198.41.12.151,
255.255.255.0, and
198.41.12.255).
Class Address range
A 0.0.0.0 to 127.255.255.255

B 128.0.0.0 to 191.255.255.255

C 192.0.0.0 to 223.255.255.255

D 224.0.0.0 to 239.255.255.255
IP addressing uses a 32-bit address to identify each host on an IPv4
network.
To make addresses easier to read, they are written in dotted decimal
notation, each address being four octets in length.
 For example, address 00001010.00000001.00000001.00000001 in binary
is written as 10.1.1.1.
Each IP address breaks down into the following sections:
Net ID—Identifies a network. The first several bits of a net ID, known as
the class field or class bits, identify the class of the IP address.
Host ID—Identifies a host on a network.
IP addresses are divided into five classes
 The shaded areas represent the address class. The first three
classes are most commonly used.
Figure 7: IP address classes
Every IP address is really made up of two pieces:
a "network" portion, which tells routers what
group of devices a packet should go to (e.g., any,
a campus, etc.) and a
"host" portion which tells routers what specific
device among that group the packet should go to.
Class A Public & Private IP Address Range
Class A addresses are for networks with large number of total hosts.
Class A allows for 126 networks by using the first octet for the network
ID.
The first bit in this octet, is always zero. The remaining seven bits in this
octet complete the network ID.
The 24 bits in the remaining three octets represent the hosts ID and allows
for approximately 17 million hosts per network.
Class A network number values begin at 1 and end at 127.
Public IP Range: 1.0.0.0 to 127.0.0.0
◦ First octet value range from 1 to 127
Private IP Range: 10.0.0.0 to 10.255.255.255
Subnet Mask: 255.0.0.0 (8 bits)
Number of Networks: 126
Number of Hosts per Network: 16,777,214
Class B Public & Private IP Address Range
Class B addresses are for medium to large sized networks. Class B allows
for 16,384 networks by using the first two octets for the network ID.
The first two bits in the first octet are always 1 0.
 The remaining six bits, together with the second octet, complete the
network ID.
 The 16 bits in the third and fourth octet represent host ID and allows for
approximately 65,000 hosts per network.
Class B network number values begin at 128 and end at 191.
Public IP Range: 128.0.0.0 to 191.255.0.0
◦ First octet value range from 128 to 191
Private IP Range: 172.16.0.0 to 172.31.255.255
Subnet Mask: 255.255.0.0 (16 bits)
Number of Networks: 16,382
Number of Hosts per Network: 65,534
Class C Public & Private IP Address Range
Class C addresses are used in small local area networks (LANs).
Class C allows for approximately 2 million networks by using the first three
octets for the network ID.
In a class C IP address, the first three bits of the first octet are always 1 1 0.
And the remaining 21 bits of first three octets complete the network ID.
The last octet (8 bits) represent the host ID and allows for 254 hosts per
network.
Class C network number values begins at 192 and end at 223.
Public IP Range: 192.0.0.0 to 223.255.255.0
◦ First octet value range from 192 to 223

Private IP Range: 192.168.0.0 to 192.168.255.255


Special IP Range: 127.0.0.1 to 127.255.255.255 (See
Special IP Addresses below for more information)
Subnet Mask: 255.255.255.0 (24 bits)
Number of Networks: 2,097,150
Number of Hosts per Network: 254
Class D IP Address Range
Class D IP addresses are not allocated to hosts and are used for
multicasting.
Multicasting allows a single host to send a single stream of data to
thousands of hosts across the Internet at the same time.
It is often used for audio and video streaming, such as IP-based cable
TV networks.
Another example is the delivery of real-time stock market data from
one source to many brokerage companies.
Range: 224.0.0.0 to 239.255.255.255
◦ First octet value range from 224 to 239
Number of Networks: N/A
Number of Hosts per Network: Multicasting
 Class E IP Address Class
Class E IP addresses are not allocated to hosts and are not available for general
use.

These are reserved for research purposes.


Range: 240.0.0.0 to 255.255.255.255
◦ First octet value range from 240 to 255

Number of Networks: N/A


Number of Hosts per Network: Research/Reserved/Experimental
Private IP Addresses
Within each network class, there are designated IP address that is
reserved specifically for private/internal use only.
This IP address cannot be used on Internet-facing devices as that are
non-routable.
For example, web servers and FTP servers must use non-private IP
addresses.
 However, within your own home or business network, private IP
addresses are assigned to your devices (such as workstations,
printers, and file servers).
Class A Private Range: 10.0.0.0 to 10.255.255.255
Class B Private APIPA Range: 169.254.0.0 to 169.254.255.255
◦ Automatic Private IP Addressing (APIPA) is a feature with Microsoft Windows-based
computers to automatically assign itself an IP address within this range if a Dynamic Host
Configuration Protocol (DHCP) server is not available on the network.
◦ A DHCP server is a network device that is responsible for assigning IP addresses to devices
on the network.
At your home, your Internet modem or router likely provides this functionality.
◦ In your work place, a Microsoft Windows Server, a network firewall, or some other
specialized network device likely provides this functionality for the computer at your work
environment.

Class B Private Range: 172.16.0.0 to 172.31.255.255


Class C Private Range: 192.168.0.0 to 192.168.255.255
Special IP Addresses
IP Range: 127.0.0.1 to 127.255.255.255 are network testing addresses

(also referred to as loop-back addresses).

These are virtual IP address, in that they cannot be assigned to a device.

Specifically, the IP 127.0.0.1 is often used to troubleshoot network

connectivity issues using the ping command.

Specifically, it tests a computer's TCP/IP network software driver to

ensure it is working properly.


nk
ha !!
T ou
Y

You might also like