G12 - CSS - 1ST QTR - SLM - Edf PDF
G12 - CSS - 1ST QTR - SLM - Edf PDF
EDUCATION
WRITER
EDWIN D. FERRER
ICT CSS TEACHER
Network design
Network design refers to the planning of the implementation of a computer
network infrastructure. Network design is generally performed by network designers,
engineers, IT administrators and other related staff. It is done before the
implementation of a network infrastructure.
Network design
Logical map of the network to be designed
A logical map of the network design is one that appears to the user as a single,
separate entity although it might in fact be either an entity created from
multiple networks or just a part of a larger network. ...
"When designing a network, the "logical" part refers to the IP addressing
scheme used within the network.
A physical network diagram shows how the network devices are physically
connected together, and therefor all ports on all devices on the network are
represented here. This will include cables.
Network Cabling structure
• Cabling structure
Network devices include field devices, router devices, gateway devices, and mesh
hand-held devices. ... Wireless HART networks can be configured into a number of
different topologies ... Network equipment is often defined by protocol or port type. ...
represents the logical location on the network where the device resides
IP addressing structure
IP addressing structure
There are four different types of IP addresses: public, private, static and dynamic.
While the public and private are indicative of the location of the network, private
being used inside a network while the public is used outside of a network, static and
dynamic indicate permanency
Network security architects are responsible for analyzing network data and systems
to select the most appropriate control mechanism for the security required. They
may also have a hand in selecting software and hardware used to apply the control
system.
There are 4 main types of network security that you can take
advantage of and we are also going to cover why you need them.
IP Addressing
An IP address is a number that is used to identify a device on the
network. Each device on a network must have a unique IP address to
communicate with other network devices. Network devices are those that
move data across the network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives information on the network)
and network device must have an IP address within the same network to be
able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide
a label or address for the person’s physical aspect—the body. A person’s
mailing address, on the other hand, relates to where the person lives or picks
up mail. This address can change. On a host, the Media Access Control
(MAC) address is assigned to the host Network Interface Card (NIC) and is
known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that
fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called octets. An IP address, even in this
grouped format, is hard for humans to read, write, and remember. Therefore,
each octet is presented as its decimal value, separated by a decimal point or
period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.
IP Classes Purpose
Used for large networks, implemented by large companies
Class A and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask (Subnetting)
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are mapped to the first three classes of IP
addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address
is the network portion
255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
255.255.255.0: Class C, which indicates that the first three octets of
the IP address are the network portion
IpConfig
Type ipconfig and press enter. The figure below shows the IP
configuration window using the ipconfig command. The information
from this window will be useful because it shows the IP address,
subnet mask and default gateway of a network you are connected
to.
Type the default gateway address. The default gateway is the router,
so type the router’s address. Figure 54 shows an example of assigning
an IP Address, Subnet mask and default gateway.
Assigning an IP Address
Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is
something that your ISP provides.
Click OK to confirm the settings.
Close all other open dialog boxes and windows.
These are the IP address information that a DHCP server can assign to
hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a Domain Name System (DNS) server
address
The DHCP server receives a request from a host. The server then
selects IP address information from a set of predefined addresses that are
stored in a database. After the IP address information is selected, the DHCP
server offers these values to the requesting host on the network. If the host
accepts the offer, the DHCP server leases the IP address for a specific period
of time.
Using a DHCP server simplifies the administration of a network
because the software keeps track of IP addresses. Automatically configuring
TCP/IP also reduces the possibility of assigning duplicate or invalid IP
addresses. Before a computer on the network can take advantage of the
DHCP server services, the computer must be able to identify the server on
the local network. You can configure a computer to accept an IP address from
a DHCP server by clicking the Obtain an IP address automatically option in
the NIC configuration window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain
an IP address, the Windows operating system automatically assigns a private
IP address. If your computer is assigned an IP address in the range of
169.254.0.0 to 169.254.255.255, it can communicate with only other
computers in the same range. An example of when these private addresses
would be useful is in a classroom lab where you want to prevent access
outside to your network. This operating system feature is called Automatic
Private IP Addressing (APIPA). APIPA continually requests an IP address
from a DHCP server for your computer.
Ping
The ping is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The ping
command is usually used as a simple way to verify that a computer can
communicate over the network with another computer or network device.
The ping command operates by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination computer and
waiting for a response. How many of those responses are returned, and how
long it takes for them to return, are the two major pieces of information that
the ping command provides.
-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count Use this ping command option to specify the number
of hops between the computer and the target computer or
device that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that only
the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with
the -4 option, is only necessary when pinging a hostname.
▪ Click on Start Button, then type cmd (command prompt) on the search box then
select command prompt icon on the top.
▪ A black screen will appear as shown in the figure below.
▪ Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.
Command prompt
Pinging
Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client
machine sent out the ping message until a reply came back (1 ms is 1
millisecond, or one thousandth of a second). The variability in the times
you see reflects that networks do not always respond identically.
Differing amounts of traffic on the communication lines or differing
loads on the server are common causes. You will see very different
response times depending on the access equipment you use.
Routing hop count — The part of the replies that says TTL=50 tells
you about the route the message took from one point to another. The
acronym TTL stands for Time to Live, which is a measure of how many
rerouting from one point to another the packet has to go through before
IP declares it undeliverable. The number following TTL (called the hop
count) is a number that usually starts at 255 and counts down by one
every time the message gets rerouted through an intermediary
computer.
ACTIVITY I
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on one sheet of paper.
Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server
ACTIVITY II.
Identifying IP Address Classes
Directions: In this worksheet, I will write several IP addresses with their
appropriate subnet masks. You will write which IP Address Class is
appropriate in the IP Address Class column in the chart below. An example
has been provided for you.
IP
Address
IP Address Subnet Mask Class
10.0.0.0 255.0.0.0
10.0.0.1 255.0.0.0
192.168.1.1 255.255.0.0
169.254.1.2 255.255.255.127
10.256.254.246 255.255.255.255
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
Different Types of Network Topology
Network Topology signifies the way in which intelligent devices in the network see
their logical relations to one another. The use of the term "logical" here is significant.
That is, network topology is independent of the "physical" layout of the network.
Even if networked computers are physically placed in a linear arrangement, if they
are connected via a hub, the network has a Star topology, rather than a Bus
Topology. In this regard the visual and operational characteristics of a network are
distinct; the logical network topology is not necessarily the same as the physical
layout.
Bus Topology
It is often used when network installation is small, simple or temporary. On a typical
bus network the cable is just 1 or more wires with no active electronics to amplify
the signal or pass it along from computer to computer. This makes the bus a passive
topology. When 1 computer sends a signal up the wire all the computers receive the
information but only one with the address that matches accepts the information, the
rest disregard the message.
Advantages:
• Easy to use and to understand.
• Requires least amount of cable to connect the computers together. It is therefore less
expensive than other cabling arrangements.
• It is easy to extend a bus; two cables can be joined into 1 longer cable with a BNC, Barrel
connector making a longer cable and allowing more computers to join the network.
Disadvantages:
• Heavy network traffic can slow a bus considerably as only 1 computer can send a message
at a time.
• It is difficult to troubleshoot the bus. A cable break or loose connector causes reflection and
stops all the activity.
Star Topology
In this kind of topology all the cables run from the computers to the central location
where they are all connected by a device called hub or switch. Each computer on a
star network communicates with a central device that resends the message either to
each computer or only to the destination computer, example if it is a hub then it will
send to all and if it is a switch then it will send to only destination computer. When
network expansion is expected and when the greater reliability is needed, star
topology is the best.
Advantages:
It is easy to modify and add new computers without disturbing the rest of the network.
The center of the star network is a good place to diagnose the faults.
Single computer failure does not necessarily bring down the whole star network
Disadvantages:
If the central device fails, the whole network fails to operate.
Star networking is expensive because all network cables must be pulled to one central point,
requires more cable than other network topologies
Ring Topology
In this type each computer is connected to the next computer with the last one
connected to the first. Each retransmits what it receives from the previous computer.
The message flows around the ring in one direction. The ring network does not
subject to signal loss problem as a bus network experiences. There is no termination
because there is no end to the ring.
Advantages:
Disadvantages:
• Failure of one computer on the ring can affect the whole network.
• Difficult to troubleshoot the network.
Types of Computer Network?
Personal area networks may be wired with computer buses such as USB] and FireWire. A
wireless personal area network (WPAN) can also be made possible with network
technologies such as Bluetooth.
Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building. Current
LANs are most likely to be based on Ethernet technology. For example, a library will
have a wired or wireless LAN for users to interconnect local devices (e.g., printers
and servers) and to connect to the internet. All of the PCs in the library are
connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a
system of interconnection devices and eventually connect to the internet.
In LAN you can run the multiple devices to share a transmission medium. You can use the
different topology mainly bus and ring in LAN. The communication quality is better IN LAN,
the transmission error rate are low as compare to WAN
Client/Server Vs Peer-to-Peer Networks
Client/Server Networks
Every computer has a distinct role, that of either a client or a server. A server is
designed to share its resources among client computers on the network. The
Client/Server is composed of:
Servers
These are located in secured areas, such as locked closets and data centers,
because they hold the organization's most valuable data and do not have the
accessed by operators on a continuous basis.
The server runs a special network operating system such as windows server2000,
Windows NT Server, Windows 2000 or Novell Netware.
Clients
The rest of the computers on the network functions as client. A client standard PC
that is running an operating system such as DOS or Windows.(WINDOWS
7,WINDOWS 10)
In a peer-to-peer network, every computer is equal and can communicate with other
computer on a network to which it has been granted access rights. Essentially, every
computer in this network functions as both server and client. Peer-to-peer network
can be as small as two computers as many as hundreds of units.
A network that connects two or more LANs but that is limited to a specific and
contiguous geographical area such as a college campus, industrial complex, or a
military base. A CAN may be considered a type of MAN (metropolitan area network),
but is generally limited to an area that is smaller than a typical MAN. This term is
most often used to discuss the implementation of networks for a contiguous area.
This should not be confused with a Controller Area Network.
A Metropolitan Area Network is a network that connects two or more Local Area
Networks or Campus Area Networks together but does not extend beyond the
boundaries of the immediate town, city, or metropolitan area. Multiple routers,
switches & hubs are connected to create a MAN.
Wide Area Network (WAN)
Two or more networks or network segments connected using devices that operate at
layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any
interconnection among or between public, private, commercial, industrial, or
governmental networks may also be defined as an internetwork.
In modern practice, the interconnected networks use the Internet Protocol. There are
at least three variants of internetwork, depending on who administers and who
participates in them:
• Intranet
• Extranet
• Internet
INTRANET
An intranet is a set of interconnected networks, using the Internet Protocol and uses
IP-based tools such as web browsers and ftp tools, that is under the control of a
single administrative entity. That administrative entity closes the intranet to the rest
of the world, and allows only specific users. Most commonly, an intranet is the
internal network of a company or other enterprise.
INTRANET design must facilitate the usability of the site and aid employees.
An intranet should be focused on facilitating the quickest possible access to information
and tools that help employees do their jobs. There's no need to sell employees, they already
work for the organization.
Extranet
An extranet is a network or internetwork that is limited in scope to a single
organization or entity but which also has limited connections to the networks of one
or more other usually, but not necessarily, trusted organizations or entities (e.g. a
company's customers may be given access to some part of its intranet creating in
this way an extranet, while at the same time the customers may not be considered
'trusted' from a security standpoint). Technically, an extranet may also be
categorized as a CAN, MAN, WAN, or other type of network, although, by definition,
an extranet cannot consist of a single LAN; it must have at least one connection with
an external network.
Intranets are the virtual hub of collaboration in organizations. Unlike public websites, which
enable organizations to communicate and broadcast their value proposition to customers,
users and, in general, external stakeholders, Intranets are meant to enable internal
communication and collaboration
Internet
Internet a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks using standardized
communication protocols.
The Internet is a global wide area network that connects computer systems across
the world. ... The Internet provides different online services.
Some examples include: Web – a collection of billions of webpages that you can
view with a web browser. Email – the most common method of sending and
receiving messages online
ACTIVITY III..
Identify the following. Choose your answer from the grid below. Use a
separate sheet of paper in answering.
Recommended Equipment
A computer with Windows 10 or / Windows 7
A Wireless NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Wireless Settings
Step 1
Connect first to the computer LAN Card (NIC)_and one of the HUB Port
ports on the wireless router with an patch cable.
Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
Choose start > Run, and type “cmd”. Press the Enter key.
Type ipconfig.
What is the default gateway for the computer but not necessary.
Step 3
Open your any browser. Type the default IP of the router
Browser Window
Connect to 192.168.1.1 Window
Type “User” in the “user name” field.
Type “admin” in the “Password” field.
Step 4
Click the “Wireless” tab.
Choose “Mixed” in the “Network Mode” drop-down box.
Step 4
Choose Wireless, select” Basic Wireless Settings “Type in
your new SSID name to change the “SSID name”, then
“Enable” SSID Broadcast then Save the new settings and
wait for your router to restart.
Some Linksys Smart Wi-Fi Routers support Wireless Repeater mode. To check if
your router has this option, log in to the router's web-based setup page and click
on Connectivity > Internet Settings.
Tips:
• Only one (1) frequency band on your router will be used for repeating the signal.
• Determine which frequency band to repeat.
• Both frequency bands, however, can be used for broadcasting to connect other clients.
• If your main router or access point is dual-band:
o Decide which frequency band you are going to use in Repeater mode.
o Both frequency bands in Repeater mode will still broadcast and clients will be able
to connect to either of those frequency bands.
o You can edit the wireless settings in the Wireless widget for both frequency bands.
• If your main router or access point is single-band:
o Configure Repeater mode and select the 2.4 GHz frequency band on the Linksys
Smart Wi-Fi router
o Both frequency bands will broadcast even if one is being used in Repeater mode.
o You can customize both frequency bands’ wireless settings on the Wireless
widget.
• To edit or change the Repeater settings, go to Connectivity > Internet Settings tab.
• Do not use the WAN port.
• Log in to the router's web-based set up page in Wireless Repeater mode via the IP
Address only.
• Supported encryption methods may include any of the following: WPA-Personal, WPA2-
Personal, and WPA-Mixed-Personal.
IMPORTANT: Obtain the wireless settings of the main router or access point first before
proceeding.
Procedure:
Step 1:
Enter “http://192.168.1.1” in your web browser’s Address bar and log in to your Linksys Smart Wi-
Fi router.
QUICK TIP: The default IP Address of the Linksys router is 192.168.1.1. If you have modified it,
use the new IP Address instead.
Step 2:
Click Connectivity.
Step 3:
Click Internet Settings.
Step 4:
Click Edit.
Step 5:
Select Wireless Repeater.
Step 6:
Enter the main router or access point’s Network name (SSID), Network band and Security
mode
Step 7:
Click to save settings. Click Yes to continue.
Once your Linksys Smart Wi-Fi router is turned into a Wireless Repeater, you will need to
check on your main router or access point’s DHCP Table for the new IP Address of your
Linksys Smart Wi-Fi router. You will have to use this new IP Address to log in to the
router’s web-based setup page if you need to configure it later on.
Network Interface Card (NIC) settings
Review :
A network interface card (NIC) is a hardware component without which a
computer cannot be connected over a network. It is a circuit board installed in
a computer that provides a dedicated network connection to the computer. It
is also called network interface controller, network adapter or LAN adapter
There are two main types of NIC cards with specific configuration
types: ethernet and wireless. Ethernet NIC cards require that you plug
an ethernet cable into the card to transfer network data and connect to the internet.
The other end of this cable is either plugged into your modem or a router.
• First step is to read the user's guide and familiarize yourself with the new card.
• Carefully remove the network card from its static-proof plastic envelope, and
slide it into the slot.
• Seat the card in the slot firmly with gentle pressure along the length of the
card, especially right about the slot itself.
• Snugly, screw the card to the computer frame, but do not over tighten.
• If the text in the "Device Status" box says "This device is working properly.",
then you successfully installed the card and are finished.
• If the text in the "Device status" box doesn't say "This device is working
properly.", then write down on a piece of paper what it says and continue with
next step.
• Click the Troubleshoot. Button and follow instructions. Double check you
followed the directions above. Install the most up to date device drivers.
Note:
This Installations is applicable for Windows Xp, But if you are using Windows 7 you
need to install LAN Card driver installer or use SDI driver Application in same process.
In 7th generation motherboards are all have BUILT IN (integrated) a network
interface card (NIC) means no need to install NIC.
NETWORK CABLES and INSTALLATION
CABLE is the medium through which information usually moves from one network
device to another.
TYPES OF CABLES
There are several types of cable which are commonly used with Local Area Networks
(LANs). In some cases, a network will utilize only one type of cable, other networks
will use a variety of cable types. The type of cable chosen for a network is related to
the network's topology, protocol, and size. Understanding the characteristics of
different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related
topics
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield. The metal shield
helps to block any outside interference from fluorescent lights, motors, and other
computers.
Unshielded Twisted Pair (UTP) Cable
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks
3. Now you need to untwist the wire pairs (not too much, only undo one or two twists)
so you can align them according to the EIA-TIA568B wire color sequence. I use my
fingers to straighten the wires by bending them back and forth, straightening them as
they warm up.
4. I usually have to trim the ends of the wires so they line up and create a straight
edge.
5. Now holding an RJ-45 connector with the tab side facing down, push the 8 wires
into the connector, sliding each wire into a groove. While holding the connector tab
side down the white/orange wire should be on the far left and the brown wire should
be on the far right. It is very important that the wires push all the way up and into the
connector so that when the pins are pushed down during crimping, they will make
contact with the wires. The sleave or jacket of the cable (light blue below) should also
be pushed in as far as it can go so it will be held in place once crimped. You may
want to pull the wires out and put them back in to make sure they are sliding in
correctly; this will also further straighten the wires.
notice the tab make sure it is facing down push the wires and sleave into the
connector
6. Before crimping, examine the cable and connector from the side. Did the wires
slide all the way up in to the proper grooves? Are the colors in the proper order
when observed from tab side down? Did the jacket slide all the way into the
connector? If not, you may need pull the cable out of the connector, trim the
wires or the jacket accordingly, and reinsert.
WRONG WAY - Note how the blue plastic sleeve is not inside the connector where it can be locked
into place. The wires are too long. The wires should extend only 1/2 inch from the blue cut sleeve.
7. If everything looks good, using your crimper tool insert the connector and cable
into the 8 wire slot and press down tightly. This will cause a piece of plastic in
the connector to press down on the jacket and hold the cable in the connector
preventing it from accidentally pulling out. Crimping also forces copper pins in
the connector to push down and make contact with the separate wires
8. You are now finished terminating one end of the cable. Repeat the process on
the other end of the cable and when you are done, insert the cable into a cable
tester and run a wire test to make sure that none of the wires are accidentally
crossed, by not being in the right order, or open by not touching the connector
pins. Depending on the cable tester you may need to read the manual to
understand the device output.
For a standard "Straight Through" cable, repeat all steps and wire color order on the other end of
cable. For a cross-over cable, the other end will have a different color order as shown by the
crossover picture above.
9. Lastly, test your cable by using it on your network. Attach the cable to your
computer’s NIC and the other end to your switch. Do you see green lights?
Open the Network Connections dialogue box in Windows, does it show a
properly enabled and active connection on the NIC. You can also look for the
status in your system tray network connections icon or used your Patch cable
tester.
Making a cross Over Cable Connection
Making cross over connection is same like straight through cable connection,but the
difference is the other end is different from start (A)
Activity IV
Installed at school systems, hospitals, research centers, factories, offices, and many
other end-user locations, HT Series raceway systems make the difference in
aesthetics, durability and cost savings through designs which promote easy
installation.
HT Series low voltage raceway (TSR) is a one piece, non-metallic, adhesive backed
latching raceway designed to aesthetically organize and route communications wires
including high speed UTP cable and fiber optic cable from the telecommunications
room to the work area.
InfoStream’s unique and patented design make installations quicker and easier. The
raceway and fittings are manufactured from a UL 94V-0 rated material.
Solid wall Pro-Duct
Wiring duct is designed for straight wire runs where
breakouts are not required.
Slotted Wall Duct
Standard slotted wall Pro-Duct features break-away fingers which provide additional
access for wire leads. Each section of the duct is provided with two score lines. The
upper score line is used to break away fingers when a greater opening is required.
The lower score line allows the sidewall to be smoothly cut for joints and "T's".
Certain sizes of slotted wall wiring duct are available in intrinsic blue color. This
indicates that the control panel is intrinsically safe - often required in applications
where explosive gases exist. Contact Clark Wire & Cable for details and specific sizes
of intrinsic blue, slotted wall wiring duct.
High Density Slotted Wall Duct
High-density slotted wall Pro-Duct comes with narrow fingers, equaling a 2 to 1 finger
ratio compared to standard slotted wiring duct.
The narrow fingers reduce fanning of the wires to the terminal blocks for a neater
appearance and to accommodate more compact designs and components in control
panels, communications closets, and other applications.
Network connectivity checking procedures and techniques
After having completed the configuration phase, you are now ready to face final
chapter of configuration which is inspecting and testing connectivity of computer
system and networks. The lessons in this segment will focus on the guidelines and
methods on inspecting and testing of connectivity of computer system and
networks. So at the end of this lesson you should be able to Carry out
communication check between terminals in accordance with operating systems
network configuration guides.
In general, testing is finding out how well something works. For human beings,
testing tells what level of knowledge or skill has been acquired. In computer
hardware and software development, testing is used at key checkpoints in the
overall process to determine whether objectives are being met. For example, in
software development, product objectives are sometimes tested by product
user representatives. When the design is complete, coding follows and when
finished, this is then tested at the unit or module level by each programmer; at
the component level by the group of programmers involved; and at the system
level when all components are combined together. At early or late stages, a
product or service may also be tested for usability.
Safety Precautions
The first test you need to make for a router is to ping it, or send it a signal that
proves not only that the router is there but also that your computer is connected to
the router and that all communications are taking place in a friendly manner.
The IPv4 address is your PC’s IP address on the local network. The address is
assigned by the router, using something called DHCP.
The subnet mask is a type of filter that helps PCs on the network better see each
other.
The default gateway is the IP address of the router. Make a note of it.
If you see the message, media disconnected, check both ends of the Ethernet cable.
3. Type the command ping, a space, and then the IP address of the router, or
default gateway; press Enter.
For example, using the output shown in Step 2, the command is
ping 192.168.0.1
After you press the Enter key, the ping command attempts to send four packets of
information to the router, which should echo those results to you. You see something
like this:
Pinging 192.168.0.1 with 32 bytes of data:
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Ping statistics for 192.168.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
The information is technical, but not complex. The key is that you want to see a
mess of data, as shown in the previous example. When you see the text Destination
host unreachable or Request timed out, that’s when the PC has trouble
communicating with the router.
4. Type exit and press Enter to close the Command Prompt window.
TIPs: Are there problems? You may not seem to see any, but first confirm that the gateway
address given in Step 2 is the same as the router address. If not, the PC is most likely just
pinging itself in Step 3. That works, but it’s not the same as communicating with the router.
When the router is unreachable, you probably need to turn off the router and
then turn it on again. Because most routers lack a Power button, you need to
unplug it and then plug it back in. After the power is back on, try repeating
these steps to see whether you can ping the router.
If the router remains unreachable, you need to restart the entire network.
netstat [-a] [-b] [-e] [-f] [-n] [-o] [-p protocol] [-r] [-s] [-t] [-x] [-y] [time_interval] [/?]
Make all that netstat information in the command line easier to work with by
outputting what you see on the screen to a text file using a redirection operator.
See How to Redirect Command Output to a File for complete instructions.
In this first example, we execute netstat to show all active TCP connections.
However, we want to see the computers that we're connected to in FQDN format [-f]
instead of a simple IP address.
Here's an example of what you might see:
Active Connections
Proto Local Address Foreign Address State
TCP 127.0.0.1:5357 VM-Windows-7:49229 TIME_WAIT
TCP 127.0.0.1:49225 VM-Windows-7:12080 TIME_WAIT
TCP 192.168.1.14:49194 75.125.212.75:http CLOSE_WAIT
TCP 192.168.1.14:49196 a795sm.avast.com:http CLOSE_WAIT
TCP 192.168.1.14:49197 a795sm.avast.com:http CLOSE_WAIT
TCP 192.168.1.14:49230 TIM-PC:wsd TIME_WAIT
TCP 192.168.1.14:49231 TIM-PC:icslap ESTABLISHED
TCP 192.168.1.14:49232 TIM-PC:netbios-ssn TIME_WAIT
TCP 192.168.1.14:49233 TIM-PC:netbios-ssn TIME_WAIT
TCP [::1]:2869 VM-Windows-7:49226 ESTABLISHED
TCP [::1]:49226 VM-Windows-7:icslap ESTABLISHED
As you can see, there were 11 active TCP connections at the time netstat was
executed in this example. The only protocol (in the Proto column) listed is TCP,
which was expected because we didn't use -a.
You can also see three sets of IP addresses in the Local Address column—the
actual IP address of 192.168.1.14 and both IPv4 and IPv6 versions of the loopback
addresses, along with the port each connection is using. The Foreign
Address column lists the FQDN (75.125.212.75 didn't resolve for some reason)
along with that port as well.
Finally, the State column lists the TCP state of that particular connection.
netstat -o
In this example, netstat will be run normally so it only shows active TCP
connections, but we also want to see the corresponding process identifier [-o] for
each connection so that we can determine which program on the computer initiated
each one.
Active Connections
Proto Local Address Foreign Address State PID
TCP 192.168.1.14:49194 75.125.212.75:http CLOSE_WAIT 2948
TCP 192.168.1.14:49196 a795sm:http CLOSE_WAIT 2948
TCP 192.168.1.14:49197 a795sm:http CLOSE_WAIT 2948
You probably noticed the new PID column. In this case, the PIDs are all the same,
meaning that the same program on the computer opened these connections.
To determine what program is represented by the PID of 2948 on the computer, all
you have to do is open Task Manager, select the Processes tab, and note
the Image Name listed next to the PID we're looking for in the PID column.1
Using the netstat command with the -o option can be very helpful when tracking
down which program is using too big a share of your bandwidth. It can also help
locate the destination where some kind of malware, or even an otherwise legitimate
piece of software, might be sending information without your permission.
While this and the previous example were both run on the same computer, and
within just a minute of each other, you can see that the list of active TCP
connections is considerably different. This is because your computer is constantly
connecting to, and disconnecting from, various other devices on your network and
over the internet.
netstat -s -p tcp -f
In this example, we want to see protocol specific statistics [-s] but not all of them,
just TCP stats [-p tcp]. We also want the foreign addresses displayed in FQDN
format [-f].
This is what the netstat command, as shown above, produced on the example
computer:
As you can see, various statistics for the TCP protocol are displayed, as are all
active TCP connections at the time.
netstat -e -t 5
In this final example, netstat command is executed to show some basic network
interface statistics [-e] and so that these statistics continually updated in the
command window every five seconds [-t 5].
Interface Statistics
Received Sent
Bytes 22132338 1846834
Unicast packets 19113 9869
Non-unicast packets 0 0
Discards 0 0
Errors 0 0
Unknown protocols 0
Interface Statistics
Received Sent
Bytes 22134630 1846834
Unicast packets 19128 9869
Non-unicast packets 0 0
Discards 0 0
Errors 0 0
Unknown protocols 0
^C
Various pieces of information, which you can see here and that we listed in the -
e syntax above, are displayed.
The netstat command only automatically executed one extra time, as you can see by
the two tables in the result. Note the ^C at the bottom, indicating that the Ctrl+C
abort command was used to stop the re-running of the command.
The netstat command is often used with other networking related Command Prompt
commands like nslookup, ping, tracert, ipconfig, and others.
Subnetting/Subnet Mask
A subnet mask is a number that defines a range of IP addresses available within
a network. A single subnet mask limits the number of valid IPs for a
specific network. Multiple subnet masks can organize a single network into
smaller networks (called subnetworks or subnets)
Subnetting Analogy
But why split it into class rooms? The answer is to stop classes interfering with
one another.
Now each classroom has a desk with a computer and we have been tasked with
creating a labeling system for the computers.
We need two digits for the classroom which would allow for a maximum of 100
classrooms (0-99).
We need two digits for the computer which would allow for a maximum of 100
computers (0-99).
If we also say that classroom numbers 0 and 99 and computer numbers 0 and 99
were reserved and not allowed to be assigned then we now have a maximum of 98
classrooms and 98 computers which is enough for own requirements.
There are many possible permutations we just need to pick one and tell every one
about out labeling scheme.
Lets assume we go for 2411 where 24 is the classroom and 11 is the computer.
So now when we see the following 0223 we now know that this refers to classroom
2 and computer 23.
We could even make it easier for ourselves by creating a paper mask that we put
over the label that would reveal the classroom.
IP Addresses and Subnetting
Just like in our classroom example an IP address is split into two components
a network component and a node component.
In early IPv4 networks address classes were used to identify the number of bytes
allocated to the network component.
The main classes were class A,B,C. With the allocation as follows:
Class A network,node,node,node
Class B network,network,node,node
Class C network,network,network,node
To determine the class you needed to examine the most significant byte (far left).
• 0-127 Class A
• 128-191 Class B
• 192-ccc Class C
IP Subnetting- Problems with Large Networks
Ethernet uses a shared media and is negatively effected when a large number of
nodes are connected to the same media.
This is just the same as having too many kids in the same classroom.
You can equate a network and node address to our classroom and desk number
What would happen if you had a classroom with 100’s of desks i.e. hundreds of
pupils?
The solution to the problem was to split the network into small networks called sub
networks or subnets.
Take for example a class A address which uses 1 byte for the network ID and 3
bytes for the Node ID. Written
Net.Node.Node.Node
It is important to understand that the network part of the address is only used
for routing IP packets on the public internet.
Once the packet enters the private network then the Node address is used and
the public Network address is not used.
Now a network administrator can interpret the node address any way they want, and
so it is possible to split the node address into subnet and Node. So we could
have
Net.Subnet.Node.Node or Net.Subnet.Subnet.Node.
The mask effectively hides the Node component and leaves the network and sub
network components.
If the IP address was printed on paper we could hide the last byte by placing a paper
mask over the number with three holes.
Note: if your binary is a little rusty see the binary numbers tutorial
To do this on a computer we use a number which we then logically AND with with
IP address.
1 and 1 =1
1 and 0 =0
0 and 1 =0
0 and 0 =0
So our mask to hide the last byte is 255.255.255.0 As 0 and Anything is always 0
The best way to see this is to write the numbers out in binary
000001011.00000001.00000001.00010101 = 11.1.1.21
11111111.11111111.11111111.00000000 =255.255.255.0
Subnetting on a byte boundary is the easiest to do and understand but we can also
subnet on non byte boundaries.
Worked Examples
1- You have been allocated a class A network address of 29.0.0.0. You need to
create at least 20 networks and each network will support a maximum of 160 hosts.
Would the following two subnet masks Work?
Mask 255.255.0.0 has 8 bits for the subnet and 16 bits for the host
Mask 255.255.255.0 has 16 bits for the subnet and 8 bits of the host.
2. – You have been allocated a class B network address of 135.1.0.0 and and need
to create 4 subnets each with around 200 hosts what is the easiest mask to use to
satisfy the criteria?
Easiest is to sub net on a byte boundary which would mean a subnet mask
of 255.255.255.0
This would allocate 8 bits for the subnet and 8 bits for the host.
We need to accommodate around 200 hosts which requires 8 bits which we have.
We need 4 subnets which requires 4 bits and we have 8 bits. So we have more than
enough.
Activity V
Remote Desktop
The term Remote Desktop refers to a computer that connects remotely to another,
shares control of its mouse and keyboard, and views its display. Remote Desktop is
commonly accessed through port 3389.
You can create a remote desktop connection with an operating system utility, such
as the Remote Desktop included with any Windows Operating systems versions.
Or, you can use a third-party remote desktop application or service, such
as TeamViewer or VNC.
Note The Remote Desktop included with Windows 7 Starter, Home Basic, and Home Premium
cannot act as a host. It may still be used to remotely access another computer, but those machines
cannot connect to the local computer. Hosting from one of these versions of Windows requires a
third-party program, like those mentioned above.
1. Click Start.
1. Click Start.
Note
To remotely connect to a work or school computer, your network administrator must have set up
Remote Desktop connection, and you need the correct computer address and user name.
Self Evaluation
Directions: Read the items very carefully,,
Multiple Choice
Direction: Write the letter of the correct answer.
1. What boot configuration utility allows setting the programs that will run at
startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. What Ethernet cable is used to connect two computers directly?
a. Cross Over c. Fiber optic
b. coaxial cable d. Straight through
a. CAT3 c. CAT6
b. CAT5 and CAT5e d. CAT7
ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. UTP ________________________________________
2. STP ________________________________________
3. IP ________________________________________
4. TCP /IP _____________________________________
5. HTTP _______________________________________
6. FTP _______________________________________
7. NIC _______________________________________
8. IMAP _______________________________________
9. LAN _______________________________________
10. DHCP _______________________________________
Skills Checklist
Configuration Skills
Directions: Listed below are the most important skills one must have in order
to configure computer systems and networks. The matrix lists the skills
expected you to master. Check the appropriate column which describes the
level of your confidence with the given skills.
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the next page to
determine your initial configuration ability.
Numerical and Verbal interpretation
Electronic Resources:
“Definition of Configuration” Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
https://www.electronicproducts.com/Interconnections/Wire_and_Cable/How_to_crea
te_your_own_Ethernet_cross_over_cable.aspx#
https://www.instructables.com/id/How-to-make-your-own-Ethernet-cable/
http://danscourses.com/how-to-make-a-straight-through-ethernet-cable/
https://en.wikipedia.org/wiki/Ethernet_crossover_cable
https://www.pinterest.ph/pin/110197522112978231/
https://www.electriduct.com/Electriduct-Latching-Surface-Cable-Raceways.html
http://www.clarkwire.com/RacewaysandDucts.htm
Google.com/search?sxsrf=ALeKk01ONIzdXyLzZIevymFKn1-
rQWZIpA%3A1591318575993&ei=L5jZXvWZPJPg-
AbT3oLAAw&q=network+addressing+&oq=network+addressing+&gs_lcp=CgZwc3kt
YWIQAzIECAAQRzIECAAQRzIECAAQRzIECAAQRzIECAAQRzIECAAQRzIECAA
QRzIECAAQR1CK0BBYvJ0RYPqiEWgAcAJ4AIABAIgBAJIBAJgBAKABAaoBB2d3c
y13aXo&sclient=psy-ab&ved=0ahUKEwi17cjTu-
npAhUTMN4KHVOvADgQ4dUDCAw&uact=5
https://www.dummies.com/computers/pcs/how-to-ping-the-windows-network-router/
https://www.computerweekly.com/tip/How-to-use-a-netstat-command-in-Windows-
to-watch-open-ports
https://www.lifewire.com/netstat-command-2618098
http://www.steves-internet-guide.com/subnetting-subnet-masks-explained/
https://www.techopedia.com/definition/3421/remote-desktop
https://www.computerhope.com/jargon/r/remodesk.htm
GLOSARY
Configuration- the way a system is set up. Configuration can refer to either
hardware or software, or the combination of both.
Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to
transmit data. Fiber optics has several advantages over traditional
metal communications lines.
Ping- a command prompt used to test the ability of the source computer to
reach a specified destination computer.
Protocol- is the special set of rules that end points in a telecommunication
connection use when they communicate.
A set of public standards that specify how packets of information are TCP/IP
exchanged between computers over one or more networks.
Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
HTTP
video are exchanged on the World Wide Web (WWW).
File Transfer Protocol provides services for file transfer and manipulation.
FTP allows multiple simultaneous connections to remote file systems. FTP
Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server SMTP
ACTIVITY II.
Identifying IP Address Classes
Directions: In this worksheet, I will write several IP addresses with their
appropriate subnet masks. You will write which IP Address Class is
appropriate in the IP Address Class column in the chart below. An example
has been provided for you.
IP
Address
IP Address Subnet Mask Class
10.0.0.0 255.0.0.0 A
10.0.0.1 255.0.0.0 A
192.168.1.1 255.255.0.0 B
169.254.1.2 255.255.255.127 C
10.256.254.246 255.255.255.255 C
ACTIVITY III..
Identify the following. Choose your answer from the grid below. Use a
separate sheet of paper in answering.
ANSWER
#1 Internet #6 Topology
#3 GAN #8 LAN
Activity V
1. A1– 256-2= 254 – Why? host addresses of all 0’s and all 1’s
are not allowed.
2. A2- Yes you only need 8 bits for 100 hosts and both subnet
masks would give you that.
Self Evaluation
Directions: Read the items very carefully. Write your answer in a clean sheet
of paper.
Multiple Choice
Direction: Write the letter of the correct answer.
1. What boot configuration utility allows setting the programs that will run at
startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. What Ethernet cable is used to connect two computers directly?
a. Cross Over c. Fiber optic
b. coaxial cable d. Straight through
5. Which of the following is the most commonly used networking cable
category?
a. CAT3 c. CAT6
b. CAT5 and CAT5e d. CAT7
ACRONYMS
Direction: Give the complete meaning of the following acronyms.
11. UTP – unshielded twisted pair
12. STP – shielded twisted pair
13. IP - internet protocol
14. TCP /IP transmission control protocol
15. HTTP - hypertext transfer protocol
16. FTP file transfer protocol
17. NIC network interface card
18. IMAP internet message access protocol
19. LAN local area network
20. DHCP dynamic host configuration protocol