0% found this document useful (0 votes)
329 views

G12 - CSS - 1ST QTR - SLM - Edf PDF

Uploaded by

Bonus Maribel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
329 views

G12 - CSS - 1ST QTR - SLM - Edf PDF

Uploaded by

Bonus Maribel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 105

TECHNOLOGY AND LIVELIHOOD

EDUCATION

Information and Communications


Technology
Computer System Servicing NC II

WRITER
EDWIN D. FERRER
ICT CSS TEACHER

SANTA CRUZ NATIONAL HIGH SCHOOL

1ST QUARTER OF COMPUTER SYSTEMS SERVICING NC II


GRADE 12

LESSON 9. SETTING-UP COMPUTER NETWORKS (SUCN)


LO 2: Set network configuration

CODE : TLE_IACSS9- 12SUCN-IVa-j-33


LESSON 9. SETTING-UP COMPUTER NETWORKS (SUCN)
LO 2: Set network configuration

Network design
Network design refers to the planning of the implementation of a computer
network infrastructure. Network design is generally performed by network designers,
engineers, IT administrators and other related staff. It is done before the
implementation of a network infrastructure.

Network design involves evaluating, understanding and scoping the network to be


implemented. The whole network design is usually represented as a network diagram
that serves as the blueprint for implementing the network physically. Typically,
network design includes the following:

• Logical map of the network to be designed


• Cabling structure
• Quantity, type and location of network devices (router, switches, servers)
• IP addressing structure
• Network security architecture and overall network security

Network design
Logical map of the network to be designed

Logical map of the network designed

A logical map of the network design is one that appears to the user as a single,
separate entity although it might in fact be either an entity created from
multiple networks or just a part of a larger network. ...
"When designing a network, the "logical" part refers to the IP addressing
scheme used within the network.

Two Different type of Logical Map network Design

A logical network diagram describes the way information flows through


a network. Therefore, logical network diagrams typically show subnets
(including VLAN IDs, masks, and addresses), network devices like routers
and firewalls, and routing protocols.

A physical network diagram shows how the network devices are physically
connected together, and therefor all ports on all devices on the network are
represented here. This will include cables.
Network Cabling structure

• Cabling structure

Networking cables are networking hardware used to connect


one network device to other network devices or to connect two or
more computers to share printers, scanners etc. ... Electrical connections using
twisted pair or coaxial cable are used within a building.
Quantity, type and location of network devices (router, switches, servers)

Network devices include field devices, router devices, gateway devices, and mesh
hand-held devices. ... Wireless HART networks can be configured into a number of
different topologies ... Network equipment is often defined by protocol or port type. ...
represents the logical location on the network where the device resides
IP addressing structure

IP addressing structure

An IP address is a 32-bit number that uniquely identifies a host (computer or other


device, such as a printer or router) on a TCP/IP network. IP addresses are
normally expressed in dotted-decimal format, with four numbers separated by
periods, such as 192.168. 123.132.

A network address is an identifier for a node or host on a


telecommunications network. Network addresses are designed to be unique
identifiers across the network, although some networks allow for local,
private addresses, or locally administered addresses that may not be unique.

The four types of IP address

There are four different types of IP addresses: public, private, static and dynamic.
While the public and private are indicative of the location of the network, private
being used inside a network while the public is used outside of a network, static and
dynamic indicate permanency

The 3 major classes of an IP network

IP addressing supports three different commercial address classes; Class A, Class


B, and Class C. In a class A address, the first octet is the network portion, so the
class A address of, 10.1. 25.1, has a major network address of 10. Octets 2, 3, and
4 (the next 24 bits) are for the hosts.
Network security architecture and overall network security

Network security architecture and overall network security

Network security architects are responsible for analyzing network data and systems
to select the most appropriate control mechanism for the security required. They
may also have a hand in selecting software and hardware used to apply the control
system.

There are 4 main types of network security that you can take
advantage of and we are also going to cover why you need them.

• Network Access Control (NAC) ...


• Application security. ...
• Antivirus and Antimalware Software. ...
• Email Security. ...
• Wireless Security.
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also
uses protocols. Part of the protocol specifies where on the envelope the
delivery address needs to be written. If the delivery address is written in the
wrong place, the letter cannot be delivered. Internet protocol works in a
similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications define
the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to
arrive within a certain amount of time so that computers do not wait
indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also initiate
alternative actions if the network does not meet the timing rules. Many
protocols consist of a suite of other protocols that are stacked in layers.
These layers depend on the operation of the other layers in the suite to
function properly.

The main functions of protocols are:


Identifying errors
Compressing the data
Deciding how the data should be sent
Addressing the data
Deciding how to announce sent and received data

To understand how networks and the Internet work, you must be


familiar with the commonly used protocols. These protocols are used to
browse the web, send and receive e-mail, and transfer data files. You will
encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described here:
TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP)
suite of protocols has become the dominant standard for
internetworking. TCP/IP represents a set of public standards that
specify how packets of information are exchanged between computers
over one or more networks.
IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is
the protocol suite originally employed by Novell Corporation’s network
operating system, NetWare. It delivers functions similar to those
included in TCP/IP. Novell in its current releases supports the TCP/IP
suite. A large installed base of NetWare networks continues to use
IPX/SPX.
NetBEUI: NetBIOS Extended User Interface is a protocol used
primarily on small Windows NT networks. NetBEUI cannot be routed or
used by routers to talk to each other on a large network. NetBEUI is
suitable for small peer-to-peer networks, involving a few computers
directly connected to each other. It can be used in conjunction with
another routable protocol such as TCP/IP. This gives the network
administrator the advantages of the high performance of NetBEUI
within the local network and the ability to communicate beyond the
LAN over TCP/IP.

Commonly Used Internet Protocol


AppleTalk: AppleTalk is a protocol suite used to network Macintosh
computers. It is composed of a comprehensive set of protocols that
span the seven layers of the Open Systems Interconnection (OSI)
reference model. The AppleTalk protocol was designed to run over
Local Talk, which is the Apple LAN physical topology. This protocol is
also designed to run over major LAN types, notably Ethernet and
Token Ring.
HTTP: Hypertext Transfer Protocol governs how files such as text,
graphics, sound, and video are exchanged on the World Wide Web
(WWW). The Internet Engineering Task Force (IETF) developed the
standards for HTTP.
FTP: File Transfer Protocol provides services for file transfer and
manipulation. FTP allows multiple simultaneous connections to remote
file systems.
SSH: Secure Shell is used to securely connect to a remote computer.
Telnet: It is an application used to connect to a remote computer that
lacks security features.
POP3: Post Office Protocol is used to download e-mail from a remote
mail server.
IMAP: Internet Message Access Protocol is also used to
download e-mail from a remote mail server.
SMTP: Simple Mail Transfer Protocol is used to send e-mail to a
remote e-mail server.
The more you understand about each of these protocols, the more you
will understand how networks and the Internet work.

IP Addressing
An IP address is a number that is used to identify a device on the
network. Each device on a network must have a unique IP address to
communicate with other network devices. Network devices are those that
move data across the network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives information on the network)
and network device must have an IP address within the same network to be
able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide
a label or address for the person’s physical aspect—the body. A person’s
mailing address, on the other hand, relates to where the person lives or picks
up mail. This address can change. On a host, the Media Access Control
(MAC) address is assigned to the host Network Interface Card (NIC) and is
known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that
fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called octets. An IP address, even in this
grouped format, is hard for humans to read, write, and remember. Therefore,
each octet is presented as its decimal value, separated by a decimal point or
period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.

Imagine if you had to enter the 32-bit binary equivalent of this:


11000000101010000000000100000101. If you mistyped just 1 bit, the
address would be different, and the host may not be able to communicate
on the network. The logical 32-bit IP address is hierarchical and is
composed of two parts. The first part identifies the network, and the
second part identifies a host on that network. Both parts are required in an
IP address. For example, if a host has an IP address of 192.168.18.57,
the first three octets, 192.168.18, identify the network portion of the
address, and the last octet, 57, identifies the host. This is called
hierarchical addressing, because the network portion indicates the
network on which each unique host address is located. Routers only need
to know how to reach each network, not the location of each individual
host.

. Five Classes of IP Address

IP Classes Purpose
Used for large networks, implemented by large companies
Class A and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask (Subnetting)
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are mapped to the first three classes of IP
addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address
is the network portion
255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
255.255.255.0: Class C, which indicates that the first three octets of
the IP address are the network portion

Table 7. Default Subnet Masks for Usable IP Addresses

Class A Network Host


Octet 1 2 3 4

Class B Network Host


Octet 1 2 3 4

Class C Network Host


Octet 1 2 3 4

Class D addresses are used for multicast groups. There is no need to


allocate octet or bits to separate network and host addresses. Class E
addresses are reserved for research use only.

IpConfig

Ipconfig is a command used to find out the IP address of a certain


network you are connected to.

How to use the ipconfig command?


Click on Start Button, then type cmd (command prompt) on the
search box.
A black screen will appear as shown in the figure below.
Command Prompt Window

Type ipconfig and press enter. The figure below shows the IP
configuration window using the ipconfig command. The information
from this window will be useful because it shows the IP address,
subnet mask and default gateway of a network you are connected
to.

IP Configuration in CMD Window


Assigning a static IP Address
In a home network with several computers and devices, it is ideal to
assign each of them a specific address. This is for the purpose of avoiding
problems when you do troubleshooting which requires figuring out the IP
address of each of them. It is also a means to prevent address conflicts
between the devices. You can also manage them with ease if you have
assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows
base computer system:
Open the Control Panel’s Network Connections icon.
Open the icon representing your computer’s Wireless network connection.
Click the Properties button in the Status dialog box.
From the list of items, choose Internet Protocol (TCP/IP).

Wireless Network Connections Properties Dialog Box

Click the Properties button. The Internet Protocol (TCP/IP)


Properties dialog box appears.
TCP / IPV4 Dialog Box

Type the IP address for your computer. Enter the appropriate IP


Address in the IP address section.
Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.

Type the default gateway address. The default gateway is the router,
so type the router’s address. Figure 54 shows an example of assigning
an IP Address, Subnet mask and default gateway.

Assigning an IP Address
Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is
something that your ISP provides.
Click OK to confirm the settings.
Close all other open dialog boxes and windows.

Assigning a Dynamic IP Address


If more than a few computers comprise the LAN, manually configuring
IP addresses for every host on the network can be time-consuming and prone
to errors. In this case, using a Dynamic Host Configuration Protocol (DHCP)
server would automatically assign IP addresses and greatly simplify the
addressing process.

Assigning a Dynamic IP Address

Dynamic Host Configuration Protocol (DHCP) is a software utility


used to dynamically assign IP addresses to network devices. This dynamic
process eliminates the need to manually assign IP addresses. A DHCP
server can be set up and the hosts can be configured to automatically obtain
an IP address. When a computer is set to obtain an IP address automatically,
the other entire IP addressing configuration boxes are dimmed or disabled.
The server maintains a list of IP addresses to assign, and it manages the
process so that every device on the network receives a unique IP address.
Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins
the network.

These are the IP address information that a DHCP server can assign to
hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a Domain Name System (DNS) server
address

The DHCP server receives a request from a host. The server then
selects IP address information from a set of predefined addresses that are
stored in a database. After the IP address information is selected, the DHCP
server offers these values to the requesting host on the network. If the host
accepts the offer, the DHCP server leases the IP address for a specific period
of time.
Using a DHCP server simplifies the administration of a network
because the software keeps track of IP addresses. Automatically configuring
TCP/IP also reduces the possibility of assigning duplicate or invalid IP
addresses. Before a computer on the network can take advantage of the
DHCP server services, the computer must be able to identify the server on
the local network. You can configure a computer to accept an IP address from
a DHCP server by clicking the Obtain an IP address automatically option in
the NIC configuration window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain
an IP address, the Windows operating system automatically assigns a private
IP address. If your computer is assigned an IP address in the range of
169.254.0.0 to 169.254.255.255, it can communicate with only other
computers in the same range. An example of when these private addresses
would be useful is in a classroom lab where you want to prevent access
outside to your network. This operating system feature is called Automatic
Private IP Addressing (APIPA). APIPA continually requests an IP address
from a DHCP server for your computer.
Ping
The ping is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The ping
command is usually used as a simple way to verify that a computer can
communicate over the network with another computer or network device.
The ping command operates by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination computer and
waiting for a response. How many of those responses are returned, and how
long it takes for them to return, are the two major pieces of information that
the ping command provides.

Table 8. Ping Command Syntax


Syntax Description
-t Using this option will ping the target until you force it to stop
using Ctrl-C.

-a - This ping command option will resolve, if possible,


the hostname of an IP address target.

-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count Use this ping command option to specify the number
of hops between the computer and the target computer or
device that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that only
the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with
the -4 option, is only necessary when pinging a hostname.

target This is the destination you wish to ping, which is either an IP


address or a hostname.
/? Use the help switch with the ping command to show detailed
help about the command's several options.

Using the ping Command


Ping is one of your most important tools in troubleshooting Internet
problems. It shows you whether the Domain Name Server is working, whether
the computer you are trying to talk to is reachable, and how long it takes to
get there. It does this at a very low level — only the most basic Internet
functions have to be up and running.

▪ Click on Start Button, then type cmd (command prompt) on the search box then
select command prompt icon on the top.
▪ A black screen will appear as shown in the figure below.
▪ Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.
Command prompt
Pinging

This output shows several things:

Decoding names to network addresses — A domain name server


(DNS) resolves machine names to numeric addresses. A single
machine can have many names, all of which resolve to the same
Internet address. In the example just given, the name www.google.com
resolves to the Internet address 122.2.152.23.

Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client
machine sent out the ping message until a reply came back (1 ms is 1
millisecond, or one thousandth of a second). The variability in the times
you see reflects that networks do not always respond identically.
Differing amounts of traffic on the communication lines or differing
loads on the server are common causes. You will see very different
response times depending on the access equipment you use.
Routing hop count — The part of the replies that says TTL=50 tells
you about the route the message took from one point to another. The
acronym TTL stands for Time to Live, which is a measure of how many
rerouting from one point to another the packet has to go through before
IP declares it undeliverable. The number following TTL (called the hop
count) is a number that usually starts at 255 and counts down by one
every time the message gets rerouted through an intermediary
computer.

ACTIVITY I
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on one sheet of paper.

Protocol Definition Protocol

A set of public standards that specify how packets of information are


exchanged between computers over one or more networks.
Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
video are exchanged on the World Wide Web (WWW).
File Transfer Protocol provides services for file transfer and manipulation.
FTP allows multiple simultaneous connections to remote file systems.

It is an application used to connect to a remote computer that lacks security


features
Post Office Protocol is used to download e-mail from a remote mail server.
Internet Message Access Protocol is also used to download e-mail from a remote
mail server

Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server
ACTIVITY II.
Identifying IP Address Classes
Directions: In this worksheet, I will write several IP addresses with their
appropriate subnet masks. You will write which IP Address Class is
appropriate in the IP Address Class column in the chart below. An example
has been provided for you.

IP
Address
IP Address Subnet Mask Class
10.0.0.0 255.0.0.0
10.0.0.1 255.0.0.0
192.168.1.1 255.255.0.0
169.254.1.2 255.255.255.127
10.256.254.246 255.255.255.255

ADDITIONAL FACTS (optional only. if you have internet connection)

To deepen your understanding with regard to the Internet


Protocols, IP Address and subneting, utilize the Internet and the
website www.professormesser.com, watch and learn from the video
presentations. Use the URLs below:

1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
Different Types of Network Topology

Network Topology signifies the way in which intelligent devices in the network see
their logical relations to one another. The use of the term "logical" here is significant.
That is, network topology is independent of the "physical" layout of the network.
Even if networked computers are physically placed in a linear arrangement, if they
are connected via a hub, the network has a Star topology, rather than a Bus
Topology. In this regard the visual and operational characteristics of a network are
distinct; the logical network topology is not necessarily the same as the physical
layout.

Bus Topology
It is often used when network installation is small, simple or temporary. On a typical
bus network the cable is just 1 or more wires with no active electronics to amplify
the signal or pass it along from computer to computer. This makes the bus a passive
topology. When 1 computer sends a signal up the wire all the computers receive the
information but only one with the address that matches accepts the information, the
rest disregard the message.

Advantages:
• Easy to use and to understand.
• Requires least amount of cable to connect the computers together. It is therefore less
expensive than other cabling arrangements.
• It is easy to extend a bus; two cables can be joined into 1 longer cable with a BNC, Barrel
connector making a longer cable and allowing more computers to join the network.
Disadvantages:

• Heavy network traffic can slow a bus considerably as only 1 computer can send a message
at a time.
• It is difficult to troubleshoot the bus. A cable break or loose connector causes reflection and
stops all the activity.

Star Topology

In this kind of topology all the cables run from the computers to the central location
where they are all connected by a device called hub or switch. Each computer on a
star network communicates with a central device that resends the message either to
each computer or only to the destination computer, example if it is a hub then it will
send to all and if it is a switch then it will send to only destination computer. When
network expansion is expected and when the greater reliability is needed, star
topology is the best.

Advantages:
It is easy to modify and add new computers without disturbing the rest of the network.
The center of the star network is a good place to diagnose the faults.
Single computer failure does not necessarily bring down the whole star network

Disadvantages:
If the central device fails, the whole network fails to operate.
Star networking is expensive because all network cables must be pulled to one central point,
requires more cable than other network topologies
Ring Topology
In this type each computer is connected to the next computer with the last one
connected to the first. Each retransmits what it receives from the previous computer.
The message flows around the ring in one direction. The ring network does not
subject to signal loss problem as a bus network experiences. There is no termination
because there is no end to the ring.

Advantages:

• Each node has equal access.


• Capable of high speed data transfer

Disadvantages:

• Failure of one computer on the ring can affect the whole network.
• Difficult to troubleshoot the network.
Types of Computer Network?

Personal Area Network (PAN)

A personal area network (PAN) is a computer network used for communication


among computer devices close to one person. Some examples of devices that may
be used in a PAN are printers, fax machines, telephones, PDA’s or scanners. The
reach of a PAN is typically within about 20-30 feet (approximately 6-9 meters).

Personal area networks may be wired with computer buses such as USB] and FireWire. A
wireless personal area network (WPAN) can also be made possible with network
technologies such as Bluetooth.
Local Area Network (LAN)

A network covering a small geographic area, like a home, office, or building. Current
LANs are most likely to be based on Ethernet technology. For example, a library will
have a wired or wireless LAN for users to interconnect local devices (e.g., printers
and servers) and to connect to the internet. All of the PCs in the library are
connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a
system of interconnection devices and eventually connect to the internet.

In LAN you can run the multiple devices to share a transmission medium. You can use the
different topology mainly bus and ring in LAN. The communication quality is better IN LAN,
the transmission error rate are low as compare to WAN
Client/Server Vs Peer-to-Peer Networks

Although every computer on a LAN is connected to every other, they do not


necessarily mean all communicate with each other. There are two basic types of
LAN, based on communication patterns between the machines, called client/server
networks and peer-to-peer networks.

Client/Server Networks
Every computer has a distinct role, that of either a client or a server. A server is
designed to share its resources among client computers on the network. The
Client/Server is composed of:

Servers
These are located in secured areas, such as locked closets and data centers,
because they hold the organization's most valuable data and do not have the
accessed by operators on a continuous basis.
The server runs a special network operating system such as windows server2000,
Windows NT Server, Windows 2000 or Novell Netware.

Clients
The rest of the computers on the network functions as client. A client standard PC
that is running an operating system such as DOS or Windows.(WINDOWS
7,WINDOWS 10)

Example of server client network by Amanda networks


Peer-to-Peer Network

In a peer-to-peer network, every computer is equal and can communicate with other
computer on a network to which it has been granted access rights. Essentially, every
computer in this network functions as both server and client. Peer-to-peer network
can be as small as two computers as many as hundreds of units.

There is no theoretical limit to the size of a peer-to-peer network, performance drops


significantly and security becomes a major headache on peer -based network with more
than 10 computers. Also, Microsoft imposes a 10-station limit on computers running
Windows 2000 Professional who are sharing resources with other system. For this reason, it
is better you switch to a client/server network when your network climbs to 10 stations.
CAMPUS AREA NETWORK (CAN)

A network that connects two or more LANs but that is limited to a specific and
contiguous geographical area such as a college campus, industrial complex, or a
military base. A CAN may be considered a type of MAN (metropolitan area network),
but is generally limited to an area that is smaller than a typical MAN. This term is
most often used to discuss the implementation of networks for a contiguous area.
This should not be confused with a Controller Area Network.

Metropolitan Area Network (MAN)

A Metropolitan Area Network is a network that connects two or more Local Area
Networks or Campus Area Networks together but does not extend beyond the
boundaries of the immediate town, city, or metropolitan area. Multiple routers,
switches & hubs are connected to create a MAN.
Wide Area Network (WAN)

A WAN is a data communications network that covers a relatively broad geographic


area (i.e. one city to another and one country to another country) and that often uses
transmission facilities provided by common carriers, such as telephone companies.
WAN technologies generally function at the lower three layers of the OSI reference
model: the physical layer, the data link layer, and the network layer.
Global Area Network (GAN)

Global area networks (GAN) specifications are in development by several groups,


and there is no common definition. In general, however, a GAN is a model for
supporting mobile communications across an arbitrary number of wireless LANs,
satellite coverage areas, etc. The key challenge in mobile communications is
"handing off" the user communications from one local coverage area to the next. In
IEEE Project 802, this involves a succession of terrestrial Wireless local area
networks (WLAN).
Internetwork

Two or more networks or network segments connected using devices that operate at
layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any
interconnection among or between public, private, commercial, industrial, or
governmental networks may also be defined as an internetwork.
In modern practice, the interconnected networks use the Internet Protocol. There are
at least three variants of internetwork, depending on who administers and who
participates in them:

• Intranet
• Extranet
• Internet

INTRANET
An intranet is a set of interconnected networks, using the Internet Protocol and uses
IP-based tools such as web browsers and ftp tools, that is under the control of a
single administrative entity. That administrative entity closes the intranet to the rest
of the world, and allows only specific users. Most commonly, an intranet is the
internal network of a company or other enterprise.

INTRANET design must facilitate the usability of the site and aid employees.
An intranet should be focused on facilitating the quickest possible access to information
and tools that help employees do their jobs. There's no need to sell employees, they already
work for the organization.
Extranet
An extranet is a network or internetwork that is limited in scope to a single
organization or entity but which also has limited connections to the networks of one
or more other usually, but not necessarily, trusted organizations or entities (e.g. a
company's customers may be given access to some part of its intranet creating in
this way an extranet, while at the same time the customers may not be considered
'trusted' from a security standpoint). Technically, an extranet may also be
categorized as a CAN, MAN, WAN, or other type of network, although, by definition,
an extranet cannot consist of a single LAN; it must have at least one connection with
an external network.

Intranets are the virtual hub of collaboration in organizations. Unlike public websites, which
enable organizations to communicate and broadcast their value proposition to customers,
users and, in general, external stakeholders, Intranets are meant to enable internal
communication and collaboration
Internet
Internet a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks using standardized
communication protocols.

The Internet is a global wide area network that connects computer systems across
the world. ... The Internet provides different online services.
Some examples include: Web – a collection of billions of webpages that you can
view with a web browser. Email – the most common method of sending and
receiving messages online
ACTIVITY III..

Identify the following. Choose your answer from the grid below. Use a
separate sheet of paper in answering.

Topology Ring Topology Bus Topology

Network Star Topology GAN


LAN Extranet MAN
WAN Internet Intranet

1. The World Wide Web.


2. The internal network of a company or other enterprise.
3. A model for supporting mobile communications across an
arbitrary number of wireless LANs.
4. A data communications network that covers a relatively broad
geographic area.
5. A network that connects two or more Local Area Networks or
Campus Area Networks together.
6. It signifies the way in which intelligent devices in the network see
their logical relations to one another
7. It is the interconnected group of computers.
8. A network covering a small geographic area, like a home.
9. All the cables run from the computers to the central location
where they are all connected by hub
_____ 10. Each computer is connected to the next computer with the last one
connected to the first
Configure router/Wireless Access Point
Directions: Configure and test the wireless settings on the
LinksysWRT300N.

Recommended Equipment
A computer with Windows 10 or / Windows 7
A Wireless NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable

Wireless Settings
Step 1
Connect first to the computer LAN Card (NIC)_and one of the HUB Port
ports on the wireless router with an patch cable.
Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
Choose start > Run, and type “cmd”. Press the Enter key.
Type ipconfig.
What is the default gateway for the computer but not necessary.

Step 3
Open your any browser. Type the default IP of the router

“192.168.1.1” in the “Address bar ” field, and then press Enter.

Browser Window
Connect to 192.168.1.1 Window
Type “User” in the “user name” field.
Type “admin” in the “Password” field.

Step 4
Click the “Wireless” tab.
Choose “Mixed” in the “Network Mode” drop-down box.

Wireless Tab Window


Click Save Settings.
The “Settings are successful” screen appears.

Settings are Successful Window, Click Continue

Step 4
Choose Wireless, select” Basic Wireless Settings “Type in
your new SSID name to change the “SSID name”, then
“Enable” SSID Broadcast then Save the new settings and
wait for your router to restart.

Basic wireless Settings


Step 5

Connect a PC to your wireless network

Select the Network or icon in the notification area.


In the list of networks, choose the Network SSID that you want to connect to,
and then select Connect.
Type the security key (often called the password).
Configuring the Wireless Repeater mode

Some Linksys Smart Wi-Fi Routers support Wireless Repeater mode. To check if
your router has this option, log in to the router's web-based setup page and click
on Connectivity > Internet Settings.
Tips:

• Only one (1) frequency band on your router will be used for repeating the signal.
• Determine which frequency band to repeat.
• Both frequency bands, however, can be used for broadcasting to connect other clients.
• If your main router or access point is dual-band:
o Decide which frequency band you are going to use in Repeater mode.
o Both frequency bands in Repeater mode will still broadcast and clients will be able
to connect to either of those frequency bands.
o You can edit the wireless settings in the Wireless widget for both frequency bands.
• If your main router or access point is single-band:
o Configure Repeater mode and select the 2.4 GHz frequency band on the Linksys
Smart Wi-Fi router
o Both frequency bands will broadcast even if one is being used in Repeater mode.
o You can customize both frequency bands’ wireless settings on the Wireless
widget.
• To edit or change the Repeater settings, go to Connectivity > Internet Settings tab.
• Do not use the WAN port.
• Log in to the router's web-based set up page in Wireless Repeater mode via the IP
Address only.
• Supported encryption methods may include any of the following: WPA-Personal, WPA2-
Personal, and WPA-Mixed-Personal.

IMPORTANT: Obtain the wireless settings of the main router or access point first before
proceeding.

Procedure:
Step 1:
Enter “http://192.168.1.1” in your web browser’s Address bar and log in to your Linksys Smart Wi-
Fi router.

QUICK TIP: The default IP Address of the Linksys router is 192.168.1.1. If you have modified it,
use the new IP Address instead.

Step 2:
Click Connectivity.
Step 3:
Click Internet Settings.

Step 4:
Click Edit.

Step 5:
Select Wireless Repeater.
Step 6:
Enter the main router or access point’s Network name (SSID), Network band and Security
mode

Step 7:
Click to save settings. Click Yes to continue.
Once your Linksys Smart Wi-Fi router is turned into a Wireless Repeater, you will need to
check on your main router or access point’s DHCP Table for the new IP Address of your
Linksys Smart Wi-Fi router. You will have to use this new IP Address to log in to the
router’s web-based setup page if you need to configure it later on.
Network Interface Card (NIC) settings

Review :
A network interface card (NIC) is a hardware component without which a
computer cannot be connected over a network. It is a circuit board installed in
a computer that provides a dedicated network connection to the computer. It
is also called network interface controller, network adapter or LAN adapter

There are two main types of NIC cards with specific configuration
types: ethernet and wireless. Ethernet NIC cards require that you plug
an ethernet cable into the card to transfer network data and connect to the internet.
The other end of this cable is either plugged into your modem or a router.

Network Interface Card (NIC): Types, Function & Definition

Network Interface Cards


A computer uses a network interface card (NIC) to become part of a network. The
NIC contains the electronic circuitry required to communicate using a wired
connection (e.g., Ethernet) or a wireless connection (e.g., WiFi). A network interface
card is also known as a network interface controller, network adapter, or Local Area
Network (LAN) adapter.
Since Ethernet is so widely used, most modern computers have a “NIC built in” into
the motherboard. A separate network card is not required unless some other type of
network is used. Here, you can see an Ethernet connection built into a motherboard.
Several other connections are located directly adjacent to the Ethernet connection.

Ethernet connection integrated on a motherboard


Installation Process in Windows

• First step is to read the user's guide and familiarize yourself with the new card.

• Power down PC and remove the AC power cord.

• Open the computer case.

• Find an available Peripheral Component Interconnect (PCI) slot on the


motherboard and remove slot insert if one exists.

• Carefully remove the network card from its static-proof plastic envelope, and
slide it into the slot.

• Seat the card in the slot firmly with gentle pressure along the length of the
card, especially right about the slot itself.
• Snugly, screw the card to the computer frame, but do not over tighten.

• Close the computer case.

• Plug your computer in and power it up.

• Click Start, then click Control Panel.

• In Category View (vs. Classic View) click Performance and Maintenance.


• Click "System" icon at bottom of window.

• Click the Hardware tab.

• Click the Device Manager button.

• Double-click Network Adapters.

• Beneath it should appear the name of your Ethernet card.

• Next, double click the name of your Ethernet adapter.

• If the text in the "Device Status" box says "This device is working properly.",
then you successfully installed the card and are finished.
• If the text in the "Device status" box doesn't say "This device is working
properly.", then write down on a piece of paper what it says and continue with
next step.

• Click the Troubleshoot. Button and follow instructions. Double check you
followed the directions above. Install the most up to date device drivers.

Note:
This Installations is applicable for Windows Xp, But if you are using Windows 7 you
need to install LAN Card driver installer or use SDI driver Application in same process.
In 7th generation motherboards are all have BUILT IN (integrated) a network
interface card (NIC) means no need to install NIC.
NETWORK CABLES and INSTALLATION

What is Network Cabling?


Networking cables are networking hardware used to connect one network device to
other network devices or to connect two or more computers to share printers, ...

CABLE is the medium through which information usually moves from one network
device to another.

TYPES OF CABLES
There are several types of cable which are commonly used with Local Area Networks
(LANs). In some cases, a network will utilize only one type of cable, other networks
will use a variety of cable types. The type of cable chosen for a network is related to
the network's topology, protocol, and size. Understanding the characteristics of
different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.

The following sections discuss the types of cables used in networks and other related
topics

• Thin Coaxial Cable. ...


• Unshielded Twisted Pair (UTP)
• Shielded Twisted Pair (STP) ...
• Fiber Optic Cable
• Wireless LAN

Coaxial Cable

Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield. The metal shield
helps to block any outside interference from fluorescent lights, motors, and other
computers.
Unshielded Twisted Pair (UTP) Cable
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks

Commonly used types of UTP cabling are as follows:


UTP MAX. CABLE
CATEGORY DATA RATE LENGTH TYPE APPLICATION
CAT1 Up to 1Mbps twisted pair Old Telephone Cable
CAT2 Up to 1Mbps twisted pair Token Ring Cable
CAT3 Up to 1Mbps 100 meters twisted pair Token Ring and 10Base- T Ethernet
CAT4 Up to 1Mbps 100 meters twisted pair Token Ring Network
CAT5 Up to 1Mbps 100 meters twisted pair Ethernet, Fast Ethernet, Ring Network
CAT5E Up to 1Mbps 100 meters twisted pair Ethernet, Fast Ethernet, Gigabit Ethernet
CAT6 Up to 1Mbps 100 meters twisted pair Gigabit Ethernet,10 Gigabit Ethernet (55Meters)
CAT6E Up to 1Mbps 100 meters twisted pair Gigabit Ethernet,10 Gigabit Ethernet (55Meters)
CAT7 Up to 1Mbps 100 meters twisted pair Gigabit Ethernet,10 Gigabit Ethernet (100Meters)
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is an RJ-45 connector.
This is a plastic connector that looks like a large telephone-style connector. A slot
allows the RJ-45 to be inserted only one way.

Shielded Twisted Pair (STP) Cable


The extra covering in shielded twisted pair wiring protects the transmission line from
electromagnetic interference leaking into or out of the cable. STP cabling often
is used in Ethernet networks, especially fast data rate Ethernets.
Fiber Optic
A fiber optic cable is a network cable that contains strands of glass fibers inside an
insulated casing. They're designed for long-distance, high-performance data
networking, and telecommunications. Compared to wired cables, fiber optic
cables provide higher bandwidth and transmit data over longer distances.
There are three types of fiber optic cable commonly used: single
mode, multimode and plastic optical fiber (POF).

Single mode fiber optic


Single mode cables are designed to carry light directly down the fiber. It is a single strand of glass fiber and has a
diameter of 8.5-10 microns. Because it has one mode of transmission, it will propagate 1310 or 1550 nm. ...
The single mode gives a higher transmission and up to 50 times more distance than the multimode.
Wireless LANs
Not all networks are connected with cabling; some networks are wireless. Wireless
LANs use high frequency radio signals, infrared light beams, or lasers to
communicate between the workstations and the file server or hubs. Each workstation
and file server on a wireless network have some sort of transceiver/ antenna to send
and receive the data. Wireless networks are great for allowing laptop computers or
remote computers to connect to the LAN. Wireless networks are also beneficial in
older buildings where it may be difficult or impossible to install cables.

Network Cable Connection


An Ethernet cable is the most common type of network cable used on a wired
network whether at home or in any other business establishment.
This cable connects wired devices together to the local network for file sharing and
Internet access.

Different types of network cable connection


Straight-through cable connection
Cross – Over cable connection

Straight-through cable is used to connect computers and other end-user devices


(e.g., printers) to networking devices such as hubs and switches. It can also
be used to directly connect like devices (e.g., two hubs or two switches) if the cable is
plugged into an uplink port on one (but not both) of the devices.

Cross - Over cable connection is a crossover cable for Ethernet used


to connect computing devices together directly. It is most often used to connect two
devices of the same type, e.g. two computers (via their network interface controllers)
or two switches to each other.
What is difference between straight cable and cross cable?
When you connect two devices of different types together, you use
a straight through cable. When you connect two devices of the same type together,
you use a crossover cable. If you insert a network device between two devices of the
same type, all cables are straight through.
Making Different types of network cable connection
Making a Straight-Through Cable Connection
1. Cut a piece of cable to the length you will need. Give a little extra to make
room for mistakes.
2. Strip a half inch to an inch of the outer jacket away from the cable. If you use
strippers make sure not to nick the wire pairs and expose the copper, this could
introduce crosstalk onto your wires. I prefer to use a scissor and my fingers to tear
away the jacket. Then I cut with the scissors to clean up the edge.

3. Now you need to untwist the wire pairs (not too much, only undo one or two twists)
so you can align them according to the EIA-TIA568B wire color sequence. I use my
fingers to straighten the wires by bending them back and forth, straightening them as
they warm up.

EIA-TIA 568B Standard


1 2 3 4 5 6 7 8

white/orange orange white/green blue white/blue green white/brown brown

4. I usually have to trim the ends of the wires so they line up and create a straight
edge.

5. Now holding an RJ-45 connector with the tab side facing down, push the 8 wires
into the connector, sliding each wire into a groove. While holding the connector tab
side down the white/orange wire should be on the far left and the brown wire should
be on the far right. It is very important that the wires push all the way up and into the
connector so that when the pins are pushed down during crimping, they will make
contact with the wires. The sleave or jacket of the cable (light blue below) should also
be pushed in as far as it can go so it will be held in place once crimped. You may
want to pull the wires out and put them back in to make sure they are sliding in
correctly; this will also further straighten the wires.
notice the tab make sure it is facing down push the wires and sleave into the
connector
6. Before crimping, examine the cable and connector from the side. Did the wires
slide all the way up in to the proper grooves? Are the colors in the proper order
when observed from tab side down? Did the jacket slide all the way into the
connector? If not, you may need pull the cable out of the connector, trim the
wires or the jacket accordingly, and reinsert.

WRONG WAY - Note how the blue plastic sleeve is not inside the connector where it can be locked
into place. The wires are too long. The wires should extend only 1/2 inch from the blue cut sleeve.

7. If everything looks good, using your crimper tool insert the connector and cable
into the 8 wire slot and press down tightly. This will cause a piece of plastic in
the connector to press down on the jacket and hold the cable in the connector
preventing it from accidentally pulling out. Crimping also forces copper pins in
the connector to push down and make contact with the separate wires
8. You are now finished terminating one end of the cable. Repeat the process on
the other end of the cable and when you are done, insert the cable into a cable
tester and run a wire test to make sure that none of the wires are accidentally
crossed, by not being in the right order, or open by not touching the connector
pins. Depending on the cable tester you may need to read the manual to
understand the device output.

For a standard "Straight Through" cable, repeat all steps and wire color order on the other end of
cable. For a cross-over cable, the other end will have a different color order as shown by the
crossover picture above.

9. Lastly, test your cable by using it on your network. Attach the cable to your
computer’s NIC and the other end to your switch. Do you see green lights?
Open the Network Connections dialogue box in Windows, does it show a
properly enabled and active connection on the NIC. You can also look for the
status in your system tray network connections icon or used your Patch cable
tester.
Making a cross Over Cable Connection
Making cross over connection is same like straight through cable connection,but the
difference is the other end is different from start (A)
Activity IV

Direction: Match Column A with Column B.


Network cable raceways/ducts
A raceway (sometimes referred to as a raceway system) is an enclosed
conduit that forms a physical pathway for electrical
wiring. Raceways protect wires and cables from heat, humidity, corrosion,
water intrusion and general physical threats.

Corner duct cable race

Cable race ways


Cable Raceway and Ducts
Raceway systems are industry preferred for their sleek designs, labor savings
features, and durability. With the addition of the new TSRP power surface raceway,
we offer an integrated raceway
package which fits together to meet the requirements of most any raceway
application.

Installed at school systems, hospitals, research centers, factories, offices, and many
other end-user locations, HT Series raceway systems make the difference in
aesthetics, durability and cost savings through designs which promote easy
installation.

TSR - Low Voltage Surface Raceway

HT Series low voltage raceway (TSR) is a one piece, non-metallic, adhesive backed
latching raceway designed to aesthetically organize and route communications wires
including high speed UTP cable and fiber optic cable from the telecommunications
room to the work area.

A complete line of fittings to manage connectivity requirements from the


telecommunications room to the work area. Each size of raceway offers numerous
fittings, offered in electrical ivory, white or office white, including TIA/EIA-568-B
compliant 1" bend radius accessories which help ensure consistent data transmission
performance of Category 5, 5e and 6 communications systems.
TSRP — Power Surface Raceway
HT Series TSRP power surface raceway is a one piece, non-metallic, adhesive
backed latching raceway designed to aesthetically organize and route either power or
communications cables.

A complete line of fittings to manage connectivity requirements from the


telecommunications room to the work area. Each size of raceway offers numerous
fittings, offered in electrical ivory, white or office white, including TIA/EIA-568-B
compliant 1" bend radius accessories which help ensure consistent data transmission
performance of Category 5, 5e and 6 communications systems
Multi-Channel Raceway
HT Series InfoStream is a revolutionary design for a non-metallic raceway system.
The elliptical shape is aesthetically pleasing when compared to other designs. By
using the three rails to snap in dividers, the InfoStream system can accommodate up
to four separate channels of electrical, voice, data, video or fiber optic cabling.

InfoStream’s unique and patented design make installations quicker and easier. The
raceway and fittings are manufactured from a UL 94V-0 rated material.
Solid wall Pro-Duct
Wiring duct is designed for straight wire runs where
breakouts are not required.
Slotted Wall Duct
Standard slotted wall Pro-Duct features break-away fingers which provide additional
access for wire leads. Each section of the duct is provided with two score lines. The
upper score line is used to break away fingers when a greater opening is required.
The lower score line allows the sidewall to be smoothly cut for joints and "T's".

Certain sizes of slotted wall wiring duct are available in intrinsic blue color. This
indicates that the control panel is intrinsically safe - often required in applications
where explosive gases exist. Contact Clark Wire & Cable for details and specific sizes
of intrinsic blue, slotted wall wiring duct.
High Density Slotted Wall Duct
High-density slotted wall Pro-Duct comes with narrow fingers, equaling a 2 to 1 finger
ratio compared to standard slotted wiring duct.

The narrow fingers reduce fanning of the wires to the terminal blocks for a neater
appearance and to accommodate more compact designs and components in control
panels, communications closets, and other applications.
Network connectivity checking procedures and techniques
After having completed the configuration phase, you are now ready to face final
chapter of configuration which is inspecting and testing connectivity of computer
system and networks. The lessons in this segment will focus on the guidelines and
methods on inspecting and testing of connectivity of computer system and
networks. So at the end of this lesson you should be able to Carry out
communication check between terminals in accordance with operating systems
network configuration guides.

In general, testing is finding out how well something works. For human beings,
testing tells what level of knowledge or skill has been acquired. In computer
hardware and software development, testing is used at key checkpoints in the
overall process to determine whether objectives are being met. For example, in
software development, product objectives are sometimes tested by product
user representatives. When the design is complete, coding follows and when
finished, this is then tested at the unit or module level by each programmer; at
the component level by the group of programmers involved; and at the system
level when all components are combined together. At early or late stages, a
product or service may also be tested for usability.

Safety Precautions

Occupational Health and Safety (OHS) Policy – An Information and


Communication technology (ICT) student should know how to behave when
working in the computer laboratory, and to accomplish task safely. Safety
practices should be learned early and always adheres in working with any
electrical and electronic device, including personal computers and its
peripherals. This is for your protection as well as to the people working with
you, and for the devices that you are using.

Occupational safety and health (OSH) is a planned system of working


to prevent illness and injury where you work by recognizing and identifying
hazards and risks. Health and safety procedure is the responsibility of all
persons in the computer and technology industries. You must identify the
hazards where you are working and decide how dangerous they are. Eliminate
the hazard or modify the risk that it presents.

Occupational Health and Safety standards


Each student has a responsibility to their colleagues and their
organization to report and act upon any potential workplace hazard. Students
need to be aware of the type of hazards that are possibly present in their work
environmen
Personal Safety While Working with PCs
Computer equipment can be dangerous, and you or others can be
injured or even killed if you don’t follow proper safety guidelines when
working along with PCs. The following are some precautionary measures to
take before working with any computer equipment:
Wear shoes with non-conductive rubber soles to help reduce the chance
of being shocked or seriously injured in an electrical accident.
Do not work on components that are plugged into their power source.
Do not remove expansion cards from a computer when it is turned on.
Remove jewelries when working inside any computer-related equipment.
Be sure not to pour water on electronic components.

Guidelines for Testing Connectivity of Computer System and Network

Testing Your Computer Network


You've set up all your network switches, plugged in all the cables, and
configured all your computers. One task remains before you can declare your
network is finished: You must verify that the network works as expected.
Here are a few simple tests you can conduct to make sure your network is
functional:
Check the physical connections.
Check that the Link light — the little red or green light next to the RJ-45
port — is lit on every computer. You must check this light both on the
computer itself and on the switch or router the computer is plugged into. If
this light is not on, you have a connection problem — most likely a bad cable.
Verify that you can log in.
When you're sure the physical connections are good, you should
attempt to log in to each of your network computers using a valid domain
user account.

Check the network configuration.


Click the Start button, type cmd and press Enter. Then, enter the
command ipconfig /all and press Enter.
This command will spit out numerous lines of information. The line
you're looking for should resemble this:
IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred)
If this part of the output does not show a valid IP address, you need to
check that your IP configuration is set correctly and that your DHCP server is
working.
Verify that the computers can ping each other.
Another basic test you should perform is to use the ping command
from a command prompt to make sure that the computers on your network
can contact one another.
Do several ping tests. First, make sure that TCP/IP is up and running
by having the computer try to ping itself. Open a command prompt and type
ping local host. The output from this command will indicate whether or not the
ping was successful.
Next, try to ping your servers by name. For example, if your file server
is named FileServer01, use the command ping FileServer01.

How to Ping the Windows Network Router

The first test you need to make for a router is to ping it, or send it a signal that
proves not only that the router is there but also that your computer is connected to
the router and that all communications are taking place in a friendly manner.

To send the router a friendly ping, follow these steps:

1. From the Start menu, choose All Programs→Accessories→Command


Prompt.
A Command Prompt window opens.
2. To discover the router’s address, type ipconfig and press Enter.
The ipconfig command coughs up some information about your PC’s current
network configuration. You see information that includes something like this:
IPv4 Address. . . . . . . . . . . : 192.168.0.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.0.1

The IPv4 address is your PC’s IP address on the local network. The address is
assigned by the router, using something called DHCP.
The subnet mask is a type of filter that helps PCs on the network better see each
other.
The default gateway is the IP address of the router. Make a note of it.
If you see the message, media disconnected, check both ends of the Ethernet cable.
3. Type the command ping, a space, and then the IP address of the router, or
default gateway; press Enter.
For example, using the output shown in Step 2, the command is
ping 192.168.0.1

After you press the Enter key, the ping command attempts to send four packets of
information to the router, which should echo those results to you. You see something
like this:
Pinging 192.168.0.1 with 32 bytes of data:
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Reply from 192.168.0.1: bytes=32 time<1ms TTL=127
Ping statistics for 192.168.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
The information is technical, but not complex. The key is that you want to see a
mess of data, as shown in the previous example. When you see the text Destination
host unreachable or Request timed out, that’s when the PC has trouble
communicating with the router.
4. Type exit and press Enter to close the Command Prompt window.

TIPs: Are there problems? You may not seem to see any, but first confirm that the gateway
address given in Step 2 is the same as the router address. If not, the PC is most likely just
pinging itself in Step 3. That works, but it’s not the same as communicating with the router.

When the router is unreachable, you probably need to turn off the router and
then turn it on again. Because most routers lack a Power button, you need to
unplug it and then plug it back in. After the power is back on, try repeating
these steps to see whether you can ping the router.

If the router remains unreachable, you need to restart the entire network.

• The ipconfig command’s output lists some Tunnel adapter information.


Feel free to ignore it.

• The router is also a gateway, which is why the results of


the ipconfig command list its address as Default Gateway.

• IP stands for Internet Protocol.


How to use a netstat command in Windows to watch open ports

The netstat command, meaning network statistics, is a Command


Prompt command used to display very detailed information about how your
computer is communicating with other computers or network devices.

Netstat is a common command line TCP/IP networking utility available in most


versions of Windows, Linux, UNIX and other operating systems. Netstat provides
information and statistics about protocols in use and current TCP/IP network
connections. (The name derives from the words network and statistics.)

Netstat Command Availability


The netstat command is available from within the Command Prompt in most
versions of Windows including Windows 10, Windows 8, Windows 7, Windows
Vista, Windows XP, Windows Server operating systems, and some older versions of
Windows, too.
Netstat is a cross-platform command, which means it's also available in other
operating systems like macOS and Linux.

Netstat Command Syntax

netstat [-a] [-b] [-e] [-f] [-n] [-o] [-p protocol] [-r] [-s] [-t] [-x] [-y] [time_interval] [/?]

How to Read Command Syntax

Netstat Command List


Option Explanation
netstat Execute the netstat command alone to show a relatively simple list of
all active TCP connections which, for each one, will show the local IP
address (your computer), the foreign IP address (the other computer or
network device), along with their respective port numbers, as well as
the TCP state.
-a This switch displays active TCP connections, TCP connections with the
listening state, as well as UDP ports that are being listened to.
-b This netstat switch is very similar to the -o switch listed below, but
instead of displaying the PID, will display the process's actual file
name. Using -b over -o might seem like it's saving you a step or two but
using it can sometimes greatly extend the time it takes netstat to fully
execute.
-e Use this switch with the netstat command to show statistics about your
network connection. This data includes bytes, unicast packets, non-
unicast packets, discards, errors, and unknown protocols received and
sent since the connection was established.
-f The -f switch will force the netstat command to display the Fully
Qualified Domain Name (FQDN) for each foreign IP addresses when
possible.
-n Use the -n switch to prevent netstat from attempting to determine host
Netstat Command List
names for foreign IP addresses. Depending on your current network
connections, using this switch could considerably reduce the time it
takes for netstat to fully execute.
-o A handy option for many troubleshooting tasks, the -o switch displays
the process identifier (PID) associated with each displayed connection.
See the example below for more about using netstat -o.
-p Use the -p switch to show connections or statistics only for a
particular protocol. You can not define more than one protocol at once,
nor can you execute netstat with -p without defining a protocol.
protocol When specifying a protocol with the -p option, you can
use tcp, udp, tcpv6, or udpv6. If you use -s with -p to view statistics
by protocol, you can use icmp, ip, icmpv6, or ipv6 in addition to the
first four I mentioned.
-r Execute netstat with -r to show the IP routing table. This is the same as
using the route command to execute route print.
-s The -s option can be used with the netstat command to show detailed
statistics by protocol. You can limit the statistics shown to a particular
protocol by using the -soption and specifying that protocol, but be sure
to use -s before -p protocol when using the switches together.
-t Use the -t switch to show the current TCP chimney offload state in
place of the typically displayed TCP state.
-x Use the -x option to show all NetworkDirect listeners, connections, and
shared endpoints.
-y The -y switch can be used to show the TCP connection template for all
connection. You cannot use -y with any other netstat option.
time_interval This is the time, in seconds, that you'd like the netstat command to re-
execute automatically, stopping only when you use Ctrl-C to end the
loop.
/? Use the help switch to show details about the netstat command's
several options.

Make all that netstat information in the command line easier to work with by
outputting what you see on the screen to a text file using a redirection operator.
See How to Redirect Command Output to a File for complete instructions.

Netstat Command Examples


netstat -f

In this first example, we execute netstat to show all active TCP connections.
However, we want to see the computers that we're connected to in FQDN format [-f]
instead of a simple IP address.
Here's an example of what you might see:

Active Connections
Proto Local Address Foreign Address State
TCP 127.0.0.1:5357 VM-Windows-7:49229 TIME_WAIT
TCP 127.0.0.1:49225 VM-Windows-7:12080 TIME_WAIT
TCP 192.168.1.14:49194 75.125.212.75:http CLOSE_WAIT
TCP 192.168.1.14:49196 a795sm.avast.com:http CLOSE_WAIT
TCP 192.168.1.14:49197 a795sm.avast.com:http CLOSE_WAIT
TCP 192.168.1.14:49230 TIM-PC:wsd TIME_WAIT
TCP 192.168.1.14:49231 TIM-PC:icslap ESTABLISHED
TCP 192.168.1.14:49232 TIM-PC:netbios-ssn TIME_WAIT
TCP 192.168.1.14:49233 TIM-PC:netbios-ssn TIME_WAIT
TCP [::1]:2869 VM-Windows-7:49226 ESTABLISHED
TCP [::1]:49226 VM-Windows-7:icslap ESTABLISHED

As you can see, there were 11 active TCP connections at the time netstat was
executed in this example. The only protocol (in the Proto column) listed is TCP,
which was expected because we didn't use -a.

You can also see three sets of IP addresses in the Local Address column—the
actual IP address of 192.168.1.14 and both IPv4 and IPv6 versions of the loopback
addresses, along with the port each connection is using. The Foreign
Address column lists the FQDN (75.125.212.75 didn't resolve for some reason)
along with that port as well.

Finally, the State column lists the TCP state of that particular connection.

netstat -o

In this example, netstat will be run normally so it only shows active TCP
connections, but we also want to see the corresponding process identifier [-o] for
each connection so that we can determine which program on the computer initiated
each one.

Here's what the computer displayed:

Active Connections
Proto Local Address Foreign Address State PID
TCP 192.168.1.14:49194 75.125.212.75:http CLOSE_WAIT 2948
TCP 192.168.1.14:49196 a795sm:http CLOSE_WAIT 2948
TCP 192.168.1.14:49197 a795sm:http CLOSE_WAIT 2948

You probably noticed the new PID column. In this case, the PIDs are all the same,
meaning that the same program on the computer opened these connections.
To determine what program is represented by the PID of 2948 on the computer, all
you have to do is open Task Manager, select the Processes tab, and note
the Image Name listed next to the PID we're looking for in the PID column.1
Using the netstat command with the -o option can be very helpful when tracking
down which program is using too big a share of your bandwidth. It can also help
locate the destination where some kind of malware, or even an otherwise legitimate
piece of software, might be sending information without your permission.
While this and the previous example were both run on the same computer, and
within just a minute of each other, you can see that the list of active TCP
connections is considerably different. This is because your computer is constantly
connecting to, and disconnecting from, various other devices on your network and
over the internet.

netstat -0 | findstr 28604


The above example is similar to what we've already looked at, but instead of
displaying all connections, we're telling the netstat command to show only the
connections that are using a specific PID, 28604 in this example.
A similar command could be used to filter out the connections with
a CLOSE_WAIT state, by replacing the PID with ESTABLISHED.

netstat -s -p tcp -f
In this example, we want to see protocol specific statistics [-s] but not all of them,
just TCP stats [-p tcp]. We also want the foreign addresses displayed in FQDN
format [-f].
This is what the netstat command, as shown above, produced on the example
computer:

TCP Statistics for IPv4


Active Opens = 77
Passive Opens = 21
Failed Connection Attempts = 2
Reset Connections = 25
Current Connections = 5
Segments Received = 7313
Segments Sent = 4824
Segments Retransmitted = 5
Active Connections
Proto Local Address Foreign Address State
TCP 127.0.0.1:2869 VM-Windows-7:49235 TIME_WAIT
TCP 127.0.0.1:2869 VM-Windows-7:49238 ESTABLISHED
TCP 127.0.0.1:49238 VM-Windows-7:icslap ESTABLISHED
TCP 192.168.1.14:49194 75.125.212.75:http CLOSE_WAIT
TCP 192.168.1.14:49196 a795sm.avast.com:http CLOSE_WAIT
TCP 192.168.1.14:49197 a795sm.avast.com:http CLOSE_WAIT

As you can see, various statistics for the TCP protocol are displayed, as are all
active TCP connections at the time.

netstat -e -t 5
In this final example, netstat command is executed to show some basic network
interface statistics [-e] and so that these statistics continually updated in the
command window every five seconds [-t 5].

Here's what's produced on screen:

Interface Statistics
Received Sent
Bytes 22132338 1846834
Unicast packets 19113 9869
Non-unicast packets 0 0
Discards 0 0
Errors 0 0
Unknown protocols 0
Interface Statistics
Received Sent
Bytes 22134630 1846834
Unicast packets 19128 9869
Non-unicast packets 0 0
Discards 0 0
Errors 0 0
Unknown protocols 0
^C

Various pieces of information, which you can see here and that we listed in the -
e syntax above, are displayed.

The netstat command only automatically executed one extra time, as you can see by
the two tables in the result. Note the ^C at the bottom, indicating that the Ctrl+C
abort command was used to stop the re-running of the command.

Netstat Related Commands

The netstat command is often used with other networking related Command Prompt
commands like nslookup, ping, tracert, ipconfig, and others.
Subnetting/Subnet Mask
A subnet mask is a number that defines a range of IP addresses available within
a network. A single subnet mask limits the number of valid IPs for a
specific network. Multiple subnet masks can organize a single network into
smaller networks (called subnetworks or subnets)

What is the difference between subnet and subnet mask?


subnet denotes a range of addresses that can be allocated to hosts, such as
192.168. ... The subnet mask is the classical way of representing which bits are
part of the network portion of the address vs. the host bits of the address.
The subnet mask for a /24 network is 255.255.

What is a 255.255 255.0 subnet?


A subnet mask of 255.255. 255.0 allows for close to 256 unique hosts within the
network (since not all 256 IP addresses can be used). ... This is the
default subnet mask used by Class B networks and provides up to 65,536 IP
addresses (256 x 256). The largest Class A networks use a subnet mask of 255.0.

Why is subnetting important?


But subnetting enables you to ensure that information remains in
the subnetted network or broadcast domain, which allows other subnets to
maximize their speed and effectiveness. Subnetting also divides your network's
broadcast domains, enabling you to better control traffic flow, thus increasing
network performance!

What is Subnetting ?-Subnetting is the process of diving a network into


small networks and is a common task on IPV4 networks.

Before we discuss how to implement it it is useful to understand why and when we


need to do it and to do that we are first going to work through a simple analogy to
illustrate the problem subnetting solves

Subnetting Analogy

As an analogy imagine a school and we need to split it into class rooms.

But why split it into class rooms? The answer is to stop classes interfering with
one another.

Now each classroom has a desk with a computer and we have been tasked with
creating a labeling system for the computers.

Now say we have 30 classrooms each with a maximum of 30 students and


computers.
If we assign numbers to our classrooms and computers then we could have for
example:

computer 11, classroom 24

We need two digits for the classroom which would allow for a maximum of 100
classrooms (0-99).

We need two digits for the computer which would allow for a maximum of 100
computers (0-99).

If we also say that classroom numbers 0 and 99 and computer numbers 0 and 99
were reserved and not allowed to be assigned then we now have a maximum of 98
classrooms and 98 computers which is enough for own requirements.

So lets create our label we could use the following scheme:

• computer 11, classroom 24


• 24-11
• 11-24
• 2411
• etc

There are many possible permutations we just need to pick one and tell every one
about out labeling scheme.

Lets assume we go for 2411 where 24 is the classroom and 11 is the computer.

So now when we see the following 0223 we now know that this refers to classroom
2 and computer 23.

This we do easily in our heads once we know the labelling scheme.

We could even make it easier for ourselves by creating a paper mask that we put
over the label that would reveal the classroom.
IP Addresses and Subnetting

Just like in our classroom example an IP address is split into two components
a network component and a node component.

So the address 10.0.2.1 is split into Network plus Node.

So is the network number 10, or 10.2 or 10.0.2 ?

In early IPv4 networks address classes were used to identify the number of bytes
allocated to the network component.

The main classes were class A,B,C. With the allocation as follows:

Class A network,node,node,node
Class B network,network,node,node
Class C network,network,network,node

To determine the class you needed to examine the most significant byte (far left).

• 0-127 Class A
• 128-191 Class B
• 192-ccc Class C
IP Subnetting- Problems with Large Networks

All modern networks use the Ethernet data link protocol.

Ethernet uses a shared media and is negatively effected when a large number of
nodes are connected to the same media.

This is just the same as having too many kids in the same classroom.

You can equate a network and node address to our classroom and desk number

What would happen if you had a classroom with 100’s of desks i.e. hundreds of
pupils?

So even though a Class A address can accommodate thousands of nodes it it


totally impractical to put this many nodes on a single network.

The solution to the problem was to split the network into small networks called sub
networks or subnets.

Take for example a class A address which uses 1 byte for the network ID and 3
bytes for the Node ID. Written

Net.Node.Node.Node

It is important to understand that the network part of the address is only used
for routing IP packets on the public internet.

Once the packet enters the private network then the Node address is used and
the public Network address is not used.

Now a network administrator can interpret the node address any way they want, and
so it is possible to split the node address into subnet and Node. So we could
have

Net.Subnet.Node.Node or Net.Subnet.Subnet.Node.

The technique used to create subnets is to use a Mask.

The mask effectively hides the Node component and leaves the network and sub
network components.

If the IP address was printed on paper we could hide the last byte by placing a paper
mask over the number with three holes.
Note: if your binary is a little rusty see the binary numbers tutorial

To do this on a computer we use a number which we then logically AND with with
IP address.

Here is the logic table for AND

1 and 1 =1
1 and 0 =0
0 and 1 =0
0 and 0 =0

So our mask to hide the last byte is 255.255.255.0 As 0 and Anything is always 0

The best way to see this is to write the numbers out in binary

000001011.00000001.00000001.00010101 = 11.1.1.21
11111111.11111111.11111111.00000000 =255.255.255.0

and then do a logical AND

the Network address is 11.1.1.0 which corresponds to network 11 subnet 1.1

The Subnet mask determines how the IPv4 address is split.


Th example above used a class A IP address we can do the same with a class B
address.

Net.Net.Node.Node —->Net.Net.Subnet.Node Using Mask 255.255.255.0

Subnetting on a byte boundary is the easiest to do and understand but we can also
subnet on non byte boundaries.

Worked Examples

1- You have been allocated a class A network address of 29.0.0.0. You need to
create at least 20 networks and each network will support a maximum of 160 hosts.
Would the following two subnet masks Work?

255.255.0.0 and or 255.255.255.0

Yes both would work.

Mask 255.255.0.0 has 8 bits for the subnet and 16 bits for the host

8 bits would accommodate 28=256 subnets

16 bits would accommodate 216= over 64000 hosts

Mask 255.255.255.0 has 16 bits for the subnet and 8 bits of the host.

Have possible 28 -2 hosts =254 which is enough.

2. – You have been allocated a class B network address of 135.1.0.0 and and need
to create 4 subnets each with around 200 hosts what is the easiest mask to use to
satisfy the criteria?

Easiest is to sub net on a byte boundary which would mean a subnet mask
of 255.255.255.0

This would allocate 8 bits for the subnet and 8 bits for the host.

We need to accommodate around 200 hosts which requires 8 bits which we have.

We need 4 subnets which requires 4 bits and we have 8 bits. So we have more than
enough.
Activity V

Simple Subnetting Exercise Questions


The best way to learn to do subnetting is to try some examples. We will look a some
common subnetting problems that arise when creating networks.

1 – You have been allocated a class C network address of 201.1.1.0 how


may hosts can you have?

2- You have been allocated a class A network address of 21.0.0.0. You


need create at least 10 networks and each network will support a maximum
of 100 hosts. Would the following two subnet masks Work.

255.255.0.0 and or 255.255.255.0

3 – You have been allocated a Class B network address of 129.1.0.0. You


have subnetted it using the subnet mask 255.255.255.0 How many
networks can you Have and how many hosts can you place on each
network?

Remote Desktop
The term Remote Desktop refers to a computer that connects remotely to another,
shares control of its mouse and keyboard, and views its display. Remote Desktop is
commonly accessed through port 3389.

You can create a remote desktop connection with an operating system utility, such
as the Remote Desktop included with any Windows Operating systems versions.

Or, you can use a third-party remote desktop application or service, such
as TeamViewer or VNC.

Note The Remote Desktop included with Windows 7 Starter, Home Basic, and Home Premium
cannot act as a host. It may still be used to remotely access another computer, but those machines
cannot connect to the local computer. Hosting from one of these versions of Windows requires a
third-party program, like those mentioned above.

How do I open a Windows Remote Desktop Connection?


To open Remote Desktop in Windows
Professional, follow these steps.

1. Click Start.

2. Type remote desktop and click on Remote


Desktop connection or press Enter. or

1. In the Start menu, click Windows


Accessories, then click Remote Desktop
Connection. or

1. Click Start.

2. Type mstsc and press Enter.

In the Remote Desktop Connection window, type the


computer address you want to remotely connect to
and the user name you want to use. For advanced
options, like those shown below, click Show
Options at the bottom of the window.

Note
To remotely connect to a work or school computer, your network administrator must have set up
Remote Desktop connection, and you need the correct computer address and user name.
Self Evaluation
Directions: Read the items very carefully,,

Multiple Choice
Direction: Write the letter of the correct answer.
1. What boot configuration utility allows setting the programs that will run at
startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. What Ethernet cable is used to connect two computers directly?
a. Cross Over c. Fiber optic
b. coaxial cable d. Straight through

5. Which of the following is the most commonly used networking cable


category?

a. CAT3 c. CAT6
b. CAT5 and CAT5e d. CAT7

ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. UTP ________________________________________
2. STP ________________________________________
3. IP ________________________________________
4. TCP /IP _____________________________________
5. HTTP _______________________________________
6. FTP _______________________________________
7. NIC _______________________________________
8. IMAP _______________________________________
9. LAN _______________________________________
10. DHCP _______________________________________
Skills Checklist
Configuration Skills
Directions: Listed below are the most important skills one must have in order
to configure computer systems and networks. The matrix lists the skills
expected you to master. Check the appropriate column which describes the
level of your confidence with the given skills.

Configuration Skills I can do it I can do it I am not


confidently but with confident
3 assistance 1
2
1. I can use the different
tools for configuration.
2. I can inspect networking
devices and connectors.
3. I can create a cross-
over and straight-
through Ethernet cable.
4. I can test the
functionality of an
Ethernet cable.
5. I can assign and
configure IP address.
6. I can execute the
ipconfig command
properly.
7. I can manage to create
a peer-to-peer
networking.
8. I can configure Network
Interface Card using
DHCP.
9. I can enable firewall
10. I can configure file and
printer sharing.
TOTAL
GRAND TOTAL

Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the next page to
determine your initial configuration ability.
Numerical and Verbal interpretation

Numerical Value Verbal Interpretation


2.51 – 3.00 Confident
1.76- 2.50 Confident but needs assistance
1.00 – 1.75 Not yet Confident
REFERENCES

Books and Articles and Printed Materials:

Grade 10 Computer Hardware Servicing Learner’s Module

Amy Hisson, “Computer Assembly and Configuration- Lab and Assignments”

David Anfinson, Ken Quamme “IT Essentials: PC Hardware and Software


Companion Guide” 3rd Edition- 2008 at 800 East 96th
Street Indianapolis, Indiana 46240 USA

Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter “Introduction to


Information Technology” 3rd Edition- 2005 at Rosewood Drive,
Denver, John Wisley and Sons(Asia) Pte. Ltd

Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie


P. Lujero “Technology and Livelihood Education- Information and
Communications Technology Learners Manual – Grade 7 & 8”

Rosalie P. Lujero, Ronaldo V. Ramilo “Technology and Livelihood Education-


Information and Communications Technology Learners Manual –
Computer Hardware Servicing Grade 9”

Electronic Resources:
“Definition of Configuration” Retrieved from
http://www.webopedia.com/TERM/C/configuration.html

“File Sharing” Retrieved from


http://www.techopedia.com/definition/16256/file-sharing

“Fundamentals of PC repair” Retrieved from http://www.ustudy.in/ce/hard/u1

“Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best


Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 |
Networking Tips | UNIX and LINUX Usability | Installation Procedure Of
Various Operating Systems | computer repair | computer problems”
Retrieved from http://101-computer-
troubleshooting.blogspot.com/2009/09/directx-diagnostic-tool-
dxdiag.html-
“How to configure peer to peer workgroup network step by step Guide”
Retrieved from http://computernetworkingnotes.com/basic-workgroup-
networking/workgroup-set-up.html-

“How to make an Ethernet cross over cable” Retrieved from


http://www.makeuseof.com/tag/ethernet-crossover-cable/

“Occupational Safety Precautions” Retrieved from

“peer to peer networking” Retrieved from


http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en
&docname=bph05694-

“Ping Tim Fisher” Retrieved from


http://pcsupport.about.com/od/commandlinereference/p/ping-
command.htm-

“Puzzles for Activities” Retrieved from


http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp

“System Configuration utility” Retrieved from


http://moderncomputerskillsandtraining.com/?page_id=2950-

“Turn On the Windows Firewall” Retrieved from


http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-
on-off#turn-windows-firewall-on-off=windows-7

“Windows Registry” Retrieved from


http://pcsupport.about.com/od/termsr/p/registrywindows.htm--
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf

https://www.electronicproducts.com/Interconnections/Wire_and_Cable/How_to_crea
te_your_own_Ethernet_cross_over_cable.aspx#

https://www.instructables.com/id/How-to-make-your-own-Ethernet-cable/

http://danscourses.com/how-to-make-a-straight-through-ethernet-cable/

https://en.wikipedia.org/wiki/Ethernet_crossover_cable

https://www.pinterest.ph/pin/110197522112978231/

https://www.electriduct.com/Electriduct-Latching-Surface-Cable-Raceways.html
http://www.clarkwire.com/RacewaysandDucts.htm

Google.com/search?sxsrf=ALeKk01ONIzdXyLzZIevymFKn1-
rQWZIpA%3A1591318575993&ei=L5jZXvWZPJPg-

AbT3oLAAw&q=network+addressing+&oq=network+addressing+&gs_lcp=CgZwc3kt

YWIQAzIECAAQRzIECAAQRzIECAAQRzIECAAQRzIECAAQRzIECAAQRzIECAA

QRzIECAAQR1CK0BBYvJ0RYPqiEWgAcAJ4AIABAIgBAJIBAJgBAKABAaoBB2d3c

y13aXo&sclient=psy-ab&ved=0ahUKEwi17cjTu-

npAhUTMN4KHVOvADgQ4dUDCAw&uact=5

https://www.dummies.com/computers/pcs/how-to-ping-the-windows-network-router/

https://www.computerweekly.com/tip/How-to-use-a-netstat-command-in-Windows-
to-watch-open-ports

https://www.lifewire.com/netstat-command-2618098

http://www.steves-internet-guide.com/subnetting-subnet-masks-explained/

https://www.techopedia.com/definition/3421/remote-desktop

https://www.computerhope.com/jargon/r/remodesk.htm
GLOSARY

Client/serverNetwork- a computer network in which one centralized,


powerful computer called server is a hub to which many less powerful
personal compters or workstations called clients are connected.

Coaxial cable- a type of wire that consists of a center wire surrounded by


insulation and then a grounded shield of braided wire which minimizes
electrical interference.

Configuration- the way a system is set up. Configuration can refer to either
hardware or software, or the combination of both.

Cross-over- is a cable used to connect two network devices directly.

Direct X- a set of APIs developed by Microsoft that enables programmers to


write programs that access hardware features of a computer without
knowing exactly what hardware will be installed on the machine where
the program eventually runs.

Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to
transmit data. Fiber optics has several advantages over traditional
metal communications lines.

IP Address- is a number that is used to identify a device on the network.

IP config- is a command used to find out the IP address of a certain network.

Network- is a group of two or more computer systems linked together.

Peer-to-peer Network- a type of network in which each workstation has


equivalent capabilities and responsibilities.

Ping- a command prompt used to test the ability of the source computer to
reach a specified destination computer.
Protocol- is the special set of rules that end points in a telecommunication
connection use when they communicate.

Registry- is a database used by Windows operating system to store


configuration information.

RJ45- short for Registered Jack-45, it is an eight-wire connector used


commonly to connect computers onto a Local-Area Network (LAN).

Security- techniques for ensuring that data stored in a computer cannot be


read or compromised by any individuals without authorization

Straight-through- is used in local area network to connect a PC to a network


hub and router.

Subnet mask- is used to determine what subnet an IP address belongs to.


An IP address has two components, the network address and the host
address.

Twisted pair- is a type of cable that consists of two independently insulated


wires twisted around one another.

Virus- is a program or piece of code that is loaded onto your computer


without your knowledge and runs against your wishes.
ACTIVITY I
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on one sheet of
paper.

Protocol Definition Protocol

A set of public standards that specify how packets of information are TCP/IP
exchanged between computers over one or more networks.
Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
HTTP
video are exchanged on the World Wide Web (WWW).
File Transfer Protocol provides services for file transfer and manipulation.
FTP allows multiple simultaneous connections to remote file systems. FTP

It is an application used to connect to a remote computer that lacks security


Telnet
features
Post Office Protocol is used to download e-mail from a remote mail server.
POP3
Internet Message Access Protocol is also used to download e-mail from a remote IMAP
mail server

Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server SMTP

ACTIVITY II.
Identifying IP Address Classes
Directions: In this worksheet, I will write several IP addresses with their
appropriate subnet masks. You will write which IP Address Class is
appropriate in the IP Address Class column in the chart below. An example
has been provided for you.
IP
Address
IP Address Subnet Mask Class
10.0.0.0 255.0.0.0 A
10.0.0.1 255.0.0.0 A
192.168.1.1 255.255.0.0 B
169.254.1.2 255.255.255.127 C
10.256.254.246 255.255.255.255 C
ACTIVITY III..

Identify the following. Choose your answer from the grid below. Use a
separate sheet of paper in answering.

Topology Ring Topology Bus Topology

Network Star Topology GAN


LAN Extranet MAN
WAN Internet Intranet

1. The World Wide Web.


2. The internal network of a company or other enterprise.
3. A model for supporting mobile communications across an
arbitrary number of wireless LANs.
4. A data communications network that covers a relatively broad
geographic area.
5. A network that connects two or more Local Area Networks or
Campus Area Networks together.
6. It signifies the way in which intelligent devices in the network see
their logical relations to one another
7. It is the interconnected group of computers.
8. A network covering a small geographic area, like a home.
9. All the cables run from the computers to the central location
where they are all connected by hub
_____ 10. Each computer is connected to the next computer with the last one
connected to the first

ANSWER

#1 Internet #6 Topology

#2 Intranet #7 Computer Network

#3 GAN #8 LAN

#4 WAN #9 Star Topology

#5 MAN #10 Ring Topology


ACTIVITY IV

Activity V

Simple Subnetting Exercise Questions

The best way to learn to do subnetting is to try some examples. We will


look a some common subnetting problems that arise when creating
networks.

1 – You have been allocated a class C network address of 201.1.1.0 how


may hosts can you have?

2- You have been allocated a class A network address of 21.0.0.0. You


need create at least 10 networks and each network will support a
maximum of 100 hosts. Would the following two subnet masks Work.

255.255.0.0 and or 255.255.255.0

3 – You have been allocated a Class B network address of 129.1.0.0. You


have subnetted it using the subnet mask 255.255.255.0 How many
networks can you Have and how many hosts can you place on each
network?
Answers

1. A1– 256-2= 254 – Why? host addresses of all 0’s and all 1’s
are not allowed.

2. A2- Yes you only need 8 bits for 100 hosts and both subnet
masks would give you that.

A subnet mask of 255.255.255.0 would give you lots of


networks (2 16) and 254 hosts.

A subnet of 255.255.0.0 would give you lots of hosts (approx


216) and 256 networks.

3. A3 – the network has 8 bits and so does the node component.


This means that you have have 28 =256 networks and 256 -2
= 254 hosts

Self Evaluation
Directions: Read the items very carefully. Write your answer in a clean sheet
of paper.

Multiple Choice
Direction: Write the letter of the correct answer.
1. What boot configuration utility allows setting the programs that will run at
startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. What Ethernet cable is used to connect two computers directly?
a. Cross Over c. Fiber optic
b. coaxial cable d. Straight through
5. Which of the following is the most commonly used networking cable
category?

a. CAT3 c. CAT6
b. CAT5 and CAT5e d. CAT7

ACRONYMS
Direction: Give the complete meaning of the following acronyms.
11. UTP – unshielded twisted pair
12. STP – shielded twisted pair
13. IP - internet protocol
14. TCP /IP transmission control protocol
15. HTTP - hypertext transfer protocol
16. FTP file transfer protocol
17. NIC network interface card
18. IMAP internet message access protocol
19. LAN local area network
20. DHCP dynamic host configuration protocol

You might also like