0% found this document useful (0 votes)
61 views

Core Competency 2

Uploaded by

Baby Inah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views

Core Competency 2

Uploaded by

Baby Inah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Core Competency 2: Set-up Computer Networks

Lesson 23: Understanding Network Devices


1. Introduction
We aim to understand how computers are connected to each other that is why it is essential that
we should be familiar with the different devices found in the workplace to perform network
connectivity.

It is important to understand that each workplace has a unique plan/map of how the
organization distributes information and who has access.

This lesson's goal is to simply familiarize ourselves with the different network devices which
we'll get to connecting later.

2. Network Devices
Router

A device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located
at gateways, the places where two or more networks connect.

Switch

A device that filters and forwards packets between LAN segments. Switches operate at the data
link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and
therefore support any packet protocol. LANs that use switches to join segments are
called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.

Hub

A common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is
copied to the other ports so that all segments of the LAN can see all packets.

Hubs and switches serve as a central connection for all of your network equipment and handles
a data type known as frames. Frames carry your data. When a frame is received, it is amplified
and then transmitted on to the port of the destination PC.

Repeater

A network device used to regenerate or replicate a signal. Repeaters are used in transmission
systems to regenerate analog or digital signals distorted by transmission loss. Analog repeaters
frequently can only amplify the signal while digital repeaters can reconstruct a signal to near its
original quality.

Bridge

A device that connects two local-area networks (LANs), or two segments of the same LAN that
use the same protocol, such as Ethernet or Token-Ring.

3. Local Area Network


Basically, a local area network, called as LAN, is a group of computers and connected
devices that share a common communication line (or may be wireless) to a server.

A LAN is where computers and mobile devices may share resources like printers, scanners,
storage, etc.

4. Local Area Connection Properties

To make sure that your LAN works properly, make sure that the following items are installed and
enabled in the Local Area Connection Properties:
Clients For Microsoft Networks

Allow your computer to share files and printers in Microsoft Network

Internet Protocol Version 4 (TCP/IPv4)

The protocol that enables the computer to communicate with other computers in the network.
This can be set automatically or manually specified along with other network information to work
properly. Make sure however that each device has a unique IP.

LAN Settings

These are specific IP settings for the LAN interface.

The default IP Address is 192.168.0.1.

The default Subnet Mask is 255.255.255.0.

DHCP Server

Stands for Dynamic Host Control Protocol. This gives the IP Addresses when a device starts and
requests an IP address from the network. It can be set to obtain IP address automatically.

5. Different Network Location Types

Home Network

This type is ideal for home networks where you trust all the people and the devices using the
network. By default, network discovery is turned on, allowing you to see other computers and
devices, and others can see you as well.

Work Network

This type is used in small office or other workplace networks. By default, network discovery is
enabled allowing other computers on a network. However, you cannot join or create a
homegroup.

Public Network

This type is the safest. This is designed to keep your computer from being visible to others and
helps protect your computer from malicious software from the Internet. However, network
discovery is turned off and homegroup is not available on this network.

Domain Network

This is used for domains and at enterprise networks. This is controlled by the network
administrator.
6. Wide Area Network
Also known as WAN. This is a collection of computers and networks connected via a network
just like the LAN. However, in WAN, it is connected over a large geographic area.

The following are the WAN settings used to connect to the Internet Service Provider (ISP):

Dynamic IP Address

This is to obtain an IP address automatically from the ISP.

Host Name

This is optional. Usually, this is the model number of the device.

MAC Address

This is optional. MAC stands for Media Access Control. The MAC Address is set by default to the
MAC Address of the WAN interface in the device.

Primary DNS Address/ Secondary DNS Address

This is optional. A Domain Name Server (DNS) is entered. If left blank, the ISP provides the DNS
address.

Auto-Reconnect

This feature allows the router to reconnect to the ISP automatically if connections is
disconnected.

Static IP Address

This is to set a specific IP Address that is still provided by the ISP. However, this is avoided
because this requires a lot of work and manual entry of network information.

PPPoE

Stands for Point-to-Point Protocol over Ethernet. Only used if the ISP uses this protocol. The ISP
provides the username and password.

7. IP Addressing
IP Address, or the Internet Protocol Address, is a numerical label assigned to a device within
a computer network that uses the Internet Protocol. It has two functions: (1) network hosting ;
and (2) location addressing.

The IPv4 is still in use today. It is a 32-bit number system.

On the other hand, a new version of Internet Protocol called the IPv6 makes use of 128 bits for its
address. (e.g. 2001:db8:0:1234:0:567:8:1)

Lesson 24: Creating Network Cables


1. Introduction
Cable is the medium through which information usually moves from one network device to
another.
There are several types of cables which are commonly used with LANs. In some cases, a network
will utilize only one type of cable, while other networks will use a variety of cable types.

The type of cable chosen for a network is related to the network's topology, protocol, and
size.

Understanding the characteristics of different types of cable and how they relate to other aspects
of a network is necessary for the development of a successful network.

2. Network Media
The network can be connected through two types of connections: wired and wireless.

Having a wired connection is more reliable than a wireless connection. However, wireless
connections are widely used by some devices such as cellphones and laptops for their portability.

The following are different wired connections commonly used in networking. However for this
Qualification, we are focusing on UTP and STP Cables which are most common for Local Area
Networks.

1. Unshielded Twisted Pair (UTP) Cable

A popular type of cable that is commonly used for Local Area Networks. It has a two shielded
wires twisted around each other.

2. Shielded Twisted Pair (STP) Cable

The extra covering of the STP Cable provides extra protection to prevent electromagnetic
interference.

3. Coaxial Cable

This the cable commonly used in television industries. The metal shield surrounding the cable
helps block interference from fluorescence lights, motors, and other computers.

4. Fiber Optic Cable

Transmits light rather than electronic signals which reduce the risks of electrical interference. It is
ideal for environments where electrical interference is present.

3. Wireless Connections

Wireless connections make use of LANs which allow high frequency radio signals to
communicate between work stations, servers, or hubs.

Wireless networks are ideal for allowing laptops, portable devices, and other devices to connect
to the LAN. This is also beneficial in establishments where it may be harder to install cables.

4. Wireless Networking

A wireless network is any type of computer network that use wireless data connections for
connecting network nodes.

Wireless PAN
Stands for Wireless Personal Area Networks (WPANs). This connection interconnect devices within
a small area. An example would be bluetooth and infrared.

Wireless LAN

Known as WLANs. This is used to connect to local resources and the internet. It links two or more
devices over a short distance using a wireless distribution method - usually through an wireless
router/wireless access point for internet access. Wi-Fi falls under WLANs.

Wireless Mesh Networks

This is a wireless network made up of radio nodes organized in a mesh topology. It can be a

(1) Wireless MAN or Wireless Metropolitan Area Network which connects several WLANs.

(2) Wireless WAN or Wireless Wide Area Network which covers large areas such as cities/towns,
branch offices, business, public internet access system, etc.

(3) Global Area Network (GAN) for used for mobile technology such as texting, calling, etc.

(4) Space Network which is used between spacecrafts within the vicinity of earth. NASA's Space
Network makes use of this technology.

5. Cable Installation
In network installation, we have to be familiar with the RJ45 (Registered Jack).

It is a jack used for Ethernet networking and used for cables. Both T568A and T568B are common
wiring standards however the T568B is widely used in the Philippines.

There are two common network cabling namely the straight-through and the crossover cables.

A straight-through cable is also known as the patch cable or Ethernet cable. This is the most
common format for network cables. The wires have same pins from either end. This is used when
connecting a computer to a modem, router, or switch. This is also used between networking
equipment that are not similar to each other.

A crossover cable crosses the wires from the other end differently to the other. We use these
when we connect two devices of the same type like two computers or two similar networking
devices. These wirings use two different ends, T568A and T568B.

However, if we use a device between two devices (such as a switch), all cables are straight
through.

7. Patch Panels
A patch panel, also known as patch bay, patch field, or jack field, is used to connect and route
circuits for monitoring, interconnecting, and testing circuits in a convenient and flexible matter.

Having an organized patch panel is important in the workplace. Although the patch panel is
meant for organization, it is still essential to minimize hazards such as hanging and open network
cables.

Good patch panel cable management is important. Neat patch, for example, is one of the most
common patch panel cable management systems.

It allows users to store patch panels in a neat and tidy compartment. It is also compliant with
industry standards
8. Patch Panel to Modular Box
In connecting a patch panel to a modular box, it is important to take note that the UTP cable at
this time is neither a straight-through or crossover.

We will be installing both ends on a patch panel and a modular box.

(A) Patch Panel

> First, strip the outer covering of the cable

> Then, arrange the wires according to its proper color coding based on the color coding you
have done on the RJ45.

A – white blue / blue / white green / green / white orange / orange / white brown / brown

B – white blue / blue / white orange / orange / white green / green / white brown / brown

(B) Modular Box


> Strip the outer covering of the cable

> Arrange the wires according to its proper color coding based on the color coding you have
done on the RJ45. Connect the cables ust like the numbers arranged at the figure below.

Lesson 25: Configuring the


Network
1. Introduction
Ac omputer network is a collection of computers and other devices
linked together via use networking devices. Networking devices are
also called as communicating devices.

Computer networks are important because it ensures effective


transmission and sharing of data between different computer
devices.

Setting-up computer networks at your homes does not need to be


complicated. Few basic pieces of computer hardware are needed to connect
your computers and other devices to each other and to the Internet.

2. Network Categories
Personal Area This is used for communication among computer and different devices close to a
Network (PAN) person. PAN usually reaches up to 10 meters.

Local Area Network Consists of personal computers linked together within a limited area. For example,
(LAN) within a small building, office, floor, or department.

Metropolitan Area Larger than LAN. It can span in no more than 50 miles. It is used to cover a small
Network (MAN)
Wide Area Network This type of network covers a large geographic area such as a city or even a country.
(WAN) Different types of communication channels such as telephone lines, cables, and air
waves are used for this to be possible. The Internet is an example of a WAN and it is
the world’s largest WAN.
3. Difference in Network Categories
Difference in... LAN MAN WAN
Cost Low Optic High Higher
Network Size Small Large Largest
Speed Fastest Slower Slowest
Transmission Twisted Pair Twisted Pair Fiber Optic
Media
Fiber-Optic Radio Wave
Cables
Satellite
Number of Smallest Large Largest
Computers

Lesson 26: Configuring the


Wireless Network
1. Introduction
Having a wireless network will let people communicate and access
applications and information without physical wirings. This advantage of
cleaner, tidier, and freer space lets people access the internet with ease.

2. Broadband Internet Connection


Nowadays, broadband Internet connection is used instead of the dial-up
connection. DSL, which stands for Digital Susbscriber Line, and cable are two
common broadband connections.

ISPs provide the broadband connection. For example, PLDT, a telephone


company, provides DSL, and SKY, a cable TV company, provides internet
connection too. These ISPs provide broadband modems, and nowadays, even
combination modem/wireless routers.

3. Wireless Router

A wireless router is essential in a WLAN for home and small office networks.
It allows connection to the Internet as well as local network access. The router
can be connected through a wired or wireless WAN.

There are varieities of routers still being developed and improved today that
allow capabilities such as being able to filter traffic.

All modern routers nowadays support 802.11n, or Wireless-N, which offer


the most stable speeds. These router still offer backward compatibility with
older standards like the 802.11g.

4. Positioning the Wireless Router


The wireless router is ideally placed somewhere in the home/small office
where it can receive a strong signal and has least amount of
interference.

Follow these guidelines to ensure the best out of your wireless router:

1. Position the router in the center of the house.

2. Raise the router from the floor

3. Move it away from walls and metal objects.

4. Reduce interference by placing it away from microwaves/cordless phones.


5. Securing the Wireless Network
Security is important especially in the workplace where confidential
files are being transferred throughout. The network's signal may even
extend outside your home and may be accessed by people outside.

That is why it is important to set certain protocols in ensuring privacy of


personal information and files as these can lead to identity theft or
malicious practices.

Simply putting a network security key to your wireless router can prevent
unauthorized access to the network.

6. Wireless Network Security Protocols


There are three types of wireless network encryption: (1) Wi-Fi Protected
Access, or WPA and WPA2, (2) Wired Equivalent Privacy (WEP), and (3)
802.1x, however this is usually used in enterprise.

The following are encyption methods for wireless networks:

1. Wi-Fi Protected Access (WPA and WPA2)

This security method encrypts the information and assures that the security
key has not been modified. WPA is for all wireless network adapters, but not
in older routers and access points. WPA2 is a secure version, but does not
work in older adapters.

2. Wired Equivalent Privacy (WEP)

This is an older method but not recommended anymore. When enabled, the
security key is set up. This key encrypts the information that one computer
sends to another through the network. This, however, is easy to crack.

3. 802.1X Authentication

This helps improve security for 802.11 wireless networks and wired Ethernet
networks. It makes use of a server to validate users and provide network
access. This is common in workplaces.

7. Wireless Network Configuration

We can divide wireless network configuration into three tasks.

To start, we are installing the router to the computer:

(1) Using a cable, connect the router to the computer

(2) Open the internet browser and type the default IP Address (usually
192.168.0.1). This is also found at the sticker under the router.

(3) Read the instructions, because this will depend on the manufacturer.
Usually the username and password are "admin".

(4) You can explore the interface and configure wireless set-up such as the
SSID or the name of the router, the password (e.g. WAP2), or the MAC
Address.

Next, we can set-up a security key:


(1) Open Network and Sharing Center (Start> Control Panel > Network and
Sharing Center)

(2) Click Set up a new connection or network.

(3) Click Set up a new network, then next.

The wizard will walk you through with a network name and security key; the
default will be a Wi-Fi WPA2.

Then, we can add computers to the network:

(1) Open Connect to a Network. Click the network icon in the lower-right.

(2) In the list of networks, click where you want to connect. Click Connect.

(3) Enter the security key.

Lesson 27: Securing the Network


1. Introduction
There are many security threats
that are spread over the internet. There are several types of firewalls depending
Viruses, worms, Trojan horses, zero- on the security needed by the network.
day attacks, hacker attacks, denial of
service (DOS) attacks, data Network Layer Firewalls
interception, and theft.
These operate at a low level of TCP/IP protocol
That is why it is important that there where packets are not allowed to pass through
are security protocols aside from unless they match the rules set by the firewall
router configuration to further protect administrator.
the network. It is wise to prevent these
threats from entering and spreading on Application Layer Firewalls
the network.
These work on the application level of the TCP/IP
2. Network Security Components stack. These can intercept all packets traveling
to or from the applcication. They can block other

To avoid these security threats, it is packets - unwanted outside traffic can be


important that we have network prevented.
security components. These are
software applications that protect the Application Firewalls
usability, reliability, integrity, and
safety of the network and the data.
These are network-layer and application-
layer types that overlap. An example is
restricting ftp services through /etc/
ftpaccess file.
These components include anti-
virus and anti-spyware
programs, firewalls (to block Proxy Firewalls

unauthorized access to the network,These operate at the firewall's application layer.


These act
prevention systems, or IPS, (to identify as intermediary for requests from one
fast-
spreading threats such as zero-day or zero-houranother for a specific network
network to
application.
attacks), and Virtual Private Networks, or These prevent direct connections
between
VPNs, (to provide secure remote access). either sides; allowing or blocking traffic
based on the rules set.
3. Firewall
Basically, a firewall is a device -- that can be
hardware or software based -- which controls
access to the organization's network.
Lesson 28: Inspect and Test Networks
1. Introduction
It is important to test computer
networks to assure that We should look for the
these networks will be effective following when we are
especially in the long run. testing the network:

Aside from ensuring that these (1) Utilization levels


networks are secure, it is essential
that we know in the first place that (2) Number of users
they are working correctly to avoid
issues in the future. (3) Number of operational
protocols
2. Network Testing
Network Testing is the actual (4) Error statistics
measurement of the network's state
of operation over a period of time.
(5) Application utilization
This record will be the basis for
comparison or control.
4. Final Testing
It is often called understanding Final testing aims to test
the past to predict the future. the hardware and software
aspect of the systems and
the network.
A good network
testing strategy is one where the
network manager is able to predict Follow the following steps.
the operation of the network.
(1) Launch cmd by
Testing the reliability and its ability CTRL+R, typing cmd, then
to support new applications and press enter.
users are among the list of factors
in examining a good network. (2) Type ping and the IP
address of a comptuer in
3. Important Network the network. If the timeout
Characteristics
Through a comprehensive network does not request, it means
test, the network manager is able that the computer is
to maintain a network actively. connected to the network.
When it is implemented properly,
it is easy to track the changes (3) You can log-on to the
and trends that can be seen in its network as well by
daily operation. accessing your network
device. Observe the color of
From here, a network manager is the NIC on the computer;
able to obtain valuable the light should be green or
insight where s/he may use for yellow and has one solid
further improvements and and a blinking light.
troubleshooting.

You might also like