Beruflich Dokumente
Kultur Dokumente
There are many importance of computer networks and communications such as we can
sharing devices and program. We also can share the files, data, information and also
sharing high speed internet connection. Other than that, we can access server centered
database.
3.1.3 Types of Networks
The differentiate between the three types of computer networks are geographical
area, cost and speed. WAN is a network that covers a large geographical area such as
city, country or the world. But, for LAN and MAN only covers in a limited geographical
area such as home, school lab and office building.
In a case of WAN the cost of data transmission is very high/ expensive because the
transmission mediums used to be hired. The cost of LAN and MAN is less because the
transmission medium is owned by a single organization.
The speed of data transmission of WAN is lower while the speed of data transmission
is much higher in LAN.
3.1.4 Network Architecture
• CLIENT/SERVER
• PEER-TO-PEER
• Bus topology:
All devices are connected to a central cable, called the bus or backbone. Bus
networks are relatively inexpensive and easy to install for small networks. Ethernet
systems use a bus topology.
• Ring topology :
All devices are connected to one another in the shape of a closed loop, so that each
device is connected directly to two other devices, one on either side of it. Ring
topologies are relatively expensive and difficult to install, but they offer high
bandwidth and can span large distances.
• Star topology:
All devices are connected to a central hub. Star networks are relatively easy to install
and manage, but bottlenecks can occur because all data must pass through the hub.
There are many differentiate of the types of network topology. There are central device,
data transmitted, installation and maintenance. Bus and star go to both direction while the
ring only go to one direction. It installation and maintenance of bus and star also same
that is easy for install and ring is difficult. If one node fails bus and star are still working
but the entire network of ring is stop working.
3.1.6 Protocol
A protocol is a set of rules for the exchanges of data between a terminal and computer or
between two computers. Think of protocol as a sort of precommunication agreement
about the form in which a message or data to be sent and receipt is to be acknowledge.
• Internet
An internet is a public network. It is worldwide collection of networks that links
millions of businesses, government agencies, educational institutions and
individuals.
• Intranets
There are six devices that needed in computer network communication are a network
interface card ( NIC ), a wireless network interface card, a modem, hub, wireless access
point and a router.
The function of
• Twisted pair cable are insulted copper wire, twisted around each other. Multiple twisted
pairs can be combined into a single cable. This twisted –pair configuration somewhat
reduces interference from electrical field.
• Coaxial cable consists of a single copper wire surrounded by at least three layer an
insulating material, braided wired, plastic coating.
• Fibre Optic consists of dozens of hundreds of thin strands of glass that use light transmit
signal. Each strand. Call optical fibre, is as thin as a human hair.
3.2.2.2 Identify various types of wireless transmission media such as infrared, radio wave and
satellite.
• Infrared- type of wireless transmission medium that sends signals using infrared light
waves. To communicate each other, Infrared devices often must be within about 5
meters.
• Radio wave- Bluetooth = uses short –range radio waves to transmit data between two
bluetooth devices.
• Satellite – space station that receives microwave signals from an earth-based station,
amplifies the signals and broadcasts the signal back over a wide area to any number of
earth- based stations.
Topic 3.3 - Software Requirements
3.3.1 Server Software
3.3.1.1 Define Network Operating System.
Remove all jewelry from your hands and wrists and use only insulated or nonconducting tools.
1 . Turn off power to the PC, and remove the power cord from the PC.
On some PCs, it may be necessary to remove all cables before the cover can be removed.
3 . Locate an available ISA or EISA slot and remove the screw from the corresponding backplate and save
the screw.
Some PCs have both ISA and PCI slots. Make sure that you install the EtherLink III ISA NIC in either an
ISA or an EISA slot.
PCI slots, the shortest of the three types of slots, are white. The longer ISA slots are black. EISA slots, the
longest, are brown.
5 . Ensure that the shape and length of the edge connector on the NIC match the slot that you intend to use.
6 . Carefully insert the NIC into the slot; press firmly with steady pressure to ensure that the NIC is fully
seated in the slot.
When the NIC is correctly inserted in the slot, the NIC backplate is flush with the PC backplate.
Straight cable is used to connect computers to a network through a hub and for crossed
cable is used to connect two computing devides directly.
First step is skin off the cable jacket using cable stripper. Second, untwist each pair and
straighten each wire and arranged it as follows. Then, cut all the wires. Next, insert the
wires into the RJ45 connector. After that, place the connector into a crimping tool, and
squeeze hard so that the handle reaches its full swing. Finally, use a cable tester to test for
proper continuity.
1) IP address= 192.168.1.7
2) Subnet Mask= 255.255.255.0
3) Default gateway= 192.168.1.1
Best utility to test network connection is by using the ping command. The ping command
displays whether the destination responded and how it took to receive a reply.
Step 1:
On your desktop, create a shared folder: Right-click your mouse button on any blank space on your
desktop and point towards NEW and then click on FOLDER.
The new folder will appear on your desktop as shown below:
Step 2:
Rename the folder: Pointing towards the New Folder icon, click the right mouse-button and then click
on RENAME.
Name the newly created folder SHARED
Step 3:
Right click on the SHARED folder and then click on SHARING, a SHARED properties window will
appear with the "sharing" tab selected. (see step 4)
Step 4:
On the SHARED Properties window click on "Share this folder" option to select it.
Step 5:
You will see in the "Permissions for SHARED" window, and under Name you will see EVERYONE
listed. Highlight EVERYONE by clicking on it once and then click on the "REMOVE" button to remove
Everyone from the list.
Once you have removed EVERYONE from the list you will see the following window:
Step 7:
Now click on the ADD button and you will see the "Select Users, Computers, or Groups" window (See
step 8)
Step 8:
You will now add yourself to permit access to the shared folder. Type in your last name followed by a
comma and then your first name.
Step 9:
Click on the CHECK NAMES button and you will see your name appear with an underline, showing
that your name has been verified on the network.
Click OK
The "Permissions for SHARED" window will appear with your name under the NAME field:
Step 10:
In the "Permission for SHARED" window under the PERMISSIONS field check the ALLOW boxes next
to "Full Control" & "Change". So the PERMISSIONS field will show 3 boxes checked showing
ALLOWED for all three functions. You have given yourself FULL CONTROL of the shared folder.
Click OK; You could also click on APPLY and then click OK.
Step 11:
In the "SHARED Properties" window click on the SECURITY tab on the top right hand side. You
should see your name appear here as shown below. Do not change anything here. If your name
does not appear here go back to Step 7 and repeat Steps 7 through 11 in order to add yourself.
Click OK; You could also click on APPLY and then click OK.
You have now successfully created a shared folder which should show on your desktop as shown
below: