Sie sind auf Seite 1von 17

MAICHEW POLYTECHNIC COLLEGE

Under

Ethiopian TVET-System

INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level-II

Learning Guide #13


Unit of Competence: Administrate Network and Hardware
peripherals
Module Title: Administrating Network and Hardware peripherals
LG Code : ICT ITS2 L03 03
TTLM Code: ICT ITS2 TTLM 1018

LO 4: Installing Peripheral to a Network


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Information Sheet 1 What is a Network

What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.

Advantages and disadvantages of computer networks


The reason for the popularity of computer networks is that they offer many advantages.
Information such as important files, video and audio, and email can be easily shared between
users. Peripherals such as printers and modems can also be shared over the network. For
example, Figure 1 shows a printer being used in a stand-alone environment and in a networked
environment. By connecting many computers to a print server any of them may make use of the
printer directly, instead of the single computer in the stand-alone environment. Also, software
such as word-processors and spreadsheets can be made available to all computers on the network
from a single central server. Finally, administration and support is simplified.

Figure 1 – A printer in a stand-alone environment (left) and in a networked environment


(right)

However, with these advantages come a number of potential disadvantages. Making important
and sensitive information available to every user of the network is not normally desirable. For
example, information about employees’ salaries should not be freely available for anybody to
look at. Data security is therefore an important concern in a networked environment. Secondly,
the danger of computer viruses entering the network is greatly increased. A virus can infect the
any of the computers on the network, and can quickly spread throughout the network causing
significant damage.

Broadly speaking, there are two types of network configuration, peer-to-peer networks and
client/server networks.
Prepared by Tsehayou Sieley 2011 E.C
Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Peer-to-peer networks are more commonly implemented where less than ten computers are
involved and where strict security is not necessary. All computers have the same status, hence
the term 'peer', and they communicate with each other on an equal footing. Files, such as word
processing or spreadsheet documents, can be shared across the network and all the computers on
the network can share devices, such as printers or scanners, which are connected to any one
computer.

Peer to Peer
Network

Fig 2: Peer to Peer Networking

Client/server networks are more suitable for larger networks. A central computer, or 'server',
acts as the storage location for files and applications shared on the network. Usually the server is
a higher than average performance computer. The server also controls the network access of the
other computers which are referred to as the 'client' computers. Typically, teachers and students
in a school will use the client computers for their work and only the network administrator
(usually a designated staff member) will have access rights to the server.

File Server

Other
equipment

Fig 3: Client - Server Networking

Two very common types of networks based on geographical converge include:

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

 Local Area Network (LAN)


 Wide Area Network (WAN)

You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN
(WLAN), or a Wireless WAN (WWAN).

Local Area Network


A local area network (LAN) is the basic building block of any computer network. A LAN can
range from simple (two computers connected by a cable) to complex (hundreds of connected
computers and peripherals throughout a major corporation). (See Figure 2) The distinguishing
feature of a LAN is that it is confined to a limited geographic area.

Figure 2 – A Local Area Network (LAN)


Wide Area Network
A wide area network (WAN), on the other hand, has no geographical limit (see Figure 3). It can
connect computers and other devices on opposite sides of the world. A WAN is made up of a
number of interconnected LANs. Perhaps the ultimate WAN is the Internet.

Figure 3 – A Wide Area Network (WAN)

What is a Topology?
The term topology, or more specifically, network topology, refers to the arrangement or physical
layout of computers, cables, and other components on the network. "Topology" is the standard
term that most network professionals use when they refer to the network's basic design. In
addition to the term "topology," you will find several other terms that are used to define a
network's design:
 Physical layout
 Design
Prepared by Tsehayou Sieley 2011 E.C
Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

 Diagram
 Map

A network's topology affects its capabilities. The choice of one topology over another will have
an impact on the:
 Type of equipment that the network needs
 Capabilities of the network
 Growth of the network
 Way the network is managed
There are four basic types of computer topology: bus, star, ring and mesh.

Bus Topology
The bus topology is often referred to as a "linear bus" because the computers are connected in a
straight line. This is the simplest and most common method of networking computers. Figure 1
shows a typical bus topology. It consists of a single cable called a trunk (also called a backbone
or segment) that connects all of the computers in the network in a single line.

Figure 1 – The bus topology


Computers on a bus topology network communicate by addressing data to a particular computer
and sending out that data on the cable as electronic signals. To understand how computers
communicate on a bus, you need to be familiar with three concepts:
 Sending the signal
 Signal bounce
 Terminator
Advantages of a Linear Bus Topology
 Easy to connect a computer or peripheral to a linear bus.
 Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology


 Entire network shuts down if there is a break in the main cable.
 Terminators are required at both ends of the backbone cable.
 Difficult to identify the problem if the entire network shuts down.
 Not meant to be used as a stand-alone solution in a large building.

Star topology
In the star topology, cable segments from each computer are connected to a centralized
component called a hub. Figure 2 shows four computers and a hub connected in a star topology.

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Signals are transmitted from the sending computer through the hub to all computers on the
network.

Figure 2 – The star topology


Because each computer is connected to a central point, this topology requires a great deal of
cable in a large network installation. Also, if the central point fails, the entire network goes
down. If one computer - or the cable that connects it to the hub - fails on a star network, only the
failed computer will not be able to send or receive network data. The rest of the network
continues to function normally.

Advantages of a Star Topology


 Easy to install and wire.
 No disruptions to the network when connecting or removing devices.
 Easy to detect faults and to remove parts.

Disadvantages of a Star Topology


 Requires more cable length than a linear topology.
 If the hub, switch, or concentrator fails, nodes attached are disabled.
 More expensive than linear bus topologies because of the cost of the hubs, etc…

Ring topology
The ring topology connects computers on a single circle of cable. Unlike the bus topology, there
are no terminated ends. The signals travel around the loop in one direction and pass through each
computer, which can act as a repeater to boost the signal and send it on to the next computer.
Figure 3 shows a typical ring topology with one server and four workstations. The failure of one
computer can have an impact on the entire network.

Figure 3 – The ring topology


Advantages of a Star Topology
 System provides equal access for all computers.
Prepared by Tsehayou Sieley 2011 E.C
Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

 Performance is even despite many users.

Disadvantages of a Star Topology


 Failure of one computer can impact the rest of the network.
 Problems are hard to isolate.
 Network reconfiguration disrupts operation

Mesh topology
A mesh topology network offers superior redundancy and reliability. In a mesh topology, each
computer is connected to every other computer by separate cabling. (See Figure 4) This
configuration provides redundant paths throughout the network so that if one cable fails, another
will take over the traffic. While ease of troubleshooting and increased reliability is definite
benefits, these networks are expensive to install because they use a lot of cabling. Often, a mesh
topology will be used in conjunction with other topologies to form a hybrid topology.

Figure 4 – The mesh topology


Advantages of a mesh Topology
 System provides increased redundancy and reliability as well as ease of troubleshooting.

Disadvantages of a mesh Topology


 System is expensive to install because it uses a lot of cabling.

Hybrid topologies
Many working topologies are hybrid combinations of the bus, star, ring, and mesh topologies.
Two of the more common are described below.

Star bus topology


The star bus is a combination of the bus and star topologies. In a star-bus topology, several star
topology networks are linked together with linear bus trunks. Figure 5 shows a typical star-bus
topology.

Figure 5 – The star bus hybrid topology

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Star-Ring topology
The star ring (sometimes called a star-wired ring) appears similar to the star bus. Both the star
ring and the star bus are centered in a hub that contains the actual ring or bus. Figure 6 shows a
star-ring network. Linear-bus trunks connect the hubs in a star bus, while the hubs in a star ring
are connected in a star pattern by the main hub.

Figure 6 – The star ring hybrid topology

Network Media
Every network requires some hardware to make it work. Exactly what hardware is required
depends on what type of network is being constructed. The following is summary of some of the
more common networking hardware. Such network Medias are cables like fiber optics, twisted
pair, coaxial and other media are wireless.

The vast majority of networks today are connected by some sort of wiring or cabling that acts as
a network transmission medium that carries signals between computers. Although many cable
types are available to meet the varying needs and sizes of networks, from small to large, there are
3 primary cable types:
 Coaxial
 Twisted pair
 Fiber-optic

Coaxial cable
At one time, coaxial cable was the most widely used network cabling. There were a couple of
reasons for coaxial cables wide usage: it was relatively inexpensive, and it was light, flexible,
and easy to work with.

In its simplest form, coaxial cable consists of a core of copper wire surrounded by insulation, a
braided metal shielding, and an outer cover. Figure 1 shows the various components that make
up a coaxial cable.

The shielding protects transmitted data by absorbing stray electronic signals, called noise, so that
they do not get onto the cable and distort the data. The core of a coaxial cable carries the
electronic signals that make up the data. This wire core can be either solid or stranded. If the core
is solid, it is usually copper. Surrounding the core is an insulating layer that separates it from the
wire mesh. The braided wire mesh acts as a ground and protects the core from electrical noise.
Coaxial cable uses the BNC connector to connect to computers and other devices.

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Coaxial cable is more resistant to interference and attenuation than twisted-pair cabling. The
stranded, protective sleeve absorbs stray electronic signals so that they do not affect data being
sent over the inner copper cable. For this reason, coaxial cabling is a good choice for longer
distances.

BNC Cable
Connector

Figure 1 – The components of coaxial cable and the BNC connector

There are two types of coaxial cable: thinnet and thicknet. Thicknet cabling is thicker, and a
better choice for longer distances, but is more expensive and more difficult to work with. Thinnet
coaxial cable can carry a signal for a distance of up to approximately 185 meters before the
signal starts to suffer from attenuation. Thicknet cable can carry a signal for 500 meters.
Therefore, because of thicknet's ability to support data transfer over longer distances, it is
sometimes used as a backbone to connect several smaller thinnet-based networks.

Twisted pair
Data networks use two basic types of twisted-pair cabling: shielded twisted pair (STP) and
unshielded twisted pair (UTP). STP cable is similar to UTP cable with the exception that it
contains an additional foil shield that surrounds the four-pair wire bundle. The shield provides
extended protection from induced electrical noise and cross-talk by supplying a grounded path to
carry the induced electrical signals away from the conductors in the cable.

In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted
around each other. Figure 2 shows the two types of twisted-pair cable: unshielded twisted-
pair(UTP) and shielded twisted-pair(STP) cable.

Figure 2 – Unshielded and shielded twisted pair cabling

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

UTP is the most popular type of twisted-pair cable and is fast becoming the most popular LAN
cabling. It is cheap and easy to use. However, its performance over long distances is not as good
as coaxial cable. The maximum cable length segment of UTP is 100 meters. There are a number
of different types (or categories) of UTP cable, which differ in their specification and in the
number of pairs of wire contained within the cable. Most telephone systems use UTP cable (with
the RJ11 connector), and many LANs nowadays also use UTP (with the RJ45 connector). STP is
higher quality than UTP, but more expensive and less popular.

UTP have categorized different grades of cable along with connector, distance, and installation
specifications and UTP wiring "Category" (or CAT) ratings for the industry (that is, CAT 5,
CAT 5e, and CAT 6 cabling) and with connecter UTP is RJ-45 plug.

UTP Wiring Standards


UTP cabling is an important thing to understand, especially if you’re planning to work on any
type of LAN network. There are different types of wiring standards available: the most common
wiring standards are:

 Straight- through cable (586A)


 Crossover cable (586B)
When only two computers are networked, a special cable can be used for this application that has
transmit and receive pairs "crossed over" and is referred to as a crossover cable.

Cross-Over wiring using arrangements

White Green White Orange


Green Orange
White Orange White Green
Blue Blue
White Blue White Blue
Orange Green
White Brown White Brown
Brown Brown

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

When more than two computers must be connected, the crossover trick won't work and devices
known as a Hubs and/or Switches must be used. In this situation, each of the computers is
plugged into a port on the Hub or Switch using a straight-thru cable.

Straight-Through Wiring arrangement

White Green White Green


Green Green
White Orange White Orange
Blue Blue
White Blue White Blue
Orange Orange
White Brown White Brown
Brown Brown

NETWORK CABLE TOOL AND CONNECTORS

Modular Plug Crimp Tool Universal UTP Stripping Tool

UTP Cable Sheath Stripper Diagonal Cutters

Punch Tools RJ-45

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Fiber-optic
In fiber-optic cable, optical fibers carry digital data signals in the form of modulated pulses of
light. This is a relatively safe way to send data because, unlike copper-based cables that carry
data in the form of electronic signals, no electrical impulses are carried over the fiber-optic cable.
This means that fiber-optic cable cannot be tapped, and its data cannot be stolen.

Fiber-optic cable is good for very high-speed, high-capacity data transmission because of the
purity of the signal and lack of signal attenuation.

An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic.
Plastic is easier to install, but cannot carry the light pulses for as long a distance as glass.

Because each glass strand passes signals in only one direction, a cable includes two strands in
separate jackets. One strand transmits and one receives. A reinforcing layer of plastic surrounds
each glass strand, and Kevlar fibers provide strength. See Figure 3 for an illustration of fiber-
optic cable. The Kevlar fibers in the fiber-optic connector are placed between the two cables.
Just as their counterparts (twisted-pair and coaxial) are, fiber-optic cables are encased in a plastic
coating for protection.

Figure 3 – The composition of a fiber-optic cable

Network Interface Card (NIC)


A NIC (pronounced 'nick') is also known as a network card. It connects the computer to the
cabling, which in turn links all of the computers on the network together. Each computer on a
network must have a network card. Most modern network cards are 10/100 NICs and can operate
at either 10Mbps or 100Mbps.

Only NICs supporting a minimum of 100Mbps should be used in new installations schools.
Computers with a wireless connection to a network also use a network card (see Advice Sheet 20
for more information on wireless networking).

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Fig 5: Network Interface Cards (NICs)

Hub and Switch


A hub is a device used to connect a PC to the network. The function of a hub is to direct
information around the network, facilitating communication between all connected devices.
However in new installations switches should be used instead of hubs as they are more effective
and provide better performance. A switch, which is often, termed a 'smart hub'.

Switches and hubs are technologies or ‘boxes’ to which computers, printers, and other
networking devices are connected. Switches are the more recent technology and the accepted
way of building today's networks. With switching, each connection gets "dedicated bandwidth"
and can operate at full speed. In contrast, a hub shares bandwidth across multiple connections
such that activity from one PC or server can slow down the effective speed of other connections
on the hub.

Now more affordable than ever, Dual-speed 10/100 autosensing switches are recommended for
all school networks. Schools may want to consider upgrading any hub based networks with
switches to improve network performance – ie speed of data on the network.

Fig 6a: An 8 port Hub

Fig 6b: 2 Examples of 24 port Switches

Wireless connections
Wireless connection is becoming very popular in home and office technology. It eliminates the
‘spaghetti trap’, where cables entwine and it creates an uncluttered environment. However,
wireless network communication can be slower, and insecure, leaving data more easily open to
hackers.
Cordless peripherals are now available at affordable prices for most users. They include
keyboards, mice, game pads, joysticks and pointing devices to interact with host devices. Host

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

devices are not only computers but can be home appliances, game machines and televisions. The
peripheral requires battery power to operate, and are more easily accessible to potential thieves.
Cordless peripherals are usually controlled by a short-range communication method such as the
infrared standard IrDA (Infra-red Data Association) that sets the standards for both the physical
devices and the protocols they use to communicate. IrDA requires line-of-sight access between
devices for data transfer.
New developments in other short distance communication such as Bluetooth technology, which
use radio frequency to communicate, have proved to be more efficient and faster than IrDA.
IrDA and Bluetooth are not network technologies, but simply different methods of connecting.
LAN wireless communication requires a wireless router and a transmitter connected to each
device that is connected to the network. These are becoming more economical. The main
problem is their lack of security.
Wireless LANs use the standard 802.11. One type of wireless LAN can transfer data at 11Mbps
and another at 54 Mbps. But if interference is detected or the radio signal is weak, the transfer
rate is reduced.

Configuring a wireless network


There are two methods of configuring a wireless network:
1 Infrastructure
2 Ad Hoc.
In the Infrastructure mode, the wireless LAN connects to an access point that covers a fixed
area using an antenna. The wireless access point converts the data into wired Ethernet data,
acting as a bridge between the wired LAN and wireless clients. Access points connect to a wired
Ethernet backbone and extend the wireless network coverage. For example, as a mobile user
moves out of range of one access point, they move into the range of another.
Ad Hoc wireless networks are similar to a peer-to-peer workgroup where computers
communicate with other computers, and there is no structure or fixed point. The computer
devices need to be within range of each other and it is cheaper and easier to set up than the
Infrastructure mode.

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Information Sheet 2 Connecting peripherals to network

Connecting peripheral to the network


Now we’ll look at connecting peripherals either to a host computer or directly on the network,
and via wireless connection. We’ll also consider the performance levels of the different
connection types.
Some peripherals can only connect by a network cable and protocols. Others may only connect
to a computer or other host device such as a print server. Yet others will allow you a choice of
connection methods. For example, network attached storage (NAS) devices will connect to the
network cable. Scanners will normally require connection to a computer, and printers will
usually give you a choice.
In most cases, peripherals attached to a host computer on a network slow the performance of the
computer when the peripheral is being activated over the network. In a stand-alone environment,
there may be no other choice. But in a network environment, the host computer that connects the
peripheral to the network should not be operated heavily as a workstation.
Peripherals such as speakers are only connected to the local host computer and cannot be used
over the network. Speakers use little resources but peripherals that heavily use resources should
be turned off if other peripherals such as a printer are being used over the network.
Web cams used for individual staff attending interstate meetings require a good amount of
bandwidth. They also use a lot of the computer’s processing power and should only be fixed to
computers that are not used as a network resource for other peripherals.

Physical network connections


The most common network standard in use today is Ethernet. The IEEE (Institute of Electrical
and Electronic Engineers) sets Ethernet standards for the physical devices and the protocols. It is
a medium that consists of coaxial copper cable, twisted pair or fibre optic cable, on which
electronic signals travel and to which computer devices are attached.
The Ethernet protocol sets the rules for constructing frames that are transferred around the
network. Frames are short messages that hold information, and include the destination and
source address of each computer.
Most organisational networks are now running at a speed of 100 Mbps using CAT5 UTP
(unshielded twisted pair) cables. However, a CAT6 cable can transfer data at 1000Mbps, and is
used in some larger organisations. A new standard IEEE 802.3ak™-2004 will transfer data at
10 Gbs.
A peripheral will normally connect directly to a hub or switch, or into a wall connection that is
wired as part of the network.

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Figure 1: Connecting with RJ-45 connection

Physical connections to a host computer


A peripheral can be connected to a host device such as a computer or print server. As mentioned
above, if the peripheral is heavily used over the network, then the workstation’s performance is
reduced. For example, if it is a printer, the user will find the computer runs more slowly as others
print documents over the network. In cases where the peripheral is used constantly, it is best not
to use the computer as a workstation.
As with connections directly to the network, Universal Serial Bus (USB) is becoming very
popular. USB use plug and play technology and reduces the configuration time, as it is usually
not necessary to adjust configurations. There is no need to reboot the computer each time a new
device is added.

Figure 2: Parallel cable Figure 3: Serial cable

Figure 5:Firewire
Figure 4: USB

Prepared by Tsehayou Sieley 2011 E.C


Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4

Figure 6: SCSI

Prepared by Tsehayou Sieley 2011 E.C

Das könnte Ihnen auch gefallen