Sie sind auf Seite 1von 41

INTRODUCTION TO

NETWORKING
SET-UP COMPUTER NETWORKS
OBJECTIVES:

• To learn what is a Network in a Computer and How it


works.
• To Know what is the materials and equipment use in
computer network.
• To learn what is the classes of an IP address.
WHAT IS A NETWORK?
A computer network is simply two or more computers connected
together so they can exchange information. A small network can
be as simple as two Computers linked together by a single
cable Technologies.
Networks consist of the computers, wiring, and other devices, such
as hubs, switches and routers that make up the network
infrastructure. Some devices, such as network interface cards,
serve as the computer’s connection to the network. Devices such
as switches and routers provide traffic- control strategies for the
network. All sorts of different technologies can actually be
employed to move data from one place to another, including
wires, radio waves, and even microwave technology.
• A network consists of two or more computers that are
linked in order to share resources (such as printers and
CDs), exchange files, or allow electronic communications.
The computers on a network may be linked through
cables, telephone lines, radio waves, satellites, or infrared
light beams.
• A computer network, often simply referred to as
a network, is a collection of hardware components and
computers interconnected by communication channels that
allow sharing of resources and information.[1] Where at
least one process in one device is able to send/receive
data to/from at least one process residing in a remote
device, then the two devices are said to be in a network.
• Networks may be classified according to a wide variety
of characteristics such as the medium used to transport
the data, communications protocol used, scale, topology,
and organizational scope.
• Communications protocols define the rules and data formats
for exchanging information in a computer network, and
provide the basis for network programming. Well-known
communications protocols are Ethernet, a hardware and link
layer standard that is ubiquitous in local area networks, and
the internet protocol suite, which defines a set of protocols for
internetworking, i.e. for data communication between multiple
networks, as well as host-to-host data transfer, and
application-specific data transmission formats.
• Computer networking is sometimes considered a sub-
discipline of engineering, telecommunications, computer
science, information technology or computer engineering,
since it relies upon the theoretical and practical
application of these disciplines.
MATERIALS AND EQUIPMENT USE IN
COMPUTER NETWORK
A tool is any item that can be used to achieve a goal,
especially one that is not consumed in the process.
Informally the word is also used to describe a procedure
or process with a specific purpose.
CRIMPING TOOL
A crimping tool is a tool designed to crimp or connects a
connector to the end of a cable. For example, network cables
and phone cables are created using a crimping tool to connect
the RJ-45 and RJ-11 connectors to the end of the cable. In the
picture to the right, is an example of what a crimping tool looks
like. This example shows a tool capable of crimping both RJ-11
and RJ-45 connectors.
CRIMPING TOOL
WIRE STIPPER
A simple manual wire stripper is a pair of opposing
blades much like scissors or wire cutters. The addition of a
center notch makes it easier to cut the insulation without cutting
the wire. This type of wire stripper is used by rotating it around
the insulation while applying pressure in order to make a cut
around the insulation. Since the insulation is not bonded to the
wire, it then pulls easily off the end. This is the most versatile
type of wire stripper.
WIRE STIPPER
LAN TESTER
Network Cable Tester is designed for testing opens, shorts and
miswired cable installations. It is designed to work with various
data cables and connectors. This cable tester provides a quick
go/no-go LED display of the wiring and connection of item
under test. You can either step through the test cable wiring one
at a time or have the unit automatically pulse through the pin-
outs and display the results.
LAN TESTER
REGISTERED JACK -45 (RJ-45)

REGISTERED JACK -45 (RJ-45), an eight-wire connect


computers onto a local-area networks (LAN), espacially
Ethernets. RJ-45 connectors look similar to the RJ-11
connectors used for connecting telephone equipment, but
they are a bit wider.
UNSHIELDED TWISTED PAIR (UTP)

UNSHIELDED TWISTED PAIR (UTP) is the most common type


of copper telepohne wiring. Twisted pair is the ordinary
copper wire that connects home and many business
computers to the telephone company. To reduce crosstalk
or electromagnetic induction between pairs and wires,
two insulated copper wires are twisted around each
other.
UNSHIELDED TWISTED PAIR (UTP)
SHIELDED TWISTED PAIR
Shielded twisted pair is a special kind of copper telephone wiring
used in some business installations. An outer covering or shield is
added to the ordinary twisted pair telephone wires; the shield
functions as a ground.
Twisted pair is the ordinary copper wire that connects home and
many business computers to the telephone company. To reduce
crosstalk or electromagnetic induction between pairs of wires,
two insulated copper wires are twisted around each other. Each
signal on twisted pair requires both wires. Since some telephone
sets or desktop locations require multiple connections, twisted
pair is sometimes installed in two or more pairs, all within a
single cable. Shielded twisted pair is often used in business
installations. The more common kind of wire that is installed to
your home is unshielded twisted pair.
Twisted pair is now frequently installed with two pairs to the
home, with the extra pair making it possible for you to add
another line (perhaps for modem use) when you need it.
Twisted pair comes with each pair uniquely color-coded when it is
packaged in multiple pairs. Different uses such
as analog, digital, and Ethernet require different pair multiples.
Although twisted pair is often associated with home use, a higher
grade of twisted pair is often used for horizontal wiring in LAN
installations because it is less expensive thancoaxial cable.
The wire you buy at a local hardware store for extensions from
your phone or computer modem to a wall jack is not twisted
pair. It is a side-by-side wire known as silver satin. The wall jack
can have as many five kinds of hole arrangements or pinouts,
depending on the kinds of wire the installation expects will be
plugged in (for example, digital, analog, or LAN) . (That's why
you may sometimes find when you carry your notebook
computer to another location that the wall jack connections won't
match your plug.)
SHIELDED TWISTED PAIR
NETWORK
A network switch orSWITCH
switching hub is a computer networking
device that connects network segments or network devices.A
switch is a telecommunication device which receives a message
from any device connected to it and then transmits the message
only to that device for which the message was meant. This makes
the switch a more intelligent device than a hub (which receives a
message and then transmits it to all the other devices on its
network.)
NETWORK SWITCH
HUB

A hub is used in a wired network to connect Ethernet cables


from a number of devices together. The hub allows each
device to talk to the others. Hubs aren't used in networks
with only wireless connections, since network devices such
as routers and adapters communicate directly with one
another. Three types of hubs are exist in the network.
• Passive hubs:
Passive hub receives data packet and retransmits them on the network
without amplify the electrical signal.

• Active hubs:
Active hubs are also known as Repeaters. They receives the data
packets amplify them and retransmit on the network. For amplification
they need the electrical signal.

• Intelligent hubs:
Intelligent hubs includes remote management and basically used in the
large scale companies where number of units can be placed one on
the top of other as stack.
HUB
ROUTER

• A router is a device that forwards data packets between computer


networks, creating an overlay internetwork. A router is connected to
two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the address information
in the packet to determine its ultimate destination. Then, using
information in its routing table orrouting policy, it directs the packet to
the next network on its journey. Routers perform the "traffic directing"
functions on the Internet. A data packet is typically forwarded from
one router to another through the networks that constitute the
internetwork until it gets to its destination node.
• The most familiar type of routers are home and small office
routers that simply pass data, such as web pages and email,
between the home computers and the owner's cable or DSL
modem, which connects to the Internet through an ISP. More
sophisticated routers, such as enterprise routers, connect large
business or ISP networks up to the powerful core routersthat
forward data at high speed along the optical fiber lines of
the Internet backbone.
ROUTER
MODEM
A modem (modulator-demodulator) is a device that modulates
an analog carrier signal to encode digital information, and also
demodulates such a carrier signal to decode the transmitted
information. The goal is to produce a signal that can be
transmitted easily and decoded to reproduce the original
digital data. Modems can be used over any means of
transmitting analog signals, from light emitting diodes to radio.
The most familiar example is a voice band modem that turns
the digital data of a personal computer into
modulated electrical signals in the voice frequency range of
a telephone channel. These signals can be transmitted
over telephone linesand demodulated by another modem at the
receiver side to recover the digital data.
Modems are generally classified by the amount of data they can send
in a given unit of time, usually expressed in bits per second(bit/s, or
bps). Modems can alternatively be classified by their symbol rate,
measured in baud. The baud unit denotes symbols per second, or the
number of times per second the modem sends a new signal. For
example, the ITU V.21 standard used audio frequency-shift keying,
that is to say, tones of different frequencies, with two possible
frequencies corresponding to two distinct symbols (or one bit per
symbol), to carry 300 bits per second using 300 baud. By contrast,
the original ITU V.22 standard, which was able to transmit and
receive four distinct symbols (two bits per symbol), handled 1,200
bit/s by sending 600 symbols per second (600 baud) using phase
shift keying.
MODEM
CLASSES OF IP ADDRESS
Every machine on the the Internet has a unique number assigned
to it, called an IP address. Without a unique IP address on your
machine, you will not be able to communicate with other devices,
users, and computers on the Internet. You can look at your IP
address as if it were a telephone number, each one being
unique and used to identify a way to reach you and only you.
IP ADDRESS CLASSES
These IP addresses can further be broken down into classes. These
classes are A, B, C, D, E and their possible ranges can be seen in
Figure 2 below.

Class Start address Finish address


A 0.0.0.0 126.255.255.255
B 128.0.0.0 191.255.255.255
C 192.0.0.0 223.255.255.255
D 224.0.0.0 239.255.255.255
E 240.0.0.0 255.255.255.255
If you look at the table you may notice something strange. The
range of IP address from Class A to Class B skips the 127.0.0.0-
127.255.255.255 range. That is because this range is reserved
for the special addresses called Loopback addresses that have
already been discussed above.

The rest of classes are allocated to companies and organizations


based upon the amount of IP addresses that they may need.
Listed below are descriptions of the IP classes and the
organizations that will typically receive that type of allocation.
Default Network: The special network 0.0.0.0 is generally used
for routing.

Class A: From the table above you see that there are 126 class A
networks. These networks consist of 16,777,214 possible IP
addresses that can be assigned to devices and computers. This
type of allocation is generally given to very large networks such
as multi-national companies.
Loopback: This is the special 127.0.0.0 network that is reserved
as a loopback to your own computer. These addresses are used
for testing and debugging of your programs or hardware.

Class B: This class consists of 16,384 individual networks, each


allocation consisting of 65,534 possible IP addresses. These
blocks are generally allocated to Internet Service Providers and
large networks, like a college or major hospital.
Class C: There is a total of 2,097,152 Class C networks available, with
each network consisting of 255 individual IP addresses. This type of
class is generally given to small to mid-sized companies.

Class D: The IP addresses in this class are reserved for a service called
Multicast.

Class E: The IP addresses in this class are reserved for experimental use.

Broadcast: This is the special network of 255.255.255.255, and is used


for broadcasting messages to the entire network that your computer
resides on.
PRIVATE ADDRESSES
There are also blocks of IP addresses that are set aside for
internal private use for computers not directly connected to the
Internet. These IP addresses are not supposed to be routed
through the Internet, and most service providers will block the
attempt to do so. These IP addresses are used for internal use
by company or home networks that need to use TCP/IP but do
not want to be directly visible on the Internet. These IP ranges
are:
Private Start
Class Private End Address
Address

A 10.0.0.0 10.255.255.255

B 172.16.0.0 172.31.255.255

C 192.168.0.0 192.168.255.255

If you are on a home/office private network and want to


use TCP/IP, you should assign your computers/devices
IP addresses from one of these three ranges. That way
your router/firewall would be the only device with a true
IP address which makes your network more secure.

Das könnte Ihnen auch gefallen