la3_ict handybook (3.1-3.4)

Upload: syimah

Post on 30-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    1/22

    LEARNING AREA 3 COMPUTER NETWORKS AND COMMUNICATIONS

    Topic 3.1 - Basic Concepts of Networks and Communications

    3.1.1 Definition3.1.1.1 Define computer networks.

    3.1.1.2 Define communications.

    3.1.2 Importance of Computer Network

    3.1.2.1 State the importance of computer networks and communications.

    A computer network is a collection of computers and devices connected together viacommunication devices and transmission media. It may connect computers, printers andscanners.

    Communication describes a process in which two or more computer or devices transfer data, instructions and information.

    There are many importance of computer networks and communications such as we cansharing devices and program. We also can share the files, data, information and alsosharing high speed internet connection. Other than that, we can access server centereddatabase.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    2/22

    3.1.3 Types of Networks

    3.1.3.1 Define types of computer networks: LAN, MAN and WAN

    3.1.3.2 Differentiate between the three types of computer networks.

    LAN - Local Area Network That connect computers and devices in a limited geographical area such as home,

    school computer laboratory and office building.

    MAN - Metropolitan Area Network

    High speed network that connects local area networks in a metropolitan area such

    as city or town and handles bulk of communications activity across the region.

    WAN - Wide Area Network

    Network that covers a large geographical area such as country or the world.

    WAN combines many types of media such as telephone lines, cables and radio

    waves. The internet is the world largest WAN.

    The differentiate between the three types of computer networks are geographicalarea, cost and speed. WAN is a network that covers a large geographical area such ascity, country or the world. But, for LAN and MAN only covers in a limited geographicalarea such as home, school lab and office building.

    In a case of WAN the cost of data transmission is very high/ expensive because thetransmission mediums used to be hired. The cost of LAN and MAN is less because thetransmission medium is owned by a single organization.

    The speed of data transmission of WAN is lower while the speed of data transmissionis much higher in LAN.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    3/22

    3.1.4 Network Architecture

    3.1.4.1 Define two types of network architecture: Client/Server and Peer-to-Peer.

    CLIENT/SERVER

    A network architecture in which each computer or process on the network is either aclient or a server . Servers are powerful computers or processes dedicated to managingdisk drives (file servers ), printers ( print servers ), or network traffic (network servers ).Clients are PCs or workstations on which users run applications . Clients rely onservers for resources , such as files , devices , and even processing power.

    PEER-TO-PEER

    Often referred to simply as peer-to-peer, or abbreviated P2P, a type of network inwhich each workstation has equivalent capabilities and responsibilities. This differsfrom client/server architectures , in which some computers are dedicated to serving theothers. Peer-to-peer networks are generally simpler, but they usually do not offerthe same performance under heavy loads .

    http://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/architecture.htmlhttp://www.webopedia.com/TERM/C/architecture.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/client.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/dedicated.htmlhttp://www.webopedia.com/TERM/C/disk_drive.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/printer.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/traffic.htmlhttp://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/PC.htmlhttp://www.webopedia.com/TERM/C/PC.htmlhttp://www.webopedia.com/TERM/C/workstation.htmlhttp://www.webopedia.com/TERM/C/user.htmlhttp://www.webopedia.com/TERM/C/user.htmlhttp://www.webopedia.com/TERM/C/user.htmlhttp://www.webopedia.com/TERM/C/run.htmlhttp://www.webopedia.com/TERM/C/application.htmlhttp://www.webopedia.com/TERM/C/resource.htmlhttp://www.webopedia.com/TERM/C/file.htmlhttp://www.webopedia.com/TERM/C/device.htmlhttp://www.webopedia.com/TERM/P/network.htmlhttp://www.webopedia.com/TERM/P/workstation.htmlhttp://www.webopedia.com/TERM/P/workstation.htmlhttp://www.webopedia.com/TERM/P/client_server_architecture.htmlhttp://www.webopedia.com/TERM/P/client_server_architecture.htmlhttp://www.webopedia.com/TERM/P/dedicated.htmlhttp://www.webopedia.com/TERM/P/dedicated.htmlhttp://www.webopedia.com/TERM/P/load.htmlhttp://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/architecture.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/client.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/dedicated.htmlhttp://www.webopedia.com/TERM/C/disk_drive.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/printer.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/traffic.htmlhttp://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/server.htmlhttp://www.webopedia.com/TERM/C/PC.htmlhttp://www.webopedia.com/TERM/C/workstation.htmlhttp://www.webopedia.com/TERM/C/user.htmlhttp://www.webopedia.com/TERM/C/run.htmlhttp://www.webopedia.com/TERM/C/application.htmlhttp://www.webopedia.com/TERM/C/resource.htmlhttp://www.webopedia.com/TERM/C/file.htmlhttp://www.webopedia.com/TERM/C/device.htmlhttp://www.webopedia.com/TERM/P/network.htmlhttp://www.webopedia.com/TERM/P/workstation.htmlhttp://www.webopedia.com/TERM/P/client_server_architecture.htmlhttp://www.webopedia.com/TERM/P/dedicated.htmlhttp://www.webopedia.com/TERM/P/load.html
  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    4/22

    3.1.5 Network Topology

    3.1.5.1 State three types of network topologies.

    3.1.5.2 Differentiate between the three types of network topology.

    There are many differentiate of the types of network topology. There are central device,data transmitted, installation and maintenance. Bus and star go to both direction while thering only go to one direction. It installation and maintenance of bus and star also samethat is easy for install and ring is difficult. If one node fails bus and star are still working

    but the entire network of ring is stop working.

    Bus topology:

    All devices are connected to a central cable, called the bus or backbone . Bus

    networks are relatively inexpensive and easy to install for small networks. Ethernet

    systems use a bus topology.

    Ring topology :

    All devices are connected to one another in the shape of a closed loop, so that each

    device is connected directly to two other devices, one on either side of it. Ring

    topologies are relatively expensive and difficult to install, but they offer high

    bandwidth and can span large distances.

    Star topology:

    All devices are connected to a central hub . Star networks are relatively easy to install

    and manage, but bottlenecks can occur because all data must pass through the hub.

    http://www.webopedia.com/TERM/t/device.htmlhttp://www.webopedia.com/TERM/t/bus.htmlhttp://www.webopedia.com/TERM/t/backbone.htmlhttp://www.webopedia.com/TERM/t/network.htmlhttp://www.webopedia.com/TERM/t/Ethernet.htmlhttp://www.webopedia.com/TERM/t/system.htmlhttp://www.webopedia.com/TERM/t/ring_network.htmlhttp://www.webopedia.com/TERM/t/star_network.htmlhttp://www.webopedia.com/TERM/t/hub.htmlhttp://www.webopedia.com/TERM/t/data.htmlhttp://www.webopedia.com/TERM/t/device.htmlhttp://www.webopedia.com/TERM/t/bus.htmlhttp://www.webopedia.com/TERM/t/backbone.htmlhttp://www.webopedia.com/TERM/t/network.htmlhttp://www.webopedia.com/TERM/t/Ethernet.htmlhttp://www.webopedia.com/TERM/t/system.htmlhttp://www.webopedia.com/TERM/t/ring_network.htmlhttp://www.webopedia.com/TERM/t/star_network.htmlhttp://www.webopedia.com/TERM/t/hub.htmlhttp://www.webopedia.com/TERM/t/data.html
  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    5/22

    3.1.6 Protocol

    3.1.6.1 Define Transmission Control Protocol/Internet Protocol (TCP/IP) as a protocol to facilitatecommunication over computer network.

    3.1.7 Internet, Intranet, Extranet

    3.1.7.1 Describe the types of network communications technology: Internet Intranet Extranet

    Topic 3.2 - Hardware Requirement3.2.1 Devices3.2.1.1 Identify the devices needed in computer network

    communication : Network Interface Card (NIC) Wireless Network Interface Card Modem (internal and external) Hub / Switch Router

    A protocol is a set of rules for the exchanges of data between a terminal and computer or between two computers. Think of protocol as a sort of precommunication agreementabout the form in which a message or data to be sent and receipt is to be acknowledge.

    TCP/ IP is short for Transmission Control Protocol/ Internet Protocol. TCP/ IP is anetwork standard , specifically a protocol , that defines how messages are routed fromone end of a network to the other, ensures the data arrives correctly.

    InternetAn internet is a public network. It is worldwide collection of networks that linksmillions of businesses, government agencies, educational institutions andindividuals.

    Intranets

    An intranets is a private network within an organization that resembles the internet.Organization use intranets to provide information to their employees.

    extranets

    An extranets is a private network that connects more than one organization. It is toallow supplier, customers and businesses partner limited access to their networks.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    6/22

    3.2 Hardware Requirements3.2.1 Devices3.2.1.1 Identify the devices needed in computer network communication.

    3.2.1.2 State the functions of the following: Network Interface Card (NIC) Wireless Network Interface Card Modem (internal and external) Hub / Switch Router Wireless Access Point

    The function of

    network interface card (NIC) is a communication device that enables a computer or device to access wired network ( via cable )

    A wireless network interface card also is a communication that enables a computer toaccess a wireless network ( via radio wave).

    A modem is a communication that enables a computer to transmit data over telephone or cable line. Modem converts digitals signals from your computer into analog signals tosend over the phone lines and converts the phones analog signals into digital for thecomputer.

    A hub is a communication devices that is used for connecting wired computers of deviceson a LAN.

    A wireless access point is a communication device that is used for connecting wirelesscomputers of devices on LAN.

    A router is a communication device that connects multiple computers and transmits datato its correct destination on the network. Its also allows multiple computers to share asingle high-speed internet connection.

    There are six devices that needed in computer network communication are a networkinterface card ( NIC ), a wireless network interface card, a modem, hub, wireless accesspoint and a router.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    7/22

    3.2.2 Medium

    3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded TwistedPair (STP), Coaxial and Fibre Optic Cable.

    3.2.2.2 Identify various types of wireless transmission media such as infrared, radio wave andsatellite.

    Twisted pair cable are insulted copper wire, twisted around each other. Multiple twistedpairs can be combined into a single cable. This twisted pair configuration somewhatreduces interference from electrical field.

    Coaxial cable consists of a single copper wire surrounded by at least three layer aninsulating material, braided wired, plastic coating.

    Fibre Optic consists of dozens of hundreds of thin strands of glass that use light transmitsignal. Each strand. Call optical fibre, is as thin as a human hair.

    Infrared- type of wireless transmission medium that sends signals using infrared lightwaves. To communicate each other, Infrared devices often must be within about 5meters.

    Radio wave - Bluetooth = uses short range radio waves to transmit data between twobluetooth devices.

    WiFi = ( Wireless Fidelity ) transfers between devices at rate of 11-54

    Mbps. To communicate each other, WiFi devices often must bewithin about 30 meters.

    Satellite space station that receives microwave signals from an earth-based station,amplifies the signals and broadcasts the signal back over a wide area to any number of earth- based stations.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    8/22

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    9/22

    3.4.1 Installation of Network Interface Cards (NIC)3.4.1.1 Insert network interface cards (NIC).

    Remove all jewelry from your hands and wrists and use only insulated or nonconducting tools.

    Follow these steps to insert the NIC in your PC:

    1 . Turn off power to the PC, and remove the power cord from the PC.

    2 . Unscrew the cover screws and remove the cover.

    On some PCs, it may be necessary to remove all cables before the cover can be removed.

    3 . Locate an available ISA or EISA slot and remove the screw from the corresponding backplate and savethe screw.

    Some PCs have both ISA and PCI slots. Make sure that you install the EtherLink III ISA NIC in either anISA or an EISA slot.PCI slots, the shortest of the three types of slots, are white. The longer ISA slots are black. EISA slots, thelongest, are brown.

    4 . Remove and discard the backplate.

    5 . Ensure that the shape and length of the edge connector on the NIC match the slot that you intend to use.

    6 . Carefully insert the NIC into the slot; press firmly with steady pressure to ensure that the NIC is fullyseated in the slot.

    When the NIC is correctly inserted in the slot, the NIC backplate is flush with the PC backplate.

    7 . Secure the NIC with the backplate screw.

    8 . Replace the PC cover. Reinsert and tighten the cover screws.

    9 . Reconnect all power and peripheral cables.

    3.4.1.2 Install drivers for the NIC.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    10/22

    To install the network adapter driver, follow these steps:

    1. In Control Panel, double-click Network.2. On the Adapters tab, click Add.3. Click Have Disk.4. Type the path to the third-party network adapter driver files in the Insert Disk box. If the

    driver files are on a floppy disk, verify that the disk is inserted in the floppy disk drive before proceeding. Click OK.

    5. Click the network adapter driver for your network card in the Select OEM Option box,and then click OK.

    6. Choose the configuration settings for your network adapter, and then click OK.7. Choose or type any other necessary network configuration options on the Identification,

    Services, and Protocols tabs, and then click Close.8. If any additional network software options are installed, you may be prompted for

    additional information about these settings.9. Click Yes when you are prompted to restart your computer.

    3.4.2 Cable Crimping and Testing3.4.2.1 Crimp and test UTP cable

    Straight cable Crossed cable

    Straight cable is used to connect computers to a network through a hub and for crossed

    cable is used to connect two computing devides directly.

    3.4.2.2 Create awareness of the correct way when crimping a cable.

    First step is skin off the cable jacket using cable stripper. Second, untwist each pair and

    straighten each wire and arranged it as follows. Then, cut all the wires. Next, insert the

    wires into the RJ45 connector. After that, place the connector into a crimping tool, and

    squeeze hard so that the handle reaches its full swing. Finally, use a cable tester to test for

    proper continuity.

    3.4.3 Configuration and Testing of Network

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    11/22

    3.4.3.1 Configure the workstation to join a Local Area Network : Internet Protocol (IP) Address Subnet Mask Server name

    1) IP address= 192.168.1.72) Subnet Mask= 255.255.255.03) Default gateway= 192.168.1.1

    3.4.3.2 Test the network connection.

    Best utility to test network connection is by using the ping command . The ping commanddisplays whether the destination responded and how it took to receive a reply.

    3.4.4 Share Data

    3.4.4.1 Create a shared folder.

    Step 1:

    On your desktop, create a shared folder: Right-click your mouse button on any blank space on yourdesktop and point towards NEW and then click on FOLDER.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    12/22

    The new folder will appear on your desktop as shown below:

    Step 2:

    Rename the folder: Pointing towards the New Folder icon, click the right mouse-button and then clickon RENAME.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    13/22

    Name the newly created folder SHARED

    Step 3:

    Right click on the SHARED folder and then click on SHARING, a SHARED properties window willappear with the "sharing" tab selected. (see step 4)

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    14/22

    Step 4:

    On the SHARED Properties window click on "Share this folder" option to select it.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    15/22

    Step 5:

    Click on the Permissions button:

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    16/22

    Step 6:

    You will see in the "Permissions for SHARED" window, and under Name you will see EVERYONElisted. Highlight EVERYONE by clicking on it once and then click on the "REMOVE" button to removeEveryone from the list.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    17/22

    Once you have removed EVERYONE from the list you will see the following window:

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    18/22

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    19/22

    Step 9:

    Click on the CHECK NAMES button and you will see your name appear with an underline, showingthat your name has been verified on the network.

    Click OK

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    20/22

    The "Permissions for SHARED" window will appear with your name under the NAME field:

    Step 10:

    In the "Permission for SHARED" window under the PERMISSIONS field check the ALLOW boxes nextto "Full Control" & "Change". So the PERMISSIONS field will show 3 boxes checked showingALLOWED for all three functions. You have given yourself FULL CONTROL of the shared folder.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    21/22

    Click OK; You could also click on APPLY and then click OK.

    Step 11:

    In the "SHARED Properties" window click on the SECURITY tab on the top right hand side. Youshould see your name appear here as shown below. Do not change anything here. If your namedoes not appear here go back to Step 7 and repeat Steps 7 through 11 in order to add yourself.

  • 8/9/2019 LA3_ICT Handybook (3.1-3.4)

    22/22

    Click OK; You could also click on APPLY and then click OK.

    You have now successfully created a shared folder which should show on your desktop as shownbelow: