Administrate Network and Hardware Peripherals

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

INFORMATION SHEET

Administrate Network and Hardware Peripherals

Learning outcomes
1. Confirm requirements of client
2. Obtain required peripherals
3. Connect hardware peripherals
4. Install peripherals to a network
5. Configure peripheral services
6. Administer and support peripheral services
7. Maintain peripherals and fix common problems
8. Use and maximize operating system
9. Support input and output devices

Introduction
This unit defines the competence required to connect, install, configure, maintain and troubleshoot local area
network and peripherals
INFORMATION LO1 Confirm requirements of client
SHEET
MODULE Administrate Network and Hardware
Peripherals

What is network?
A network can be defined as a group of computers and other devices connected in some ways so as to be able
to exchange data. Each of the devices on the network can be thought of as a node, each node has a unique
address. Addresses are numeric quantities that are easy for computers to work with, but not for humans to
remember.
Why are networks useful?
We use computer network for different applications through our life some of them are:
 Business applications
 Home applications
 Mobile users
Business applications
i. Resource sharing: computer network in business helps us for resource sharing. This may reduce
the cost spent on buying different hardware components.
e.g. shared printer, shared scanner, etc.
ii. Information sharing: computer network in business helps us for information sharing.
e.g. clients database, Medline, etc.
iii. Communication medium among people: we use network to communicate with different client
those are found over network.
e.g. e-mail, videoconferencing, etc.
iv. E-business: by using computer network we can sell or buy materials through e-business. e-
business is an electronic business
Home applications
We can also use computer network in our home through mobile or computer. E.g social communication such
as face book e-mail etc.
Mobile users
People use Mobile as notebook computers. Portable office, like e-mail, access remote files, log on to remote
machine.
Computer network models
1. Client/ server model: are more suitable for larger networks. A central computer, or 'server', acts as the
storage location for files and applications shared on the network. Usually the server is a higher than
average performance computer. The server also controls the network access of the other computers
which are referred to as the 'client' computers. It is housed and maintained by a system administrator
where as a client is a common computer used to access remote data. Clients and servers are connected
by a network cables. In this model the client sends a request over the network to the server and server
gets the request, does the job and sends back a reply. Typically, teachers and students in a school will
use the client computers for their work.

Peer-to-peer model: Peer-to-peer networks are more commonly


implemented where less then ten computers are involved and where
strict security is not necessary. All computers have the same status, hence the term 'peer', and they
communicate with each other on an equal footing. Files, such as word processing or spreadsheet documents,
can be shared across the network and all the computers on the network can share devices, such as printers or
scanners, which are connected to any one computer. All computers found on such model have the same power
to share and access information.

Comparison between Peer-to-Peer and Client/Server Networks


Peer-to-Peer Networks vs Client/Server Networks
Peer-to-Peer Networks Client/Server Networks
 Easy to set up  More difficult to set up
 Less expensive to install  More expensive to install
 Can be implemented on a wide range of  A variety of operating systems can be supported on the
operating systems client computers, but the server needs to run an
operating system that supports networking
 More time consuming to maintain the  Less time consuming to maintain the software being
software being used (as computers must used (as most of the maintenance is managed from
be managed individually). the
server) .
 Very low levels of security supported or  High levels of security are supported, all of which are
none at all. These can be very controlled from the server. Such measures prevent the
cumbersome to set deletion of essential system files or the changing of
up, depending on the operating system being settings.
used.
 Ideal for networks with less than 10  No limit to the number of computers that can be
computers. supported by the network
 Does not require a server.  Requires a server running a server operating system.
 Demands a moderate level of skill to  Demands that the network administrator has a high
administer the network. level of IT skills with a good working knowledge of a
server operating system

Network Components
A computer network comprises the following components:
 A minimum of at least 2 computers
 Cables that connect the computers to each other, although wireless communication is becoming more common
 A network interface device on each computer (this is called a network interface card or NIC)
 A ‘Switch’ used to switch the data from one point to another. Hubs are outdated and are little used for new
installations.
 Network operating system software
To connect computers we need the following components:
1. Network connectivity devices: are devices used to connect two or more than two computers together.
Network Interface Card (NIC): A NIC (pronounced 'nick') is also known as a network card. It connects the
computer to the cabling, which in turn links all of the computers on the network together. Each computer on a network
must have a network card. Most modern network cards are 10/100 NICs and can operate at either 10Mbps or 100Mbps.
Only NICs supporting a minimum of 100Mbps should be used in new installations students. Computers with a wireless
connection to a network also use a network card (see Advice Sheet 20 for more information on wireless networking).

Hub and Switch


A hub is a device used to connect a PC to the network. The function of a hub is to direct information around the
network, facilitating communication between all connected devices. However in new installations switches should be
used instead of hubs as they are more effective and provide better performance. A switch, which is often, termed a 'smart
hub'. Switches and hubs are technologies or ‘boxes’ to which computers, printers, and other networking devices are
connected. Switches are the more recent technology and the accepted way of building today's networks. With switching,
each connection gets "dedicated bandwidth" and can operate at full speed. In contrast, a hub shares bandwidth across
multiple connections such that activity from one PC or server can slow down the effective speed of other connections on
the hub.

24 port switch
8 port hub
2. Network cable: is cable that is used to connect computers through network card. This cable is act as
communication channel between computers.
When we connect computers to each other for communication purpose and resource sharing, there are 3
main things to be considered.
1. Sender /source: is a computer from which resource is shared from.
2. Communication channel: is a device that transforms data from one computer to other
computer. E.g network cable
3. Receiver/destination: is a computer that receives data.
Types of network cable
1. Coaxial Cable
Coaxial cable is braided-grounded strands of wire that can provide some shielding and noise immunity;
however, the installation and the termination of the cable itself can be costly. Coaxial cabling, which uses
connectors called BNC (Bayonet Nut Connector) is known as, in forms of Ethernet, thick net and thin net, in
the older LAN technology, ARCnet, and cable TV.

2. Cat 3 UTP and STP


Category 3 UTP and STP (Cat 3) include
applications as voice (telephony) or data (up
to 10 Mbps). More commonly Cat 3 is used on networks for cable segments to workstations or printers. Cat 3
is not recommended for data installations since its maximum bandwidth of 10Mbps is rapidly being exceeded
by many LAN technologies.
Category 5 UTP and STP
Applications for Category 5 UTP and STP include voice (telephony) or data (up to 100 Mbps, or with certain
technologies, 1000 Mbps). Cat 5 is sometimes used as a backbone; however is restricted to 100 meters in
length. It is currently the most popular cabling for connecting workstations and horizontal cable runs due to its
low cost, high bandwidth, relative ease of installation, and ease of termination with RJ-45 connectors.
Unshielded Twisted Pair (UTP)
Unshielded Twisted Pair (UTP) is a set of three or four pairs of wires with each wire in each pair twisted
around the other to prevent electromagnetic interference. UTP cabling uses RJ-45, RJ-11 Because it is less
expensive and easier to install, UTP is more popular than Shielded Twisted Pair (STP) or Coaxial Cabling. An
example of UTP application is telephone networks, which use RJ-11 connectors, and 10BASE-T networks,
which use RJ-45 connectors. UTP comes in the form of Cat 2, 3, 4, and 5 grades; however, only Cat 5 is now
recommended for any data applications. The maximum length is 100 meters, without using any kind of signal
regeneration device, and a maximum data transfer rate of 1000 Mbps for Gigabit Ethernet.

Shielded Twisted Pair (STP) Shielded Twisted Pair (STP), like UTP, also has four pairs of wires with each
wire in each pair twisted together. However, the difference is that STP is surrounded with a foil shield and
copper braided around the wires that allows more protection from any external electromagnetic interference.
Because of the shielding, the cable is physically larger, more difficult to install and terminate, and more
expensive than UTP. For applications in electrically noisy environments, STP uses RJ-45, RJ-11 connectors.
Like UTP, STP also comes in Cat 2, 3, 4, or 5 grades; however, only Cat5 is recommended for any data
applications. The maximum cable length with no signal regenerating device is 100 meters; with a maximum
data transfer rate is 500 Mbps.
Fiber Optic
Fiber optic cabling carries signals, which have been converted from electrical to optical (pulses of light)
form. It consists of the core, either an extremely thin cylinder of glass or optical quality plastic, which is
surrounded by a second glass or plastic layer called the cladding. The interface between the core and cladding
can trap light signals by a process called Total Internal Reflection (TIR), resulting in the optical fiber acting as
a light pipe. Protective buffer and jackets materials are used to cover the cladding layer. This type of cabling is
less frequently used because it is somewhat more expensive; however, it is rapidly decreasing in both raw cost
and installed cost. Fiber optic cables are not susceptible to interference, such as radio waves, fluorescent
lighting, or any other source of electrical noise. It is the common cable used for network backbones and can
support up to 1000 stations, carrying signals beyond 25 km. Maximum data transfer rate is virtually limitless:
tens and hundreds of gigabits per second, limited only by the electronics on each end of the fiber.

In this level you are expected to establish peer to peer network model. A peer-to-peer network, also
called a workgroup, is commonly used for home and small business networks. In this model, computers
directly communicate with each other and do not require a server to manage network resources. In general, a
peer-to-peer network is most appropriate for arrangements where there are less than ten computers located in
the same general area. The computers in a workgroup are considered peers because they are all equal and
share resources among each other without requiring a server. Each user determines which data on their
computer will be shared with the network. Sharing common resources allows users to print from a single
printer, access information in shared folders, and work on a single file without transferring it to a floppy disk.
In order to establish a peer-to-peer network, you must ensure that all of the necessary hardware, protocols,
services and settings are configured properly. This includes:
Network cable configuration
Cable configuration: based on the type of components to be connected. You are expected to configure cables
in straight through or crossover.
 If you want to connect similar components such as computer with computer or hub with hub you must use
crossover cable configuration.
 If you want to connect different components together such as computer with hub or hub with switch you
must use straight through cable configuration.
The standards designate network cable pairs as the Green pair and the Orange pair. The Blue and Brown
pairs are not used but are still crimped into the RJ45 connector. There are 2 standards for the order in which
the wires go into the connector. 568A and 568B are actually opposites of each other. Notice that the Brown
and Blue pairs don’t change position only the Orange and Green pairs will be exchanged.

568A Cable End 568 B Cable End


1. White-Green 1. White-Orange
2. Green 2. Orange
3. White-Orange 3. White-Green
4. Blue 4. Blue
5. White-Blue 5. White-Blue
6. Orange 6. Green
7. White- Brown 7. White-Brown
8. Brown 8. Brown

A straight-through cable has both ends made with the same standard and is used to go from a computer to a
switch or a switch to a hub. A crossover cable has opposite standards on opposite ends and is used to go from
a computer directly to another computer or controller without using a hub. A hub or switch actually reverses
the polarity for you. To determine which wire is wire number 1, hold the RJ-45 connector with the open end to
you and the clip facing down so that the copper side is facing up.
C To configure the cable you need to get the following components and flow the steps:

RJ45 connector
Crimping tool

Making connections – Steps


1. Strip cable end
 Strip 1 – 1½” of insulating sheath
 Avoid cutting into conductor insulation

2. Untwist wire ends


 Sort wires by insulation colors

3. Arrange wires
 TIA/EIA 568A: WG-G- WO-Bl- WBl-O- WBr-Br
 TIA/EIA 568B: WO-O- WG-Bl -WBl-G- WBr-Br

4. Trim wires to size


 Trim all wires evenly
 Leave about ½” of wires exposed
5. Attach connector
 Maintain wire order, left-to-right, with RJ45 tab facing downward

6. Check
 Do all wires extend to end?
 Is sheath well inside connector?

7. Crimp
 Squeeze firmly to crimp connecter onto cable end (8P)

8. Test
 Does the cable work? Check by using cable tester as follows.

C Finally you are expected to connect computers together with the help of network cable make them ready
for sharing resources.
Other hardware components
C Computers: A minimum of two computers is required to establish a peer to peer network.
C Installing a network adapter, also called a Network Interface Card (NIC). Each computer that you want
to be part of the network must have a standard network adapter installed. A network adapter is installed on
your computer's motherboard and is used to access a network. When you install a network adapter, the
operating system creates a local area network (LAN) connection for you. It appears, like all other
connection types, in the Network and Dial-up Connections folder in Control Panel. Each time you start
your computer, Windows XP / 2000 detects your network adapter and automatically starts the local area
connection.
 Steps to install NIC driver
1. First log on as Administrator.
2. Right click on My computer → Click Manage
3. Select “Device Manager” →Select Network adapter from content pane→ Right-click → click
Properties → Select Driver tab → click Reinstall.
4. Insert Motherboard CD (If your NIC is attached to Motherboard) insert floppy disk (If your NIC is
on card- d/t type:-3Com,SIS, Reltex) → follow the procedure.
5. But in XP the OS detect NIC, so no need of inserting CD/floppy disk.
C Installing a network protocol and service, which is the software that allows you to connect to other
computers on the network. Define the rules that govern the communications between two computers
connected to the network. The role of protocol is addressing and routing of messages, error detection and
recovery, sequence and flow controls. A protocol specification consists of the syntax, which defines the
kinds and formats of the messages exchanged, and the semantic, which specifies the action taken by each
entity when specific events occur. Example: HTTP protocol for communication between web browsers and
servers. Protocols are designed based on a layered architecture such as the OSI reference model. Each entity
at a layer n communicates only with entities at layer n-1. The data exchanged, known as Protocol Data Unit
(PDU), goes back and forth through the layers, each layer adds or removes its own header and vice-versa.
Therefore a layer n PDU may become a layer n-1 data.
Protocol Layers
The OSI (Open Systems Interconnection) Data Model.OSI is ISO standard for computer networks design and
functioning. It consists of at least 7 layers, each playing a specific role when applications are communicating
over the network. During the sending process, each layer (from top to down) will add a specific header to the
raw data.
Layers of OSI model
1. Physical layer: used to define the physical characteristics of the network. It ensures a safe and efficient
travel of data; consists of electronic circuits for data transmission etc.
2. Data-link layer: provides safe communication of data over the physical network. Encapsulation data in the
form of packets and their interpretation at the physical layer.
3. Network layer: handles connection to the network by the higher layers. Check packets transmission from a
source A to a destination B.
4. Transport layer: provides end-to-end errors detection and correction. Deliver packets from a source A
to a destination B
5. Session layer: manages sessions among applications. Manage network access.
6. Presentation layer: provides standard data representations for applications. determines the format of the
data transmitted to applications, data compressing/decompressing, encrypting etc.
7. Application layer: applications connected to the network. Contains the applications which are used by the
end-user.
TCP/IP(Transmission Control Protocol/Internet Protocol): is used to control the communication between
networked components.
Internet Protocol: An IP number (also called IP address) identifies a machine on the network. A machine
may host several applications. Each application is accessible via a communication port. To send data to an
application running on a specific machine, the IP number and the application port number are required. It is an
unique address that computing device use to identify itself and communication with other device in the
network. The traditional IP address(IPV4)uses 32 bit number to represent an IP address and it defines both
network and host address. A new version of IP protocol(IPV6)has been invented to offer virtually limitless
number of unique addresses. An IP address is written in dotted decimal which is 4 sets of numbers separated
by period each set representing 8bit number ranging from 0-255.
Classes of IP address
Traditionally IP network is classified as A, B or C. the computer identified the class by the first 3
bits(A=000,B=100,C=110),while humans identify the class by first octet (8bit)number.
Class Starting IP Address Ending IP Address
A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255
Loopback IP address: is the address used to access itself. The IPV4 designated 127.0.0.1 as loopback address
with the 255.0.0.0. subnet mask. Loopback interface is also known as a virtual IP, which does not associate
with hardware interface. It is used to test network software without physically installing a network interface
card(NIC) and without having to physically connect the machine to a TCP/IP network.
Subnet mask: is 32 bit numbers that marks an IP address and divides the IP address into network address and
host address. Is made by setting network bits to all “1”s and setting host bits to all “0”s. within a given
network, two host addresses are reserved for special purpose and cannot be assigned to hosts. The 0 address is
assigned a network address and 255 is assigned to a broadcast address and they cannot be assigned to hosts.
Example for class A=8 bit, class B=16bit and class C=24bits.
Sub netting an IP network is used to separate a big network in to smaller multiple networks for reorganization
and security purpose.
 Steps to install network protocols and services
Once you have installed the necessary hardware and connected the computers, you need to install each
computer with the appropriate protocols and services using the following steps:
1. First logon as Administrator
2. Right click on My Network place → Click Properties
3. Right click on Local Area Network → Click Properties or Double-click on Local Area Network.
4. Click Install button to install network components
Select Network Components you want to install (Client or Service or Protocol) and Click Add button.
Configuration the Workgroup
Windows XP provide a workgroup model that organizes computers in a peer-to-peer network into groups.
These grouping help each user easily find other computers on the network. You must identify each computer
with a unique name and join into the workgroup in order for the other user to access it on the network. It is
better to setup a same workgroup on all computers. The computer name is displayed in one Workgroup name
to the other user when they browse the network. Many people use their name to identify their computer, but
any meaningful name will work.
 Steps to join a workgroup
1. Log on as an Administrator.
2. Open System in control panel or Right-click on my computer and click properties.
3. Click the Computer name tab (In Window XP) or Network Identification tab (Win 2000) tab Click
Change button.
4. In Computer name, type your computer name.
5. Under Member of, click Workgroup and type the name of the Workgroup that you want to join and
then click Ok.
Note:-
C A workgroup name must not be the same as computer name.
C A workgroup name can have as many as 15 characters, but it can not containing any of the following
characters :;”<>*+=\|?’.
C Computer name cannot be more than 15 characters and it must be unique (you can not use a name
already use on the NETWORK.
C If your computer was a member of a domain before you joined the workgroup, it will be disjoined from
the domain and your computer account will be disabled.
Sharing and Accessing Resources
After all the necessary network components are installed & configured users can designate documents and
resources on their computer as shared resource, which can then accessed by other network users.
Advantages of Sharing
When you turn on file sharing, you can determine what resources are available in the network. All the
computers on the network can use the resources that you enable for sharing. For example, you can enable the
following resources for sharing:
• Folders
• Drives
• Printers, Internet access etc.
Resources that are not set up for sharing remain private.
There are many advantages to sharing devices and files:
• You can easily copy or move files from one computer to another. You can share work on files on different
computers.
• You can access a single device, such as a printer or drive, from any computer.
• One Internet access point is sufficient for several computers to use the Internet at the same time.
Sharing Files
When a computer allocates resources, it assumes server functions. Any computer in a peer-to-peer network
workgroup can do so. You must configure file and printer sharing for a computer to act as a server. You set up
this functionality when you installed the network card. Therefore, you can already share a file or files that you
want to use on other computers.
To share a file, follow these steps:
1. Locate a folder on the computer.
2. Right-click the file that you want to share, and then click Sharing and Security to view additional settings.
3. The next two windows only appear when you are setting up your first shared item. Windows notifies you
that sharing data presents a certain security risk. Therefore, remote access is turned off by default. Click the
Security warning message, click Just enable file sharing, and then click OK
4. Now you can share data. Click Share this folder on the network, and then type a share name. You can use
this name later to access the data. The share name and the folder name do not have to be the same.
5. Specify whether the data that is accessed over the network can be changed, and then click OK.
6. The icon for the shared folder appears with a picture of a hand:
You can use the same method to share whole drives, including the following drives:
• Hard disks or partitions
• CD ROM drives
To stop sharing, right-click the file that is shared, click Sharing and Security, and then clear the Share this
folder on the network check box. When you do so, this resource no longer appears under this computer
name. However, the folder link directly in the network environment remains. It is no longer available unless
you set it up for sharing again. When a user tries to access the folder, they receive a "No access" message.
Note
 If the share this folder on the network checkbox is unavailable, this computer is not a network.
 The sharing option is not available for Document & setting, program files, WINDOWS system folders.
 You cannot share folder, if you remove File & print sharing services & protocol
Sharing your printer
 Open Printers and Faxes.
 Right-click the printer you want to share, and then click Sharing.
 The options you see on the Sharing tab differ depending on whether sharing is enabled on your
computer. For instructions on what to do next, click the option that describes what you see on the
Sharing tab.
 I see text stating that printer sharing must be turned on
 You need to enable printer sharing by running the Network Setup Wizard. Start it by clicking the link on
the Sharing tab, and then follow the instructions. Once sharing is enabled, begin this procedure again.
 I see options for sharing or not sharing the printer
 On the Sharing tab, click Share this printer and then type a share name for the shared printer.
 If you share the printer with users on different hardware or different operating systems, click Additional
Drivers. Click the environment and operating system for the other computers, and then click OK to
install the additional drivers.
 Drivers for users running other versions of Windows (Windows 95, Windows 98, or Windows NT 4.0)
are located on the Support CD. Printer drivers for Windows NT 3.1 and Windows NT 3.5 are not
included.
 Click OK, or, if you have installed additional drivers, click Close.
Notes
 To open Printers and Faxes, click Start, point to Settings, click Control Panel, and then double-click
Printers and Faxes.
 You can also share a printer in Printers and Faxes by clicking the printer you want to share, and then
clicking Share this printer under Tasks on the left side of the window. This option is available only if
folders are set to look like a Web page and a printer is selected. For more information, click Related
Topics.
 Printers are not shared by default when you install them on Windows XP Home Edition, but you can
choose to share any printer you install on your computer.
 When you publish a printer in Active Directory, other users logged onto the Windows domain will be
able to search for the printer based on its location and features such as how many pages it prints per
minute and whether color printing is supported.
 To connect to a printer on a network
 Open Printers and Faxes.
 Under Printer Tasks, click Add a printer to open the Add Printer Wizard, and then click Next.
 Click A network printer, or a printer attached to another computer, and then click Next.
 Connect to the desired printer using one of the following three methods. Click a method for instructions.

You might also like