2 Weeks Inspecting Network Devices, Media and Connector
2 Weeks Inspecting Network Devices, Media and Connector
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
SUBJECT: ICT 10
NAME OF TEACHER: Marc Irvin D. Viernes
CP NUMBER : 09361134199/09209460232
E-mail : viernesmarcirvin@gmail.com
Module No. : 11
Duration : 2 weeks
TOPIC : Checking computer system against specified requirements and
inspecting network devices, media and connector
OBJECTIVES
CONTENT
Before starting the installation and configuration of computer systems and networks, the specific
requirements must be considered first in order to come up with a setup that will be sufficient to
support all the tasks that will be faced in the future. Having a checklist on what equipment must be
installed, how these must be configured, and in what way will they be maintained must all be
checked thoroughly.
Listed below is a checklist of the most common criteria that must be taken into consideration when
installing and configuring computer systems and networks:
Computer networks come in many forms: home networks, business networks, and the
internet are three common examples. Devices may use any of several methods to connect
to these (and other kinds of) networks. Three basic types of network connections exist:
The type of connection is determined by the location, the type and number of devices that
will connect to the network, and budget constraints. For a small area with a small number
of computer systems and devices, wired connectivity is recommended. The advantage of
having this type is reliability and security. If the devices on the other hand are in a large
area, wireless connectivity can be used. Setting up a wireless access point is very easy and
this will eliminate the use of cluttered wires and cables.
Network configuration basically dictates how the computer systems and devices will
behave. Considering the job requirements that need to be accomplished by the computer
systems will determine the type of configuration.
For a small business where a central database is not needed, a peer-to-peer connection can
be established. This means that all computer systems will act equally among each other.
This is a simple setup that only needs a central access point, which can be a switch or a
router.
Tuguegarao Archdiocesan Schools System
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
For larger scaled needs, a client-server configuration must be established. This will have a
powerful computer system that will be assigned as a server that will provide resources to
the clients connected to the network.
Hub – it connects all the computer systems together. Once data is sent, it is
forwarded to all the computer systems.
Switch – this is considered as an intelligent hub. Once data is sent, it is forwarded
only to the dedicated recipient.
Router – this transmits data from one network to another. Commonly used to
connect different local area networks together.
Digitization has transformed our world. How we live, work, play, and learn have all
changed. Every organization that wants to deliver the services that customers and
employees demand must protect its network. Network security also helps you protect
proprietary information from attack. Ultimately it protects your reputation.
One of the most important thing to consider is network security. In a small network,
enabling the firewall (software) in each device can be sufficient enough. For larger scaled
network, installing a firewall hardware is recommended.
A wired network can be protected by securing all the ports that might be used for
unauthorized access. Wireless access points must be protected by a strong password,
preferably with a WiFi Protected Access (WPA) rating.
Tuguegarao Archdiocesan Schools System
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
Once all of the above mentioned checklist have been accomplished, network configuration
may now commence. If all are taken into consideration, the configured network will have
no problem in meeting all the specified requirements at hand.
In order to conduct a proper inspection, a technician must always know the things to check.
Commonly included in the checklist are networking devices, media and connectors. Listed
below are the description of each and the procedures in inspecting them.
1) Networking Devices – these devices include those that are designed to act as a common
connection point for all the computer systems and other devices. Examples of networking
devices are hubs, switches and routers.
Always read the labels of all these devices to ensure that they have correct Physically
scan the devices for any dents, or external damages. These damages may lead to
malfunctions.
Check the power cables for any breaks. Damaged power cables may lead to short
circuiting and electrocution.
Ensure that all ports are free from any clogs and foreign objects to allow a connector to
properly be inserted to it.
Test the connectivity by sending a “ping” to the networking device using a connected
computer system.
2) Media – this is technically called transmission media. This refers to the means of
transmission in any computer network. A common transmission media is the twisted-pair
cable. Another transmission media uses wireless technology or most commonly known as
Wi-Fi.
Always check if the cable installed are correct. Twisted-pair cables have categories that
determine its transfer rate or transmission speed, so make sure that the right one is laid
down.
Check the twisted-pair cables for any breaks.
Ensure that no other devices can cause interference or noise. Common interference are
cross-talk; this happens when a cable intersects with another.
For wireless media, make sure that the wireless access point can broadcast a signal that
the computer systems can scan or detect. Enable all the channels and frequencies
available to ensure that all types of devices can access it.
3) Connectors – these are small materials that are attached to both ends of a cable. It serves
as a means of connection between the cables and the ports.
Ensure that the correct connectors are used for a particular cable.
Always check if the connectors are firmly attached to the end of the cable. Usually, an
RJ45 connector that is properly attached to a twisted-pair cable will not fall out even if
a strong force is applied.
Tuguegarao Archdiocesan Schools System
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
Ensure that the contact points of a connector are free from any dirt or lint to guarantee
that proper connection with the contact points of the port.
In inserting a connector to a port, ensure that it is locked. A clicking sound can be
heard when proper insertion is accomplished.
Doing the procedures above will not absolutely ensure that the computer network will
run perfectly. Other factors may also affect the performance of the networking
devices, media and connectors. Regular inspections and testing must be made in order
to ensure that the above mentioned will continue to work and perform their functions
effectively.
ACTIVITY 1
As a future network specialist, create a checklist in checking and inspecting computer system
and computer network before configuring.
REFERENCES
What Is Network Security? - Cisco
What is Configuration? | Webopedia