0% found this document useful (0 votes)
66 views5 pages

2 Weeks Inspecting Network Devices, Media and Connector

This document provides information on checking computer systems and networks against specified requirements and inspecting networking devices, media, and connectors. It contains checklists for determining the type of network connection and configuration needed based on location and devices. Common networking equipment like hubs, switches, and routers are described. The document also discusses how to secure networks and provides procedures for inspecting networking devices, media like cables, and connectors to ensure proper installation and functioning of the computer systems and network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views5 pages

2 Weeks Inspecting Network Devices, Media and Connector

This document provides information on checking computer systems and networks against specified requirements and inspecting networking devices, media, and connectors. It contains checklists for determining the type of network connection and configuration needed based on location and devices. Common networking equipment like hubs, switches, and routers are described. The document also discusses how to secure networks and provides procedures for inspecting networking devices, media like cables, and connectors to ensure proper installation and functioning of the computer systems and network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Tuguegarao Archdiocesan Schools System

LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
SUBJECT: ICT 10
NAME OF TEACHER: Marc Irvin D. Viernes
CP NUMBER : 09361134199/09209460232
E-mail : viernesmarcirvin@gmail.com
Module No. : 11
Duration : 2 weeks
TOPIC : Checking computer system against specified requirements and
inspecting network devices, media and connector
OBJECTIVES

At the end of this module, you should able to:


1. Check computer systems and networks configuration against specified requirements.
2. Inspect networking devices, media and connectors.

CONTENT

Before starting the installation and configuration of computer systems and networks, the specific
requirements must be considered first in order to come up with a setup that will be sufficient to
support all the tasks that will be faced in the future. Having a checklist on what equipment must be
installed, how these must be configured, and in what way will they be maintained must all be
checked thoroughly.

Listed below is a checklist of the most common criteria that must be taken into consideration when
installing and configuring computer systems and networks:

 What type of connection is needed?


 What type of configuration is needed?
 What equipment do I need?
 How to secure the network?
Tuguegarao Archdiocesan Schools System
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
WHAT TYPE OF CONNECTION IS NEEDED?

Computer networks come in many forms: home networks, business networks, and the
internet are three common examples. Devices may use any of several methods to connect
to these (and other kinds of) networks. Three basic types of network connections exist:

 Point-to-point connections allow one device to communicate with one other device.


For example, two phones may pair with each other to exchange contact information
or pictures.
 Broadcast/multicast connections allow a device to send one message out to the
network and have copies of that message delivered to multiple recipients.
 Multipoint connections allow one device to connect and deliver messages to
multiple devices in parallel.

The type of connection is determined by the location, the type and number of devices that
will connect to the network, and budget constraints. For a small area with a small number
of computer systems and devices, wired connectivity is recommended. The advantage of
having this type is reliability and security. If the devices on the other hand are in a large
area, wireless connectivity can be used. Setting up a wireless access point is very easy and
this will eliminate the use of cluttered wires and cables.

WHAT TYPE OF CONFIGURATION IS NEEDED?

The technical aspects of configuration management involve configuration items (e.g.,


monitors, email applications, switches, servers, etc.) and their relevant information within
a configuration management database. Popular configuration management tools include:

 Red Hat Ansible Automation Platform


 Puppet
 Microsoft Endpoint Configuration Manager (formerly System Center Configuration
Manager, MSCCM)
 Chef
 AWS OpWorks
 Terraform
 SaltStack

Network configuration basically dictates how the computer systems and devices will
behave. Considering the job requirements that need to be accomplished by the computer
systems will determine the type of configuration.

For a small business where a central database is not needed, a peer-to-peer connection can
be established. This means that all computer systems will act equally among each other.
This is a simple setup that only needs a central access point, which can be a switch or a
router.
Tuguegarao Archdiocesan Schools System
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
For larger scaled needs, a client-server configuration must be established. This will have a
powerful computer system that will be assigned as a server that will provide resources to
the clients connected to the network.

WHAT EQUIPMENT DO I NEED?


In configuring a computer network, certain equipment are used to make sure that
transmission of data will be possible. Common networking equipment include hubs,
switches and routers.

 Hub – it connects all the computer systems together. Once data is sent, it is
forwarded to all the computer systems.
 Switch – this is considered as an intelligent hub. Once data is sent, it is forwarded
only to the dedicated recipient.
 Router – this transmits data from one network to another. Commonly used to
connect different local area networks together.

HOW TO SECURE THE NETWORK?

Network security is the protection of the


underlying networking infrastructure from
unauthorized access, misuse, or theft. It
involves creating a secure infrastructure
for devices, applications, users, and
applications to work in a secure manner.

Network security is the protection of the


underlying networking infrastructure from
unauthorized access, misuse, or theft. It
involves creating a secure infrastructure
for devices, applications, users, and
applications to work in a secure manner.

Digitization has transformed our world. How we live, work, play, and learn have all
changed. Every organization that wants to deliver the services that customers and
employees demand must protect its network. Network security also helps you protect
proprietary information from attack. Ultimately it protects your reputation.

One of the most important thing to consider is network security. In a small network,
enabling the firewall (software) in each device can be sufficient enough. For larger scaled
network, installing a firewall hardware is recommended.

A wired network can be protected by securing all the ports that might be used for
unauthorized access. Wireless access points must be protected by a strong password,
preferably with a WiFi Protected Access (WPA) rating.
Tuguegarao Archdiocesan Schools System
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
Once all of the above mentioned checklist have been accomplished, network configuration
may now commence. If all are taken into consideration, the configured network will have
no problem in meeting all the specified requirements at hand.

In order to conduct a proper inspection, a technician must always know the things to check.
Commonly included in the checklist are networking devices, media and connectors. Listed
below are the description of each and the procedures in inspecting them.

1) Networking Devices – these devices include those that are designed to act as a common
connection point for all the computer systems and other devices. Examples of networking
devices are hubs, switches and routers.

 Always read the labels of all these devices to ensure that they have correct Physically
scan the devices for any dents, or external damages. These damages may lead to
malfunctions.
 Check the power cables for any breaks. Damaged power cables may lead to short
circuiting and electrocution.
 Ensure that all ports are free from any clogs and foreign objects to allow a connector to
properly be inserted to it.
 Test the connectivity by sending a “ping” to the networking device using a connected
computer system.

2) Media – this is technically called transmission media. This refers to the means of
transmission in any computer network. A common transmission media is the twisted-pair
cable. Another transmission media uses wireless technology or most commonly known as
Wi-Fi.

 Always check if the cable installed are correct. Twisted-pair cables have categories that
determine its transfer rate or transmission speed, so make sure that the right one is laid
down.
 Check the twisted-pair cables for any breaks.
 Ensure that no other devices can cause interference or noise. Common interference are
cross-talk; this happens when a cable intersects with another.
 For wireless media, make sure that the wireless access point can broadcast a signal that
the computer systems can scan or detect. Enable all the channels and frequencies
available to ensure that all types of devices can access it.

3) Connectors – these are small materials that are attached to both ends of a cable. It serves
as a means of connection between the cables and the ports.

 Ensure that the correct connectors are used for a particular cable.
 Always check if the connectors are firmly attached to the end of the cable. Usually, an
RJ45 connector that is properly attached to a twisted-pair cable will not fall out even if
a strong force is applied.
Tuguegarao Archdiocesan Schools System
LYCEUM OF TUAO
Centro 02, Tuao, Cagayan, 3528
Email address: lyceumoftuao1965@yahoo.com.ph
 Ensure that the contact points of a connector are free from any dirt or lint to guarantee
that proper connection with the contact points of the port.
 In inserting a connector to a port, ensure that it is locked. A clicking sound can be
heard when proper insertion is accomplished.
 Doing the procedures above will not absolutely ensure that the computer network will
run perfectly. Other factors may also affect the performance of the networking
devices, media and connectors. Regular inspections and testing must be made in order
to ensure that the above mentioned will continue to work and perform their functions
effectively.

ACTIVITY 1
As a future network specialist, create a checklist in checking and inspecting computer system
and computer network before configuring.

a. Checklist for CHECKING


Sample
Checklist YES NO
1. Does all Materials needed available?
2.
3.
4.
5.
6.
7.

b. Checklist for INSPECTING


Checklist YES NO
1. Does the connectors are connected correctly?
2.
3.
4.
5.
6.
7.

REFERENCES
What Is Network Security? - Cisco
What is Configuration? | Webopedia

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy