0% found this document useful (0 votes)
42 views7 pages

Chapter 1

This document provides an introduction to computer network setup and configuration. It defines common network terms like LAN, WAN, topologies, and protocols. It describes different networking devices like routers, switches, cables, and wireless encryption standards. It explains the types of network cables including coaxial, twisted-pair, and fiber optic cables. Finally, it discusses communication between switches and workstations and an overview of network design and setup.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views7 pages

Chapter 1

This document provides an introduction to computer network setup and configuration. It defines common network terms like LAN, WAN, topologies, and protocols. It describes different networking devices like routers, switches, cables, and wireless encryption standards. It explains the types of network cables including coaxial, twisted-pair, and fiber optic cables. Finally, it discusses communication between switches and workstations and an overview of network design and setup.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

CHAPTER 1

INTRODUCTION TO COMPUTER NETWORK SETUP AND


CONFIGURATION.

Review of important notions

Common Terms Associated with Networks.

L.A.N. local area network (LAN) is a computer network covering a small physical area, like a
home, office, or small group of buildings, such as a school, or an airport. A term that has grown
in popularity for new smaller networks is S.O.H.O (Small Office Home Office)
W.A.N. Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any
network whose communications links cross metropolitan, regional, or national boundaries. (e.g.
Internet)
Physical and logical topologies. Hub, Switch, Gateway, MAN, LAN, WMAN, WLAN,
WPAN, PAN networks.
Protocols: In networking, a protocol is a set of rules for formatting and processing data. Network
protocols are like a common language for computers. The computers within a network may use
vastly different software and hardware; however, the use of protocols enables them to
communicate with each other. An example of a protocol is TCP/IP The Transmission Control
Protocol / Internet Protocol. It is the set of communications protocols used for the Internet and
other similar networks. These protocols tell the computer and network devices how to
communicate with each other on the internet. It also sets limits and settings for the network. Other
examples of protocols are HTCP, DHCP and FTP. To use a protocol on a network, we must ensure
that we know what the protocol does and that the network will need it.
Router: A router is a networking device whose software and hardware are usually tailored to
the tasks of routing and forwarding information between networks or network segments. For
example, on the Internet, information is directed to various paths by routers. Routers generally
contain a specialized operating system, RAM, and one or more processors, as well as two or
more network interfaces.
Switch Network switch is a computer networking device that connects network segments.
Connecting the networking devices and allowing them to communicate with each other directly.
Patch Cable (Cat 5e) A Network cable with an RJ45 on either end, interconnects the components
of a network.
WEP / WPA-PSK Wireless Equivalent Privacy / Wi-Fi Protected Access - Pre-shared key are
both systems that encrypt data with a specific password, when the data is traveling wirelessly
from one network point to another, each piece of data is in itself encrypted so that it cannot be
understood unless the password is present. WPA-PSK is used more commonly than the WEP
system, due to the WEP being limited to a smaller algorithm.

Network cable types


To connect two or more computers or networking devices in a network, network cables are used.
There are three types of network cables; coaxial, twisted-pair, and fiber-optic.

Coaxial cable

This cable contains a conductor, insulator, braiding, and sheath. The sheath covers the braiding,
braiding covers the insulation, and the insulation covers the conductor.

The following image shows these components.

Sheath
This is the outer layer of the coaxial cable. It protects the cable from physical damage.

Braided shield
This shield protects signals from external interference and noise. This shield is built from the same
metal that is used to build the core.

Insulation
Insulation protects the core. It also keeps the core separate from the braided-shield. Since both the
core and the braided-shield use the same metal, without this layer, they will touch each other and
create a short-circuit in the wire.

Conductor
The conductor carries electromagnetic signals. Based on conductor a coaxial cable can be
categorized into two types; single-core coaxial cable and multi-core coaxial cable.
A single-core coaxial cable uses a single central metal (usually copper) conductor, while a multi-
core coaxial cable uses multiple thin strands of metal wires. The following image shows both
types of cable.
Coaxial cables in computer networks

The coaxial cables were not primarily developed for the computer network. These cables were
developed for general purposes. They were in use even before computer networks came into
existence. They are still used even though their use in computer networks has been completely
discontinued. At the beginning of computer networking, when there were no dedicated media
cables available for computer networks, network administrators began using coaxial cables to
build computer networks. Because of low-cost and long durability, coaxial cables were used in
computer networking for nearly two decades (80s and 90s). Coaxial cables are no longer used to
build any type of computer network.

Twisted-pair cables
The twisted-pair cable was primarily developed for computer networks. This cable is also known
as Ethernet cable. Almost all modern LAN computer networks use this cable.

This cable consists of color-coded pairs of insulated copper wires. Every two wires are twisted
around each other to form a pair. Usually, there are four pairs. Each pair has one solid color and
one stripped color wire. Solid colors are blue, brown, green and orange. In stripped color, the solid
color is mixed with the white color.

Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair cable;
UTP and STP.

In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.

In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal shield,
then all pairs are wrapped in a single outer plastic sheath.

The following image shows both types of twisted-pair cable.

Similarities and differences between STP and UTP cables


• Both STP and UTP can transmit data at 10Mbps, 100Mbps, 1Gbps, and 10Gbps.
• Since the STP cable contains more materials, it is more expensive than the UTP cable.
• Both cables use the same RJ-45 (registered jack) modular connectors.
• The STP provides more noise and is more EMI (Electro-magnetic interference) resistant
than the UTP cable.
• The maximum segment length for both cables is 100 meters or 328 feet.
• Both cables can accommodate a maximum of 1024 nodes in each segment.

Fiber optic cable

This cable consists of core, cladding, buffer, and jacket. The core is made from the thin strands of
glass or plastic that can carry data over the long distance. The core is wrapped in the cladding; the
cladding is wrapped in the buffer, and the buffer is wrapped in the jacket.

• Core carries the data signals in the form of the light.


• Cladding reflects light back to the core.
• Buffer protects the light from leaking.
• The jacket protects the cable from physical damage.

Fiber optic cable is completely immune to EMI or RFI (Radio frequency interference). This cable
can transmit data over a long distance at the highest speed. It can transmit data up to 40 kilometers
at the speed of 100Gbps.

Fiber optic uses light to send data. It reflects light from one endpoint to another. Based on how
many beams of light are transmitted at a given time, there are two types of fiber optical cable;
SMF and MMF.

SMF (Single-mode fiber) optical cable

This cable carries only a single beam of light. This is more reliable and supports much higher
bandwidth and longer distances than the MMF cable. This cable uses a laser as the light source
and transmits 1300 or 1550 nano-meter wavelengths of light.
MMF (multi-mode fiber) optical cable

This cable carries multiple beams of light. Because of multiple beams, this cable carries much
more data than the SMF cable. This cable is used in shorter distances. This cable uses an LED as
the light source and transmits 850 or 1300 nano-meter wavelengths of light.

That’s all for this tutorial. In the next part of this article, we will understand the types of connectors
that are used to connect cables with networking devices. If you like this tutorial, please don’t
forget to share it with friends through your favorite social channel.

Communication between Switches and Workstations

When a workstation connects to a LAN, it transmits data independently of the other devices
connected to the LAN media. The workstation simply transmits data frames from a NIC to the
network medium.
If desired, the workstation can be attached directly to another workstation by using a crossover
cable. Crossover cables connect the following devices:
• Workstation to workstation
• Switch to switch
• Switch to hub
• Hub to hub
• Router to router
• Router to PC
Straight-through cables connect the following devices:
• Switch to router
• Switch to workstation or server
• Hub to workstation or server
However, many modern switches now automatically adjust the port pinout to support the
particular cable attached, whether it is a crossover or straight-through cable.

Network Design and Setup

Network design refers to the planning of the implementation of a computer network infrastructure.
It is generally performed by network designers, engineers, IT administrators and other related
staff. It is done before the implementation or setting up of a network infrastructure. It involves
evaluating, understanding and scoping the network to be implemented. The whole network design
is usually represented as a network diagram that serves as the blueprint for implementing the
network physically. Typically, network design includes the following:

• Logical map of the network to be designed


• Cabling structure
• Quantity, type and location of network devices (router, switches, servers)
• IP addressing structure
• Network security architecture and overall network security processes
• Identifying the applications and requirements.
• Determine bandwidth requirements.
• Consider geographic footprint.
• Evaluate communications providers.
• Consider network availability & disaster recovery.
• Capacity and scalability requirements.
• Budget & cost considerations.

The purpose for which a network is being setup determines the type of network to be selected
and consequently what the network builders put into the design. Will it be a LAN or a WAN?
Will it need to be highly secured or not? Will it need switches? Routers? Which protocols will
be necessary? Etc.

Network designers usually use various types of software to help them in the task. These software
are generally called network simulators.

Network simulators

A network simulator uses mathematical formulae to create a theoretical and entirely virtual model
of a network. Simulators are software solutions and different types are available for different
applications. While used primarily for research and educational purposes, they can also act as
crucial testing tools in the design and development of a network. Examples are Cisco packet tracer,
NS2, NS3 (Network simulator 2 and 3), OPNET, Netsim, Dynamips and GNS3. There are many
other network simulators in use. These network simulators use discrete event simulation which
chronologically queues and processes events like data flow. This allows a network architect or
engineer to build and evaluate an experimental model of a network, including its topology and
application flow. Since a variety of theoretical scenarios can be introduced to a network where
anything can be built and applied, performance can be hypothesized before the network itself is
implemented in the real-world.

Although testing a network in such a manner can save both time and money, network simulators
aren’t without their limitations. These highly complex operations require a degree of experience
and training to properly configure in order to acquire reliable results. Additionally, network
simulators just aren’t practical in that certain events can’t be anticipated independently of a
physical network.

Network Emulators

A clear distinction needs to be made between network simulators and network emulators. A
network emulator, is used to test the performance of a real network. These devices can also be
used for such purposes as quality assurance, proof of concept, or troubleshooting. Available as
hardware or software solutions, a network emulator allows network architects, engineers, and
developers to accurately gauge a network’s responsiveness, throughput, and quality of end-user
experience prior to applying making changes or additions to the system.

By physically placing it between two LAN segments, a network emulator can accurately replicate
a client/server WAN connection without the need for a router, modem, or even live traffic. It can
then be configured to manipulate bandwidth constraints and apply impairments, such as packet
loss, delay, and jitter, to the mirrored network. Latency can be specified to emulate the transfer of
data over large distances and applications behave and respond as if they’re actually physically
separated. Application performance and end-user experience can then be observed, tested, and
validated under such conditions in real-time. Examples are NetEm,and Linktropy 8510.

Cisco Packet tracer

The network simulator we shall use for this course is Cisco Packet tracer. Cisco Packet Tracer
is a tool built by Cisco Systems, Inc., an American multinational technology conglomerate
headquartered in San Jose, California. This tool provides network simulation to practice the design
and setup of simple and complex networks. The main purpose of Cisco Packet Tracer is to help
students learn the principles of networking with hands-on experience as well as develop Cisco
technology specific skills. Since the protocols are implemented in software only method, this tool
cannot replace the hardware Routers or Switches. Interestingly, this tool does not only include
Cisco products but also many more networking devices.
Using this tool is widely encouraged as it is part of the curriculum like CCNA, CCENT where
Faculties use Packet Trace to demonstrate technical concepts and networking systems. Students
complete assignments using this tool, working on their own or in teams.
Engineers prefer to test any protocols on Cisco Packet Tracer before implementing them. Also,
Engineers who would like to deploy any change in the production network prefer to use Cisco
Packet Tracer to first test the required changes and proceed to deploy if and only if everything is
working as expected.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy