0% found this document useful (0 votes)
100 views28 pages

LO3 Develop Best Topology

The document discusses network topologies and components. It describes network interface cards, repeaters, hubs, and bridges. It explains what each component is and how it functions within a network.

Uploaded by

biruk molla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views28 pages

LO3 Develop Best Topology

The document discusses network topologies and components. It describes network interface cards, repeaters, hubs, and bridges. It explains what each component is and how it functions within a network.

Uploaded by

biruk molla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Aleta Wondo Tvet College

Hardware and Network Servicing


NTQF Level III

Unit of Competence: Determine Best-Fit Topology

Module Title: Determining Best-Fit Topology

LG Code: ICT HNS3 M02 LO3-07

TTLM Code: ICT HNS3 TTLM 0214v2

LO3: Develop best topology


1
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Instruction Sheet Learning Guide #7
This information sheet will help you to develop best topology in network environment.
This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics

 Determine resource requirements for each network segment.


 Check features of the physical environment for possible topology options.
 Select and document appropriate network topology.
This guide will also assist you to attain the learning outcome stated in the cover page.

Specifically, upon completion of this Learning Guide, you will be able to

 Determine resource requirements for each network segment.


 Check features of the physical environment for possible topology options.
 Select and document appropriate network topology.
Learning Instructions:
1. Read the specific objectives of this Learning Guide.
2. Follow the instructions described carefully.
3. Read the information written in the “Information Sheets 1”. Try to understand what are being
discussed. Ask you teacher for assistance if you have hard time understanding them.
4. Accomplish the “Self-check 1” in page __.
5. Ask from your teacher the key to correction (key answers) or you can request your teacher to
correct your work. (You are to get the key answer only after you finished answering the Self-check
1).
6. If you earned a satisfactory evaluation proceed to “Information Sheet 2”. However, if your rating is
unsatisfactory, see your teacher for further instructions or go back to Learning Activity #2.
7. Submit your accomplished Self-check. This will form part of your training portfolio.
8. Read the information written in the “Information Sheet 2”. Try to understand what are being
discussed. Ask you teacher for assistance if you have hard time understanding them.
9. Accomplish the “Self-check 2” in page __.

2
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Information sheet-1 LG7
Develop best topology
Network connectivity devices
Network Interface Cards (NIC)
 Also called network adapter
 Receive data and convert it into electrical signals
 Receive electrical signals and convert them into data
 Determine if the data received is for a particular computer
 Control the flow of data through the cable

Network adapters constitute the physical interface between the computer and the network cable. Network
adapters, also known as network interface cards, are installed into an expansion slot in each computer and
server on the network. After the network adapter is installed, the network cable is attached to the adapter's
port to physically connect the computer to the network.

As the data passes through the cable to the network adapter, it is formatted into packets. A packet is a logical
grouping of information that includes a header, which contains location information and user data. The
header contains address fields that include information about the data's origin and destination. The network
adapter reads the destination address to determine if the packet is to be delivered to this computer. If it is, the
network adapter then passes the packet on to the operating system for processing. If not, the network adapter
discards the packet.

Each network adapter has a unique address that is incorporated into chips on the card. This address is called
the physical, or media access control (MAC), address.
The network adapter performs the following functions:

 Receives data from the computer's operating system and converts it into electrical signals that are
transmitted onto the cable
 Receives electrical signals from the cable and translates them into data that the computer's operating
system can understand
 Determines whether data received from the cable is intended for the computer
 Controls the flow of data between the computer and the cabling system

To ensure compatibility between the computer and the network, the network adapter must meet the following
criteria:
Fit in the computer's expansion slot
 Use the correct type of cable connector for the cabling
 Be supported by the computer's operating system

Repeaters
3
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
As signals travel along a cable, they degrade and become distorted in a process called "attenuation." If a
cable is long enough, attenuation will finally make a signal unrecognizable. Installing a repeater enables
signals to travel farther.
Repeater Considerations
Repeaters afford the least expensive way to expand a network. When the need arises to extend the physical
network beyond its distance or node limitations, consider using a repeater to link segments if neither segment
is generating much traffic or limiting costs is a major consideration.
No Isolation or Filtering Repeaters send every bit of data from one cable segment to another, even if the
data consists of malformed packets or packets not destined for use on the network. This means that a problem
with one segment can disrupt every other segment. Repeaters do not act as filters to restrict the flow of
problem traffic.
Use a repeater to:
 Connect two segments of similar or dissimilar media.
 Regenerate the signal to increase the distance transmitted.
 Pass all traffic in both directions.
 Connect two segments in the most cost-effective manner.
Do not use a repeater when:
 There is heavy network traffic.
 Segments are using different access methods.
 Data filtering is needed.

Hubs
Hubs are connectivity devices that connect computers in a star topology. Hubs contain multiple ports for
connecting to network components. If you use a hub, a break in the network does not affect the entire
network; only the segment and the computer attached to that segment fail.
A Hub works at the physical layer of the OSI Reference Model to regenerate the network's signals and resend
them out on other segments. Hubs are multiport repeater
A single data packet sent through a hub goes to all connected computers. There are two types of hubs:
Passive Hubs: Send the incoming signal directly through their ports without any signal processing. These
hubs are usually wiring panels.
Active Hubs: Sometimes called multiport repeaters, receive incoming signals, process the signals, and
retransmit them at their original strengths and definitions to the connected computers or components.
Use a hub to:
 Easily change and expand wiring systems.
 Use different ports to accommodate a variety of cable types.
 Enable central monitoring of network activity and traffic.

Bridges
Like a repeater, a bridge can join segments or workgroup LANs. However, a bridge can also divide a
network to isolate traffic or problems. For example, if the volume of traffic from one or two computers or a
single department is flooding the network with data and slowing down the entire operation, a bridge could
isolate those computers or that department.

Bridges can be used to:


 Expand the length of a segment.
 Provide for an increased number of computers on the network.
 Reduce traffic bottlenecks resulting from an excessive number of attached computers.
 Split an overloaded network into two separate networks, reducing the amount of traffic on each
segment and making each network more efficient.
 Link unlike physical media such as twisted-pair and coaxial Ethernet.

4
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
How Bridges Work
Because bridges work at the data-link layer of the OSI reference model, all information contained in the
higher levels of the OSI reference model is unavailable to them. Rather than distinguish between one
protocol and another, bridges simply pass all protocols along the network. All protocols pass across bridges,
so it is up to the individual computers to determine which protocols they can recognize.

As discussed in previous topics the data-link layer has two sub layers: the Logical Link Control (LLC) sub
layer and the Media Access Control (MAC) sub layer. Bridges work at the MAC sub layer and are
sometimes referred to as MAC-layer bridges.
A MAC-layer bridge:
 Listens to all traffic.
 Checks the source and destination addresses of each packet.
 Builds a routing table, as information becomes available.
 Forwards packets in the following manner:
o If the destination is not listed in the routing table, the bridge forwards the packets to all
segments.
o If the destination is listed in the routing table, the bridge forwards the packets to that segment
(unless it is the same segment as the source).
A bridge works on the principle that each network node has its own address. A bridge forwards packets
based on the address of the destination node.
Initially, the bridge's routing table is empty. As nodes transmit packets, the source address is copied to the
routing table. With this address information the bridge learns which computers are on which segment of the
network.

Creating the Routing Table Bridges build their routing tables based on the addresses of computers that
have transmitted data on the network. Specifically, bridges use source addresses—the address of the device
that initiates the transmission—to create a routing table.
When the bridge receives a packet, the source address is compared to the routing table. If the source address
is not there, it is added to the table. The bridge then compares the destination address with the routing-table
database.
 If the destination address is in the routing table and is on the same segment as the source address, the
packet is discarded. This filtering helps to reduce network traffic and isolate segments of the network.
 If the destination address is in the routing table and not in the same segment as the source address, the
bridge forwards the packet out of the appropriate port to reach the destination address.
 If the destination address is not in the routing table, the bridge forwards the packet to all its ports
except the one on which it originated.
In summary, if a bridge knows the location of the destination node, it forwards the packet to it. If it does not
know the destination, it forwards the packet to all segments.

Segmenting Network Traffic A bridge can segment traffic because of its routing table. A computer on
segment 1 (the source), sends data to another computer (the destination) also located in segment 1. If the
destination address is in the routing table, the bridge can determine that the destination computer is also on
segment 1. Because the source and destination computers are both on segment 1, the packet does not get
forwarded across the bridge to segment 2.
Therefore, bridges can use routing tables to reduce the traffic on the network by controlling which packets
get forwarded to other segments. This controlling (or restricting) of the flow of network traffic is known as
"segmenting network traffic."

Switch
5
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Switches are similar to bridges but offer a more direct network connection between the source and
destination computers. When a switch receives a data packet, it creates a separate internal connection, or
segment, between any two of its ports and forwards the data packet to the appropriate port of the destination
computer only, based on information in each packet's header. This insulates the connection from the other
ports and gives the source and destination computers access to the full bandwidth of a network. Unlike a hub,
switches are comparable to a telephone system with private lines.
In such a system, if one person calls someone, the operator or telephone switch connects them on a dedicated
line. This allows more conversations to take place at any one time.
Use a switch to:
 Send a packet directly from the source computer to the destination computer.
 Provide for a greater rate of data transmission.
Routers
In an environment that consists of several network segments with differing protocols and architectures, a
bridge might be inadequate for ensuring fast communication among all segments. A network this complex
needs a device that not only knows the address of each segment, but can also determine the best path for
sending data and filtering broadcast traffic to the local segment. Such a device is called a "router."
Routers work at the network layer of the OSI reference model. This means they can switch and route packets
across multiple networks. They do this by exchanging protocol-specific information between separate
networks. Routers read complex network addressing information in the packet and, because they function at
a higher layer in the OSI reference model than bridges, they have access to additional information.
Routers can provide the following functions of a bridge:
 Filtering and isolating traffic
 Connecting network segments

How Routers Work


Routers maintain their own routing tables, usually consisting of network addresses; host addresses can also
be kept if the network architecture calls for it. To determine the destination address for incoming data, the
routing table includes:
 All known network addresses.
 Instructions for connection to other networks.
 The possible paths between routers.
 The costs of sending data over those paths.
NOTE
Remember that routing tables were also discussed in the context of bridges. The routing table maintained by
a bridge contains MAC-sublayer addresses for each node, whereas the routing table maintained by a router
contains network numbers. Although manufacturers of both types of equipment have chosen to use the term
"routing table," it has a different meaning for bridges than it does for routers.

Routable Protocols Not all protocols are routable. Protocols that are routable include:
 DECnet.
 Internet Protocol (IP).
 Internetwork Packet Exchange (IPX).
 OSI.
 Xerox Network System (XNS).
 DDP (AppleTalk).

Protocols that are not routable include:


 Local Area Transport Protocol (LAT), a protocol from Digital Equipment Corporation.
 NetBEUI (NetBIOS Extended User Interface).

Routers are available that can accommodate multiple protocols such as IP and DECnet in the same network.
6
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Choosing Paths Unlike bridges, routers can accommodate multiple active paths between LAN segments and
choose among redundant paths. Because routers can link segments that use completely different data
packaging and media-access schemes, there are often several paths available for the router to use. This means
that if one router does not function, the data can still be passed over alternate routes.
A router can listen to a network and identify which parts are busiest. It uses this information to determine
which path to send data over. If one path is very busy, the router identifies an alternative path and sends data
over that one.
A router decides the path the data packet will follow by determining the number of hops between
internetwork segments. Like bridges, routers build routing tables and use these in routing algorithms such as
the following:

 OSPF ("open shortest path first") is a link-state routing algorithm. Link-state algorithms control the
routing process and allow routers to respond quickly to changes in the network.
 RIP (Routing Information Protocol) uses distance-vector algorithms to determine routes.
Transmission Control Protocol/Internet Protocol (TCP/IP) and IPX support RIP.
 NetWare Link Services Protocol (NLSP) is a link-state algorithm to be used with IPX.

Types of Routers
The two major types of routers are:
 Static.
Static routers require an administrator to manually set up and configure the routing table and to
specify each route.
 Dynamic.
Dynamic routers are designed to discover routes automatically and therefore require a minimal
amount of setup and configuration. More sophisticated than static routers, they examine information
from other routers and make packet-by-packet decisions about how to send data across the network.

Four key pieces of information can help you distinguish between a bridge and a router and determine which
would be appropriate in a given situation:
 The bridge recognizes only local MAC-sublayer addresses (the addresses of NICs in its own
segment). Routers recognize network addresses.
 The bridge broadcasts (forwards) everything it does not recognize and forwards all addresses it
knows, but only from the appropriate port.
 The router works only with routable protocols.
 The router filters addresses. It forwards particular protocols to particular addresses (other routers).

Brouters

A brouter, as the name implies, combines the qualities of both a bridge and a router. A brouter can act as a
router for one protocol and as a bridge for all the others.

Brouters can:
 Route selected routable protocols.
 Bridge nonroutable protocols.
 Deliver more cost-effective and more manageable internetworking than separate bridges and routers.

Gateways
Gateways enable communication between different architectures and environments. They repackage and
convert data going from one environment to another so that each environment can understand the other
environment's data. A gateway repackages information to match the requirements of the destination system.

7
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Gateways can change the format of a message so that it conforms to the application program at the receiving
end of the transfer. For example, electronic-mail gateways, such as the X.400 gateway, receive messages in
one format, translate it, and forward it in X.400 format used by the receiver, and vice versa.
A gateway links two systems that do not use the same:
 Communication protocols.
 Data-formatting structures.
 Languages.
 Architecture.
Gateways interconnect heterogeneous networks; for example, they can connect Microsoft Windows NT
Server to IBM's Systems Network Architecture (SNA). Gateways change the format of the data to make it
conform to the application program at the receiving end.

How Gateways Work


Gateways are task-specific, which means that they are dedicated to a particular type of transfer. They are
often referred to by their task name (Windows NT Server to SNA gateway).
A gateway takes the data from one environment, strips off its old protocol stack, and repackages it in the
protocol stack from the destination network.
To process the data, the gateway:
 Disassembles incoming data through the network's complete protocol stack.
 Encapsulates the outgoing data in the complete protocol stack of the other network to allow
transmission.

Network addressing
Addressing on a network can take one of three forms:
 Computer names: on a typical network, most users prefer to use computer names to communicate;
computer names are far easier to remember than IP addresses. A computer name is the logical
equivalent of an IP or MAC address

 IP(Internet protocol): Although users can use IP addresses, customarily IP addresses are used
primirly by applications to communicate with locations on or outside the network
 MAC(Media Access Control) address:MAC addresses are the physical addresses of network
devices and if users use computer names and application use IP addresses, then computers and other
networked devices use MAC addresses to access other devices on the network
With three ways to address elements on a network, there must be ways to resolve each type of address to its
equivalents.
MAC addressing
A host’s MAC address is based on a 12-digit hexadecimal address. Usually, but not always, the MAC
address is burned in the NIC through the use of a programmable Read only memory (PROM) module, or the
address can be burned into a special chip called an electronic PROM (EPROM). The MAC address is
identified in the second layer of the seven layer OSI model, the Data link layer
Although the MAC address is always used in networking. It cannot be routed. The MAC address is not
routable because of
 It does not pass through routers (because of its position in the OSI model)
 It has no network address.

Working on peer-to-peer Network (Workgroup)


IP Addressing
An IP address consists of two parts a network address that identifies the network and a host address that
identifies the particular host, or node.
8
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Types of IP address
1. Internet protocol version 4/IPV4
2. Internet protocol Version 6/IPV6
Every computer on a network must have a unique address. If two computers have the same address an
address conflict occurs.

IPV4
The IP address identifies and differentiates a given machine from all others on the network. It consists of a
32-bit binary number that is usually displayed as four octets expressed in decimal and separated by periods.
You must have a unique IP address for each machine on the network. In addition, if your machine serves as a
router to another network (it contains two or more network adapters and belongs to two or more networks),
you must assign each adapter a unique IP address on the appropriate network.
8bit 8bit 8bit 8bit

Network classes
Internet addresses are allocated by the InterNIC (http://www.internic.net ), the organization that administers
the Internet. These IP addresses are divided into classes. The most common of these are classes A, B, and C.
Classes D and E exist, but are not generally used by end users. Each of the address classes has a different
default subnet mask.
Network classes used to provide an addressing scheme that can accommodate large and small networks. All
networks in practical use have different sizes. For example, a company that will have 50 computers, will not
need a network of 5000 computers, And on the contrary, a company that needs 5000 computers does not
need a network that can only hold 50 computers.
This is the main reason that engineers decided that IP address space should be divided in different classes in
order to meet different requirements.
There are five different classes of networks: A, B, C, D and E. classes D and E are reserved. Class D is
reserved for multicasting purpose and class E for experimental purpose.
Class A networks
 designed to meet the needs of large networks
 This class will only support 126 networks; but each network can support 16,777,214 hosts.
 The first octet of the IP address is network portion and the rest the node portion
Class B networks
 was designed for medium-sized networks
 This class will support 16,384 networks; and limited to 65,534 hosts per network.
 The first two octet are the nw portion
 Octet 3 and 4 are for nodes
 Used for nw that have b/n 256 and 65,534 nodes
Class C networks
 Was designed for small networks; thus the number of hosts per network will be small, however it will
support many more networks total.
 The first three octet are the network portion and the remaining one for node
 A maximum of 2,097,152 (221 ) networks can be defined with up to 254 (28-2) hosts per network
Class A
 The first bit is 0

Network ID

9
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
The possible class A IP ranges
1.0.0.0-127.255.255.255

Class B
 The first two bits are 1 and 0

The possible IP range for


class B is
128.0.0.0-191.255.255.255

Class C
 The first three bits are 1,1 and 0

The possible IP range for class C is


192.0.0.0- 223.255.255.255

Class Prefix Max. num. of Suffix Available Valid Address Ranges


bits(ntk) network bits(host) Hosts per
Network
A 7 27=128 24 224-2=16777214 1.0.0.1 through 126.255.255.254
B 14 214=16384 16 216-2 =65534 128.0.0.1 through
191.255.255.254
C 21 221=2097152 8 28-2=254 192.0.0.1 through
222.255.255.254
D & E 224.0.0.0 through
Reserved 255.255.255.254

If you are connecting your machine to a pre-existing network, the network address (for Class A, the first
octet; for Class B, the first two octets; and for Class C, the first three octets) is the same as those of other
machines on the network. In this case, you only need to create a unique host address.
If you are creating an entirely new network and you want to connect to the Internet, you need to contact the
internet service provider or Network Information Center to have a network address. When you determine the
IP address, remember:
 Each logical network must have its own network address.
 All hosts in a network must have the same network address.
 All hosts in a network must have unique host addresses.

IP address type
1. Private IP addresses
Private IP addresses are typically used on local networks including home, school and business LANs.
Private networks are non routable. Devices with private IP addresses cannot connect directly to the
Internet.

10
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Likewise, computers outside the local network cannot connect directly to a device with a private IP.
Instead, access to such devices must be brokered by a router.

Class A 10.0.0.1 through 10.255.255.254


Class B 172.16.0.1 through 172. 31.255.254
Class C 192.168.0.1 through 192.168.255.254
2. Public IP address
An IP address can be public - for use on the Internet or other wide area network (WAN).

Static verses Dynamic IP address


IP addresses can be determined statically (assigned to a computer by a system administrator) or dynamically
(assigned by another device on the network on demand).

Reserved IP address
Certain host addresses are reserved and can’t be assigned to devices on a network
These are
1. Network address used to identify the network itself with all host bits zero.
Example: 192.168.1.0
2. broadcast address used for broadcasting packets to all devices on the network with all host bits one
Example: 192.168.1.255
So usable host with in a network calculated by 2 n-2 (two is subtracted because these are reserved for the network and
broadcast. where n is the number of bits used for the host portion of the address.
Class D and class E are also reserved addresses used for different purposes such as research.

Subnet mask (network mask)


A subnet mask or sub network mask is a 32 bit number which is used to identify which portion of the
IP address identifies the network portion and which part indicates the host part or portion.

In subnet mask, all bits of the network ID portion are set to 1 and all bits of the host address portion are set to
0.Any address bits that have corresponding mask bits set to 1 represent the network ID, and any address bits
that have corresponding mask bits set to 0 represent the node ID

For class full networks there are default mask


Class C -> 255.255.255.0
Class B-> 255.255.0.0
Class A-> 255.0.0.0

Subnneting
Subnetting is the process of breaking down an IP network into smaller sub-networks called “subnets.”
Each subnet is a non-physical description (or ID) for a physical sub-network (usually a switched network of
host containing a single router in a multi-router network).
11
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Sub netting a technique that allows a network administrator to divide one physical network into smaller
logical network
There are many reasons in favor of sub netting, including the following benefits
 Reduced network traffic: we all appreciate less traffic of any kind. Networks are no different. Without
trusty routers, packet traffic could grind the entire network down to a near standstill. With routers,
most traffic will stay on the local network: only packets destined for other networks will pass through
the router. Routers create broadcast domains. The more broadcast domains you create, the samller the
broadcast domains and the less network traffic on each network segment.
 Organized network performance: this is a result of reduced network traffic
 Simplified management: it is easier to identify and isolate network problems in a group of smaller
connected networks than with one gigantic network
 Facilitated spanning of large geographical distances: because WAN links are considerably slower and
more expensive than LAN links, a single large network that spans long distances can create problems
in every area previously listed, connecting multiple smaller networks makes the system more
efficient.

Subnet Mask Notation


There are two forms of subnet notation, standard notation and CIDR (Classless Internet Domain Routing )
notation. Both versions of notation use a base address (or network address) to define the network’s starting
point, such as 192.168.1.0. This means that the network begins at 192.168.1.0 and the first possible host IP
address on this subnet would be 192.168.1.1.
In standard subnet masks notation, a four octet numeric value is used as with the base address, for example
255.255.255.0. The standard mask can be calculated by creating four binary values for each octet, assigning
the binary digit of .1. to the network potion, and assigning the binary digit of .0. to the network potion. In the
example above this value would be 11111111.11111111.11111111.00000000. In combination with the base
address is a subnet definition. In this case the subnet in standard notation would be 192.168.1.0 /
255.255.255.0.
In CIDR notation, the number of 1.s in the mask’s binary version is counted from the left and that number is
appended to the end of the base address following a slash (/). In the example here, the subnet would be listed
in CIDR notation as 192.168.1.0/24.

Subnneting steps
When you’ve chosen a possible subnet mask for your network and need to determine the number of subnets,
valid hosts, and broadcast addresses of a subnet that the mask provides, all you need to do is answer five
simple questions:
How many subnets does the chosen subnet mask produce?
How many valid hosts per subnet are available?
What are the valid subnets?
What’s the broadcast address of each subnet?
What are the valid hosts in each subnet?

At this point it’s important that you both understand and have memorized your powers of 2.
Answers to those five big questions:
1. How many subnets? 2 = number of subnets. x is the number of masked bits, or the 1s. For example, in
x

11000000, the number of ones gives us 22 subnets. In this example, there are 4 subnets.
2. How many hosts per subnet? 2 – 2 = number of hosts per subnet. y is the number of unmasked bits,
y

or the 0s. For example, in 11000000, the number of zeros gives us 2 – 2 hosts. In this example, there
6

are 62 hosts per subnet. You need to subtract two for the subnet address and the broadcast address,
which are not valid hosts.
3. What are the valid subnets? 256 – subnet mask = block size, or increment number. An example
would be 256 – 192 = 64. The block size of a 192 mask is always 64. Start counting at zero in blocks
12
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
of 64 until you reach the subnet mask value and these are your subnets. 0, 64, 128, 192. Easy, huh?
Yes—that is, if you can count in the needed block size!
4. What’s the broadcast address for each subnet? Now here’s the really easy part… Since we counted
our subnets in the last section as 0, 64, 128, and 192, the broadcast address is always the number right
before the next subnet. For example, the 0 subnet has a broadcast address of 63 because the next
subnet is 64. The 64 subnet has a broadcast address of 127 because the next subnet is 128, etc. And
remember, the broadcast of the last subnet (the subnet with the same interesting octets as the mask) is
always 255 for Class C.
5. What are the valid hosts? Valid hosts are the numbers between the subnets, omitting all the 0s and all
1s. For example, if 64 is the subnet number and 127 is the broadcast address, then 65–126 is the valid
host range—it’s always the numbers between the subnet address and the broadcast address.
I know this can truly seem confusing. But it really isn’t as hard as it seems to be at first—just hang in there!
Why not try a few and see for yourself?
Practice Example #1C: 255.255.255.192 (/26)
Let’s use the Class C subnet mask from the preceding example, 255.255.255.192, to see how much simpler
this method is than writing out the binary numbers. We’re going to subnet the network address 192.168.10.0
and subnet mask 255.255.255.192.
192.168.10.0 = Network address
255.255.255.192 = Subnet mask
Now, let’s answer the big five:
1. How many subnets? Since 192 is 2 bits on (11000000), the answer would be 2 . 2

2. How many hosts per subnet? We have 6 host bits off (11000000), so the equation would be 2 6
– 2 = 62 hosts.

3. What are the valid subnets? 256 – 192 = 64. Remember, we start at zero and count in our
block size, so our subnets are 0, 64, 128, and 192.
4. What’s the broadcast address for each subnet? The number right before the value of the next
subnet is all host bits turned on and equals the broadcast address.
5. What are the valid hosts? These are the numbers between the subnet and broadcast address.
The easiest way to find the hosts is to write out the subnet address and the broadcast address.
This way, the valid hosts are obvious. The following table shows the 0, 64, 128, and 192
subnets, the valid host ranges of each, and the broadcast address of each subnet:

See? We really did come up with the same answers as when we did it the binary way, and this way is so
much easier because you never have to do any binary-to-decimal conversions! About now, you might be
thinking that it’s not easier than the first method I showed you. And I’ll admit, for the first subnet with only 2
subnet bits—you’re right, it isn’t that much easier. But remember, we’re going after the gold: being able to
subnet in your head. And to do that, you need one thing: practice!

Collision Domains vs. Broadcast Domains


These different types of domains mean different things and when designing a LAN both of these domains
can harm the performance of your network. If you are not aware of the difference between these two, this
tutorial should help you out.
If you have a small network at your home there is usually the router/modem that is connected via phone line
or cable to the ISP that router/modem is then connected to a switch or they even have a switch built into the
device. You connect a few cables turn on some devices and you now have an internet connection ready to go.
In larger networks you have more choices that need to be taken like when to use a hub, a switch, or a router?
How much money do you want to spend usually the more money spent you get more ports, performance
increases and more features are added. These are all types of components that need to be thought of when
designing a LAN.

13
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
This tutorial is going to be focusing on two major things collision domains and broadcast domains. The
definition of a collision domain is a set of LAN devices whose frames could collide with one another. This
happens with hubs, bridges, repeaters and wireless access points as only one device can send and receive at a
time. If more than one device tries sending or receiving, the information is lost and irrecoverable it will need
to be resent. This can slow down network performance along with making it a security threat.
A hub is considered a layer one device of the OSI model; all it does is send packets out on all ports including
the port in which the packet was received on. This causes a collision domain because only one device can
transmit at time. This also shares the bandwidth of all devices connected to that collision domain. These
devices can inefficiently use that bandwidth because of the CSMA/CD and jamming signals that occur when
a collision happens.

A switch uses layer two of the OSI model, so the switch uses
MAC addresses to send the packet to the correct device. Rather
than sending it to all ports a switch only sends the packet out one port, if it has the MAC address in its MAC
address table. If not the switch will send the packet on all ports except for the port in which the packet was
received on. Switches provide separate collision domains on each port. This provides dedicated bandwidth to
that device. This also allows simultaneous conversations between devices on different ports. Each port can be
operated at full-duplex so the device can send and receive information
at

A broadcast domain is like a collision domain, the definition of a


broadcast domain is a set of devices that if one device sends a
broadcast frame all other devices will receive that frame in the same
broadcast domain. So if devices are in the same IP network they will
be able to receive a broadcast message. Having a smaller broadcast
domain can improve network performance and improve against
security attacks.

The more PCs and network devices connected to a single broadcast domain, the more broadcast messages
you will have. Remember a broadcast message goes to every PC and network device. An example is when

14
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
the router gets a packet that is destined to a host (192.168.1.124) on its Ethernet interface (192.168.1.0/24
network) the router will send an ARP request saying who is 192.168.1.124? That packet will go to every PC
on the network, each PC has to look at the packet and then discard it if it is not 192.168.1.124. But only be
processed by the PC that is 192.168.1.124. So a broadcast message can be just like a collision domain and
affect network performance. The only devices that can block or not send broadcast messages are routers
because they separate networks. Each interface on a router is a different network.

Introduction to IPV6
The current version of IP (known as Version 4 or IPv4) has not been substantially changed since RFC 791
was published in 1981. IPv4 has proven to be robust, easily implemented and interoperable, and has stood
the test of scaling an internetwork to a global utility the size of today’s Internet. This is a tribute to its initial
design.
However, the initial design did not anticipate the following:
 The recent exponential growth of the Internet and the impending exhaustion of the IPv4 address space.
IPv4 addresses have become relatively scarce, forcing some organizations to use a Network Address
Translator (NAT) to map multiple private addresses to a single public IP address. While NATs promote reuse
of the private address space, they do not support standards-based network layer security or the correct
mapping of all higher layer protocols and can create problems when connecting two organizations that use
the private address space.
Additionally, the rising prominence of Internet-connected devices and appliances ensures that the public IPv4
address space will eventually be depleted.

 The growth of the Internet and the ability of Internet backbone routers to maintain large routing tables.
Because of the way that IPv4 address prefixes have been and are currently allocated, there are routinely over
85,000 routes in the routing tables of Internet backbone routers. The current IPv4 Internet routing
infrastructure is a combination of both flat and hierarchical routing.
 The need for simpler configuration.
Most current IPv4 implementations must be either manually configured or use a stateful address
configuration protocol such as Dynamic Host Configuration Protocol (DHCP). With more computers and
devices using IP, there is a need for a simpler and more automatic configuration of addresses and other
configuration settings that do not rely on the administration of a DHCP infrastructure.
 The requirement for security at the IP level.
Private communication over a public medium like the Internet requires encryption services that protect the
data being sent from being viewed or modified in transit. Although a standard now exists for providing
security for IPv4 packets (known as Internet Protocol security or IPsec), this standard is optional and
proprietary solutions are prevalent.
 The need for better support for real-time delivery of data—also called quality of service (QoS).
While standards for QoS exist for IPv4, real-time traffic support relies on the IPv4 Type of Service (TOS)
field and the identification of the payload, typically using a UDP or TCP port. Unfortunately, the
IPv4 TOS field has limited functionality and over time there were various local interpretations. In addition,
payload identification using a TCP and UDP port is not possible when the IPv4 packet payload is encrypted.
To address these and other concerns, the Internet Engineering Task Force (IETF) has developed a suite of
protocols and standards known as IP version 6 (IPv6). This new version, previously called IP-The Next
Generation (IPng), incorporates the concepts of many proposed methods for updating the IPv4 protocol. The
design of IPv6 is intentionally targeted for minimal impact on upper and lower layer protocols by avoiding
the random addition of new features.

IPv6 Features
The following are the features of the IPv6 protocol:

 New header format


 Large address space
15
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
 Efficient and hierarchical addressing and routing infrastructure
 Stateless and stateful address configuration
 Built-in security
 Better support for prioritized delivery
 New protocol for neighboring node interaction
 Extensibility
The following sections discuss each of these new features in detail.

Differences Between IPv4 and IPv6


IPv4 IPv6
Source and destination addresses are 32 bits (4 bytes) Source and destination addresses are 128 bits (16 bytes)
in length. in length. For more information, see “IPv6
Addressing.”
IPsec support is optional. IPsec support is required. For more information,
see“IPv6 Header.”
No identification of packet flow for QoS handling by Packet flow identification for QoS handling by routers
routers is present within the IPv4 header. is included in the IPv6 header using the Flow Label
field. For more information, see “IPv6
Header.”
Fragmentation is done by both routers and the sending Fragmentation is not done by routers, only by the
host. sending host. For more information, see “IPv6
Header.”
Header includes a checksum. Header does not include a checksum. For more
information, see “IPv6 Header.”
Header includes options. All optional data is moved to IPv6 extension headers.
For more information, see “IPv6 Header.”
Address Resolution Protocol (ARP) uses broadcast ARP Request frames are replaced with multicast
ARP Request frames to resolve an IPv4 address to a Neighbor Solicitation messages. For more information,
link layer address. see “Neighbor Discovery.”
Internet Group Management Protocol (IGMP) is used IGMP is replaced with Multicast Listener Discovery
to manage local subnet group membership. (MLD) messages. For more information, see
“Multicast Listener Discovery.”
ICMP Router Discovery is used to determine the IPv4 ICMP Router Discovery is replaced with ICMPv6
address of the best default gateway and is optional. Router Solicitation and Router Advertisement messages
and is required. For more information, see
“Neighbor Discovery.”
Broadcast addresses are used to send traffic to all nodes There are no IPv6 broadcast addresses. Instead, a link-
on a subnet. local scope all-nodes multicast address is used. For
more information, see “Multicast IPv6 Addresses.”
Must be configured either manually or through DHCP. Does not require manual configuration or DHCP. For
more information, see “Address Auto configuration.”
Uses host address (A) resource records in the Domain Uses host address (AAAA) resource records in the
Name System (DNS) to map host names to IPv4 Domain Name System (DNS) to map host names to
addresses. IPv6 addresses. For more information, see “IPv6 and
DNS.”
Uses pointer (PTR) resource records in the INADDR. Uses pointer (PTR) resource records in the IP6.ARPA
ARPA DNS domain to map IPv4 addresses to host DNS domain to map IPv6 addresses to host names. For
names. more information, see “IPv6 and DNS.”
Must support a 576-byte packet size (possibly Must support a 1280-byte packet size (without
fragmented). fragmentation). For more information, see “IPv6
MTU.”

16
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Network design
Peer-to-Peer or Server-Based?
A company that manufactures custom-made bicycles has asked you to install an economical computer
network that will bring it up-to-date in communication technology and be flexible enough to allow for future
expansion.

The company's network goals are to:


 Network the existing computers so that they can share information and printers.
 Add two additional computers to the network: one for the Product Design Group and one for the
Manufacturing Department.
 Allow for the possible addition of three computers at a later date.
 Provide an Internet connection for the Product Design Group.
The first decision we need to make for this new network is whether it should be a peer-to-peer or a server
based network. The factors we need to examine include the:
 Size of the network.
 Level of security.
 Type of business.
 Level of administrative support available.
 Amount of network traffic.
 Needs of the network users.
 Network budget.
In a peer-to-peer network, all users on the network are equal. Each will have equal access to all other
computers on the network, provided the owner of the computer has shared that resource with the network. In
a small network or business, this "one for all and all for one" system often works well.
Often, in a small business, no individual is able to devote full-time attention to administering the network.
This brings another advantage of peer-to-peer networks to light. Here, responsibility for running the network
is distributed to everyone, and users determine which information or resources on their computers will be
shared.
Another down side of the peer-to-peer network is its limited performance. If another user is accessing the
resources on your computer, that user will also be using processor time on your computer. Therefore,
regardless of how fast your computer's processor is or how much memory you have, the performance of your
computer will slow down when someone else is drawing on its resources.

On a server-based network, resources are usually centralized. For example, one server manages all the
printers, and another server manages all the files. Because servers are rarely turned off, resources will always
be available. Server-based networks are also scalable. This means that their size can be easily adjusted to
respond to changes in the load on the network.

Server-based networks are also more secure than peer-to-peer networks. With a peer-to-peer network, all
resources are shared equally across the network. If the Accounting Department shares the directory that
contains the salary files so that the Managing Director can access them, everyone else on the network can
also access these files. On the other hand, server-based networks allow for the creation of accounts and
permissions that provide for further security. For example, a server-based network can share individual files
within a directory without making the directory itself available to everyone on the network.

As it grows, a server-based network can be segregated according to organizational needs. For example, one
server might be designated for the Accounting Department and another server designated for the Sales

17
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Department. Should our bicycle company's network requirements reach this level, we will need to consider
using a network that supports file-level sharing and user groups with shared rights to network resources.

At present, the better choice for our company is to use a peer-to-peer network. But in order to provide more
flexibility and to prepare it for further expansion, another option exists: create a hybrid network. Thus, while
our basic network will be peer-to-peer, we will install one computer as a file server. With this approach,
access to the file server requires an account and permissions, while access to other computers on the network
is shared equally.
So, after weighing these factors, we arrive at our network-design selection for this bicycle company: a hybrid
peer-to-peer network, with one new computer to be installed and configured as a file server and used to
centralize company information.

Taking Inventory
After deciding on the overall network design, our next step in creating a network is to take inventory to
determine what hardware and software is already available and what needs to be acquired. As an illustration,
we turn again to our bicycle company. It has a mixture of computers, ranging from a legacy 286 to a new
Pentium III, as well as some older printers. Thus, some obvious updating will be required to get this network
up and running. Taking inventory is an important step, because it sets the stage for future network expansion.

For example, if all your computers run Microsoft Windows 95 or Windows 98, you will be limited to using a
peer-to-peer network. To upgrade to a server-based network in the future, you will have to upgrade one of the
computers to run NetWare or Windows NT or add a new server with one of those network operating systems
installed.
To take inventory, you'll need to survey four categories:
 Hardware
 Software
 Telecommunications equipment
 Network requirements
Hardware Survey
This is actually a simple process, but one that should not be taken lightly. Begin by recording the
specifications of each computer; the details you gather at this stage can save time in the long run. As we will
see later, in order to function effectively, networks often require that hardware and software meet certain
minimum standards. If you know the specification details of the available equipment in advance, you can
prevent many problems later on.
For each computer, you will need to gather information, including:

 Make and model.


 Processor manufacturer and speed.
 Amount of memory (RAM) installed.
 The size and manufacturer of each hard drive.
 Details of any other installed drives, such as compact-disc and removable disk drives.
 Monitor—make, model, and size.
 Video card—make, model, and amount of memory.
 Any installed peripherals.
 Type of bus—EISA, Micro Channel, ISA, or PCI—the computer uses and whether there are any free
slots; you will need free slots to install network interface cards. (For more information on bus
architecture, refer to make a list of the manufacturer and model number for any peripheral devices,
such as printers, plotters, and scanners, whether they are installed or simply sitting on a shelf. For
each of these, note whether you have the original disk with drivers.

18
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Software Survey
Be aware of all the software currently in use throughout the potential network. For example, if you were to
convert all the computers to Windows NT while you were installing the new network, you might find that
some of the old standby programs, once used on a daily basis, now no longer run. Be especially careful when
evaluating custom-designed and proprietary programs, such as accounting databases, which have been
written especially for the company. You might need to contact the manufacturer for information about
running proprietary programs on the network. Not all of these will run in a network environment; the product
licensing arrangement might not allow network operations.
For each software program, gather the following information:
 Program name
 Program version number
 Availability of the original installation floppy disks or compact discs
 Any licensing information
As you carry out your survey of our bicycle company, also note any potential software incompatibilities
within and among company departments. For example, the Accounting Department might be using
WordPerfect, whereas the Sales Department is using Microsoft Office. If you are planning to upgrade some
day, now is the time to make any changes needed to ensure that the same system is used company wide.

Telecommunications Equipment Survey


It might seem strange to review the existing telecommunications equipment when you are installing a LAN,
but this is actually a very important element of your survey, especially if you intend to use Internet
connections or some form of remote access server. Overlooking something as simple as the number of phone
lines wired into each office can have a major impact later if you need modem and telephone connections at
the same time. For example, if the company has an automated telephone system, while telephone outlets
might be located in every office, they might not be capable of a modem connection. In that case, a separate
telephone outlet might be required for voice and data communication. Also, if the company is using a high-
speed digital telephone service, you might not be able to connect with standard modems.
Don't assume a standard RJ-11 telephone jack is going to be sufficient for you to connect a modem and start
surfing the Web.

Requirements of the Network


After you have examined the existing facility and equipment, you need to define the requirements of your
network. You'll then match these requirements to the existing hardware, software, and telecommunications
features available and determine what steps need to be taken to develop the network. At a minimum, you
should consider the following:
 The size of the facility (located on a single floor vs. multiple floors)
 The number of users
 Whether the LAN will be extended to several buildings
 The environment (office, manufacturing, out-of-doors)
 The current network media, if any
 The technical competence of users
 The amount of network traffic (initially, and anticipated for the future)
 The level of security

Building a Map
Now it's time to lay out the network. But before you begin to recommend a network plan for our bicycle
company, you will first need to make a map of all the elements involved. During this step, you should
consider two aspects of the network: the physical layout, including the location of each piece of hardware
and how it relates to the others, and the physical and logical topology of the proposed network. The second
step is to create a layout of the network topology. Don't forget to include printers and other peripherals, such
as scanners and modems.
19
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Choosing Network Media
The choice of which media to select should not be taken lightly. The cost of installation can be quite high,
especially if you have to do it twice. The media you choose will usually be related to the geographic
requirements of the site. For example, if several of the workstations are located in a manufacturing
environment in which a large amount of electrical noise is generated, fiber-optic cable might be required
because it is unaffected by electrical signals. On the other hand, in a small office, simple twisted-pair cable
will usually be appropriate. The most important thing to keep in mind is not the cost today, but the cost in the
future. Being overly cost-conscious now can limit the scalability, and thus the life span, of the network.

At our bicycle company, we might decide to install our network using CAT 3 UTP cable. This would give us
a functional network with our seven workstations, but limit our network speed to 10 Mbps. Five years from
now, when we might have as many as 30 to 50 workstations, a 10 Mbps network would be slow. However,
by installing CAT 5 UTP now, we can upgrade our network to 100 Mbps at any time in the future without
needing to rewire the building. And CAT 5 UTP cable costs only a few cents more per foot than CAT 3 UTP
cable.

Factors That Affect a Network Design


Designing a network is more than merely planning to use the latest device in the market. A good network
design takes into consideration many factors:

Size Matters
Designing a LAN for a small office with a few users is different from building one for a large company with
two thousand users. In building a small LAN, a flat design is usually used, where all connecting devices may
be connected to each other. For a large company, a hierarchical approach should be used.

Geographies
The geographical locations of the sites that need to be connected are important in a network design. The
decision making process for selecting the right technology and equipment for remote connections, especially
those of cross-country nature, is different from that for a LAN. The tariffs, local expertise, quality of service
from service providers, are some of the important criteria.

Politics
Politics in the office ultimately decides how a network should be partitioned. Department A may not want to
share data with department B, while department C allows only department D to access its data. At the
network level, requirements such as these are usually done through filtering at the router so as to direct traffic
flow in the correct manner. Business and security needs determine how information flows in a network and
the right tool has to be chosen to carry this out.

Types of Application
The type of application deployed determines the bandwidth required. While a text-based transaction may
require a few kbps of bandwidth, a multimedia help file with video explanations may require 1.5 Mbps of
bandwidth. The performance requirement mainly depends on application need and the challenge of a good
network is to be able to satisfy different application needs.

Need For Fault Tolerance


In a mission-critical network, performance may not be a key criteria but fault tolerance is. The network is
expected to be up every minute and the redundancy required is both at the hardware level and at the services
level. In this aspect, many features have to be deployed, such as hardware redundancy, re-route capabilities,
etc.
20
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
To Switch or Not to Switch
One of the factors that influence the network design is whether to deploy switching technology. Although
switching seems to be enjoying popularity, it may not be suitable in terms of cost for a small office of four
users. In a large network design, switching to the desktop may not be suitable because it would drive up the
entire project cost. On the other hand, a small company that designs multimedia applications for its client
may need a switching network to share all the video and voice files. The decision a network manager has to
make is when to switch and where to switch.

Strategy
One important factor is of course a networking strategy. Without a networking blueprint, one may end up
with a multivendor, multiprotocol network that is both difficult to manage and expand. It has been estimated
that 70% of the cost of owning a network is in maintaining it. Having a network strategy ensures that
technology is deployed at the correct place and products chosen carefully. A network that is built upon a
strategy ensures manageability and scalability.

Cost Constraints
The one major decision that makes or breaks a design is cost. Many a times, network managers have to
forego a technically elegant solution for a less sophisticated design.

Standards
Choosing equipment that conforms to standards is an important rule to follow. A standard means having the
ability to deploy an industry-recognized technology that is supported by the majority of vendors. This
provides flexibility in choice of equipment, and allows network managers to choose the most cost effective
solution. As more business and transactions are conducted through the network, the network infrastructure
has become more important than ever. Network managers need to choose the right technologies, from the
backbone to the desktops, and tie everything together to support the needs of their businesses. By now, it is
obvious that designing a network is not just about raw speed. Adopting a balanced approach, weighing
features against cost, and choosing the right technology that is based on open standards to meet the business
requirement is a right way to begin.

Conceptualizing Peer-to-Peer network


A peer-to-peer network, also called a workgroup, is commonly used for home and small business networks. In
this model, computers directly communicate with each other and do not require a server to manage network
resources. In general, a peer-to-peer network is most appropriate for arrangements where there are less than ten
computers located in the same general area. The computers in a workgroup are considered peers because they are all
equal and share resources among each other without requiring a server. Each user determines which data on their
computer will be shared with the network. Sharing common resources allows users to print from a single printer,
access information in shared folders, and work on a single file without transferring it to a floppy disk.

In order to establish a peer-to-peer network, you must ensure that all of the necessary hardware, protocols, services
and settings are configured properly. This includes:

 Hardware Components
- Computers: A minimum of two computers is required to establish a peer to peer network.

- Installing a network adapter, also called a Network Interface Card (NIC).

Each computer that you want to be part of the network must have a standard network adapter installed. A
network adapter is installed on your computer's motherboard and is used to access a network. When you install
21
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
a network adapter, the operating system creates a local area network (LAN) connection for you. It appears, like
all other connection types, in the Network and Dial-up Connections folder in Control Panel. Each time you
start your computer, Windows XP / 2000 detects your network adapter and automatically starts the local area
connection.

Self-Check-1 Written Test

Name________________________ Date________________________

Directions: Choose the best answer from the given alternatives


1. Which of the following connectivity device is mandatory in network
A. Repeater B. Switch C. NIC D. Router
2. Which of the following is not the purpose of NIC
A. Receive data and convert to appropriate format that can be transfer in a cable

22
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
B. Determine and accept data sent to a computer
C. It filters layer 3 packet
D. All are true
3. One of the following doesn’t work in layer 2 of the OSI reference model
A. NIC B. Repeater C. Switch D. Hub
4. One of the following is not true
A. Active Hub works in data link layer of the OSI ref model
B. Passive hub retransmit signal without regenerating
C. Hub can have different ports to different cables
D. Hubs can be used in star topology
5. Which of the following is not true
A. Switches are multiport bridge
B. Switches work in layer 2 of the OSI reference model
C. Switches do not regenerate signal
D. Switches uses routing table to transmit signal
6. Which of the following work on network layer of the OSI reference mode
A. Switch B. Hub C. Router D. Bridge
7. Which of the following is true
A. MAC address of a computer can be changed
B. IP address is used in TCP/IP network
C. Every computer should have a unique MAC address to communicate
D. Once we assign an IP address to a computer it is very difficult to change
8. Which of the following is a class B IP address
A. 192.168.1.1 B. 113.10.10.1 C. 130.1.12.1 D. 240.2.1.5
9. Which of the following is a different IP address than the other
A. 192.168.0.1 B. 192.168.0.168 C. 192.168.1.0 D. 192.168.0.2
10. Which of the following is a correct private class C IP address
A. 192.160.7.8 B. 10.10.1.2 C. 192.10.1.1 D. 192.168.100.200
11. The default gate way of class 100.10.2.1 IP
A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0
12. What are some of the advantages of using a router to segment the network? (Choose two)
A. Filtering can occur based on Layer 3 information.
B. Broadcasts are eliminated.
C. Routers generally cost less than switches.
D. Broadcasts are not forwarded across the router.
E. Adding a router to the network decreases latency.
13. Which of the following statements describe the network shown in the graphic? (Choose two)

23
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
A. There are two broadcast domains in the network.
B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.
14. Refer to the exhibit. A network engineer is troubleshooting an internet connectivity problem on the
computer. What causing the problem?

A. wrong DNS server


B. wrong default gateway
C. incorrect IP address
D. incorrect subnet mask

24
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
Operation Sheet-1 Develop best topology

Operation Title: develop best topology


 Purpose: -
o Determine resource requirements for each network segment.
o Check features of the physical environment for possible topology options.
o Select and document appropriate network topology
 Condition or situation for the operation sheet : -
 The trainees follow the procedures to confirm the specification of the server in two
methods(i.e. using system manual and by following some steps after starting the system)
 Equipment, tools and material: -
 Server computer that interconnected with I/O devices
 Server operating system 2003 and others
 Server Manuals and documentation
 Screw drivers
 ESD Tools
 Procedure: - (Method- 1)
 Check port compatibility of peripheral devices
 Interconnect peripheral devices with the server’s system unit
 Plug in power cables of both system unit and the monitor
 Check power outlet and plug in both system unit and the monitor’s power cable
 Switch on both of system unit and the monitor and wait until the system starting
up.
 Confirm some specification of the server (like server
model ,type ,version ,manufacturer company ,RAM type & capacity ,Application
software installed ,processor speed ,etc )through the following steps:
1. Start server computer
2. Click on start button→ All programs → Accessories →system Tools→ System
Information

25
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
OR
 Click on start button →Right-Click on My Computer →Properties

After you click on ‘properties’, you will obtain the following Information

26
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
 Confirm the server’s hard disk capacity through the following steps:
1. Click on start button →My computer

2. Then Right click on the local disk partitions →properties. Then read total capacity of the
disk(Note: if there are two partition the total hard disk capacity will be the sum of two
partitions total capacity )

Method-2
 Read the servers type, model, and architecture and Manufacturer Company from the outer part (case)
of the server itself.
 Disassemble the computer(server) case
 Read the specification of the Hard disk(disassemble from the mother board if necessary)
 Identify the memory modules and slots and read its specification
 Read the specification of processor
 Read the specification of Motherboard
 Read the specification of power supply
 Read the specification of chipsets
 Read the specification of BIOS
 Read the specification of CD/DVD drive
 Identify the type of expansion slots
 Identify the different ports the server contains
 Assemble each and every disassembled equipments properly

Quality Criteria: -

1. The specification of each devices should be recorded & documented


2. The above two methods should be applied &compared to each other

Precaution: -

 Putting the server computer in cooling place


 Prepare server Operating System with its product key
 Installing latest anti-virus
 checking correct specification of the server that the organization needs
 check compatibility of pins before you interconnect devices
 use ESD tools before you open the system case.

27
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14
LAP Test Practical Demonstration

Name: _____________________________ Date: ________________

Time started: ________________________ Time finished: ________________

Instructions: Given necessary templates, workshop, tools and materials you are required to perform the
following tasks within 2 hours.

Task 1: Connect two computer using hub and Check port compatibility of peripheral
devices
Task 2: Interconnect peripheral devices with the server’s system unit
Task3: Identify specification of the server (like server model, type, version
Manufacturer Company, RAM type & capacity, Application software installed
processor speed.
Task 2: Take documentation for Task 3.

28
Learning Guide for HNS Level III Author: Zimam Gosaye ICT Trainer Date: June 12-06-14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy