Administrating Network and Hardware TTLM UNIT 1-4
Administrating Network and Hardware TTLM UNIT 1-4
Level-II
Based on June 2021, Curriculum Version
1
List of abbreviation
I/O Input or Output
VDU visual display unit
OS Operating system
HP-UX, AIX Hewlett Packard Unix, Advanced Interactive Executive
Mac OS Macintosh operating system
LAN Local area network
WAN Wide area network
VPN Virtual private network
PSTN public switched telephone network
Ipconfig Internet Protocol Configuration
P2P peer-to-peer
UTP Unshielded twisted-pair
STP Shielded twisted-pair
UTP Unshielded twisted-pair
STP Shielded twisted-pair
ASICs application-specific integrated circuits
ASICs application-specific integrated circuits
VLAN Virtual Local Area Network
CLI command-line interface
GUI Graphical User Interface
HDD or SSD Hard Disk Drive or Solid State Drive
CHKDSK and SFC Check Disk and System File Checker
PDA Personal digital assistant
Introduction to the Module
This module provide you to acquire knowledge of Network devices and hardware
peripherals that allow user interface and networking systems, how to connect
network devices and computer hardware peripherals in general.
For effective use this modules trainees are expected to follow the following module
instruction:
This unit is developed to provide you the necessary information regarding the following content
coverage and topics:
• Client requirements
This unit will also support you to accomplish the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
A. I/O (Input or
output), B.
Communications
devices and
C. Secondary storage devices.
• Internal departments
• External organizations
• Individual people
• Employee
• LAN
• WAN
• VPN
• The internet
• The use of the PSTN for dial-up modems only Private lines Data and
voice. Workstations
• Personal computers
Modems or other connectivity devices
• Printers
• Hard drives
• Monitors
• Switches
Hubs
• Personal digital assistant (PDA)
• Other peripheral devices
• Software may included:-
• May include but is not limited to commercial,
• Domestic
• Packaged or adapted software.
Consumables may include:-
Consumables are goods used by individuals and businesses that must be replaced
regularly because they wear out or are used up. They can also be defined as the
components of an end product that is used up or permanently altered in the process
of manufacturing such as semiconductor wafers and basic chemicals.
• ink cartridges
• toner cartridges
• Ribbons
• floppy disks
• CD-RW
Operational Health and Safety (OHS) standards may include:
• Correct posture
• Lighting
• Type of desk
• Type of monitor
• Style of chair
• Typing position
• Repetitive strain injury prevention
• Ventilation
• Light position
• Correct lifting method
• Length of time in front of computer
• Network operating system
May include but is not limited to Novell NetWare 5 or above or any operating
system that has multi-user ability, Linux, Mac OS, Windows 7 or above.
Instruction:-Read all questions which given below and you to answer the correct one.(2
points each)
4. Which one of the following Input devices that help to write or enter the
letters and numbers in to your computer?
A. Keyboard B. Printer C. Monitor Mouse
10. Output peripherals are show the product or display result of input.
11. Keyboard and mouse are not input peripherals
12. Communication devices are produce sounds capture pictures.
0peration sheet-1
Start up your computer
Step 1:- Connect the power cables on the system unit and monitor.
Step 2:-Connect hardware peripherals to the computer on the back side front side.
Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory,
your teacher shall advice you on additional work. But if satisfactory, you can proceed to the
next topic.
Unit Two: Obtain required peripheral
This Unit is developed to provide you the necessary information regarding the following
content coverage and topics
• Obtaining peripheral
The Internet provides different methods for searching for suppliers. Using search
engines such as Google or Yahoo can help you find a hardware supplier anywhere
in the world. Suppliers will often have their own websites that can provide you with
catalogues of available equipment. Other ways to investigate suppliers are to follow
links from a website such as a manufacturer’s website, or to browse website
directories that may be linked to search engine home pages. ii. Telephone directory
Many larger hardware suppliers use television, radio or leaflet deliveries to inform
potential customers of their latest hardware.
v. Newspapers
Manufacturers generally have their own websites. These may list major suppliers in
your area. Emailing or telephoning the manufacturer may also be a way to find out
names of local suppliers. vi. Choosing supplier
With so many choices of suppliers available, how do you find the right one? There
are a few factors to consider: vii. Selecting a peripheral
Once you have selected suitable suppliers you need to contact each supplier.
Information you should find out from the supplier includes:
Model and manufacturer names of peripherals that will satisfy the majority of your
clients requirements (including system specifications, physical dimensions,
support)
You may find it helpful to keep a record of any details that you collect so you refer
to this information quickly and easily. viii. Placing the order
From ________________________
Date ________________________
Quantity Description Price Supplier: name and telephone
Code
Total price
Purchasing Department_________________________
2.3. Equipment inventory verification
Hardware inventory provides a simple way of finding basic information about your
installed hardware. Hardware includes processors, memory, serial ports, parallel
ports, power supplies, fans, graphics adapters, network adapters.
Storing peripherals
Keep equipment in the correct position — After unpacking, most devices will
usually have a proper resting position. If a device is not kept in its natural position,
there could be problems when trying to operate the device later on. For example,
when a printer is stored in a vertical position, components such as the ink cartridges
could leak or be dislodged.
Keep equipment away from weather, dust and other harmful material — When
finding a storage location, consider what kind of elements the device may be
subjected to. If, for example, you store a USB drive in a cabinet next to chalk, dust
from the chalk could potentially damage the storage device’s USB connection.
Avoid storing the device in direct sunlight — Exposure to direct sunlight could
damage many of the external components of a device as well as subject the device
to high temperatures.
It is essential to position a monitor correctly to ensure it will suit the needs of the
user. Tips include:
Try to make sure that monitor is in a position away from the glare of sunlight.
Check that the brightness and contrast controls of the screen have been adjusted to
suit lighting conditions in the room.
The top of the screen should be the same level as the user’s eye level.
Make sure that you can reach the peripheral device and its components without
having to strain your back.
Place equipment such as scanners and printers at a suitable height so a user is easily
able to reach paper trays, open scanner lids, etc.
Make sure that equipment such as speakers is easily accessible if settings such as
volume control need to be changed.
Do not be tempted to add too many extension cables or double socket adapters to
your existing electrical sockets.
Position electrical leads where they will not cause tripping hazards to people.
Storing consumables
The term ―consumables‖ are a product that is used once and then replaced by
others
Paper, CD or DVD and printer cartridge. These needs to placed at safe and dry
environment i. Paper
Paper needs to be stored in an area which is cool and dry, to prevent moisture from
fusing pages together.
Make sure to store cartridges/toner in a cool dry place, away from sparks and open
flames, with adequate ventilation and do not expose the device to high
temperatures. Also ensure that the cartridges are not taken out of their packaging
until they will be used within the printer, as the ink will dry out before use.
When possible, make sure that CDs are kept in their protective case, to minimize
the chances of being scratched. Also keep them out of direct sunlight and extreme
temperatures.
Self check test:-2
Name: _____________________________ IDNo_________ Date:
___________________
Operation sheet 2
Documenting peripherals used with each computer
If the peripheral is an essential part of the computer system (for example mouse,
keyboard or monitor) it is logical to record information about the device within the
documentation for the computer to which it is connected. Individual computer
inventories will often contain detailed information about the computer’s related
hardware and software. It may also be more practical to record information about
the peripheral inside the computer’s record, if the device is also permanently
connected to a computer (for example a printer or scanner).
Manufacturer: Dell
Model: OptiPlex GX280MT Monitor: Dell UltraSharp
Minitower—Power 1905FP flat panel, Operating
System: Windows XP Printer: HP LaserJet IID
Serial number: 12345 Keyboard: Dell USB keyboard
RAM: 128 Mb Pointing device: Dell USB 2-button
If the device is shared between several computers, it makes more sense to keep
information about the peripheral as an individual entry in an inventory. Devices
such as digital cameras, data projectors and USB drives would more likely to be
used by many computers, thus it would make more sense to record their details
separate to the computer details.
• printer
• cartridge
• power cable
• USB cable
• sample paper
• feeding device
• CD driver
Be attentive when unpacking a peripheral device — handle the packaging and
contents with care, as you do not want to damage your new device. Remove any
packing material surrounding and also within the device. Some printers, for
example, have soft foam and plastic pieces inside the device to ensure that parts are
locked into the correct position. Make sure that you remove these pieces and foam
before installation.
Lap test 2
Name: _____________________________ IDNo _____________Level
____________
Instructions: You are required to perform the following individually with the
presence of your teacher.
From
______________________
__ Date
______________________
__
Quantity Description Price Supplier: name and telephone
Code
Total price
Purchasing Department_________________________
Unit Three: Connect hardware peripherals
This unit is developed to provide you the necessary information regarding the following content
coverage and topics
• Test peripherals
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to:
• Test peripherals
3.1. Schedule hardware installation time
Installation (or setup) of a computer program (including device drivers and plug-in),
is the act of making the program ready for execution. Installation refers to the
particular configuration of a software or hardware with a view to making it usable
with the computer.
Thorough planning ensures that you have everything to meet all the prerequisites for the
successful setup and installation of the system. Planning minimizes errors during
installation and enables a quicker upgrade or installation.
Guidelines for hardware/software installation plan. Burn-in means to configure the hardware and run
it for some period of time, usually 24-72 hours.
Open the My Computer window, right-click on the peripheral device (usually labeled
Removable Disk) and select Eject from the contextual menu. open the My Computer
window, select the peripheral device (usually labeled Removable Disk) and then select Eject
this Disk from the Common Tasks pane of the window.
To remove a piece of hardware or peripheral from your computer, use these
steps:
1. Open Settings.
2. Click on Devices.
3. Click on Bluetooth & other devices.
4. Select the device that you no longer need.
5. Click the Remove device button.
6. Click View tab and select Show hidden devices.
7. Expand the branches in the device tree & look for the faded icons.
8. These indicate unused device drivers.
9. Right-click on it and select Uninstall.
Just plug it into your laptop, either into the keyboard port or a USB port, whichever
is available. You can start using the keyboard the second it's plugged in. Note that
adding an external keyboard often doesn't disable the laptop's internal keyboard.
You can use both!
Peripheral devices can be connected to your computer via USB port, serial port,
parallel port, specialized network card, or Ethernet network. Local area
networks (LANs) commonly use Ethernet networks for machine connection.
The most common peripherals are a printer, scanner, keyboard, mouse, tape
device, microphone, and external modem that
are externally connected to the computer.
Column A Column B
1. Installation A. Measuring hardware
2. Test peripherals B. Configuring hardware or
software
3. Input/output C. Peripherals
This unit is developed to provide you the necessary information regarding the following content
coverage and topics
• Configure security
• Configure workstation
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Advantage of Networking:
Share Documents
Exchange e-mail messages
Live audio and video broadcast
Using one device for many computers like printer Sharing external
memory like Hard disk. Security.
LAN stands for local area network. A network is a group of two or more connected
computers, and a LAN is a network contained within a small geographic area,
usually within the same building. Home WiFi networks and small business
networks are common examples of LANs.
One of the most common real-world examples of a PAN is the connection between
a Bluetooth earpiece and a Smartphone. PANs can also connect laptops, tablets,
printers, keyboards, and other computerized devices.
Features of PAN :
Wired Personal Area Network is created by using the USB and Network cable.
Government agencies use MAN to connect to the citizens and private industries.
In MAN, various LANs are connected to each other through a telephone exchange
line.
The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
A Wide Area Network is widely used in the field of Business, government, and
education.
Advantages of Wide Area Network:
1. Peer-to-Peer Networking:
2. Client-Server Network
Peer-to-Peer Networking:
The primary goal of peer-to-peer networks is to share resources and help computers
and devices work collaboratively, provide specific services, or execute specific
tasks. As mentioned earlier, P2P is used to share all kinds of computing resources
such as processing power, network bandwidth, or disk storage space.
Other key uses of a P2P network include: File sharing: The use of P2P in file
sharing is extremely convenient for businesses. P2P networking can also save you
money with this feature because it eliminates the need to use another intermediate
server to transfer your file.
Peer-to-Peer computer network is a network that relies on computing power at the
edges of a connection, there is no hierarchy among the computers.
Advantages
• Much easier to set up than a client-server network - does not need specialist
knowledge
• Less initial capital – no need for a dedicated server
• No need for system administration (administrator)
Disadvantages
• Ensuring that viruses are not introduced to the network is the responsibility
of each individual user
• Decentralized – no central repository for the files and application.
• Security – does not provide the security available on a client/server
network.
Client-Server Network
In the environment with more than 10 users, a peer to peer network will not
adequate. There need comes to use a dedicated computer which optimized
(increase) the service of network to clients quickly and ensure the security of files.
Therefore, there will be one or more server computers which serve other station
(client) computers to optimized network system. A dedicated computer with
software that carries out some task on behalf of users.
What is Server?
• Centralized – resources and data security are controlled through the server
Scalability – any or all elements can be replaced individually as need
increase.
• Flexibility – new technology can be easily integrated into system
• Interoperability – all components (client/network/server) work together
• Accessibility – server can be accessed remotely and across multiple
platforms.
Disadvantages of server-Based computer networks
- Mail server
- Communication server
- Application server
- Fax server
- Backup Server
Network Topology
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Hybrid Topology
Bus topology
, also known as line topology, is a type of network topology in which all devices in
the network are connected by one central RJ-45 network cable or coaxial cable. The
single cable, where all data is transmitted between devices, is referred to as the bus,
backbone, or trunk.
An example of bus topology is connecting two floors through a single line. Ethernet
networks also use a bus topology. In a bus topology, one computer in the network
works as a server and other computers behave as clients. The purpose of the server
is to exchange data between client computers.
Both ends of the backbone use terminators in order to prevent reflection of signals.
Star Topology
A star network is a local area network (LAN) in which all nodes (workstations or
other devices) are directly connected to a common central Hub or Switch.
Every workstation is indirectly connected to each other through the central Hub or
Switch.
Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination. The hub, switch, or concentrator manages and controls
all functions of the network. It also acts as a repeater for the data flow. This
configuration is common with twisted pair cable; however, it can also be used with
coaxial cable or fiber optic cable.
Advantages of a Star Topology
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node – a
ring. Data travels from node to node, with each node along the way handling every
packet.
A Comparison Table for Advantages and Disadvantages of Ring Topology
Advantages Disadvantages
Difficult to troubleshoot
Mesh Topology
A mesh topology is a network setup where each computer and network device is
interconnected with one another. This topology setup allows for most transmissions
to be distributed even if one of the connections goes down. It is a topology
commonly used for wireless networks.
In a mesh topology, all computers in the network are connected to every other
computer, forming a mesh of connections and each computer makes a point-to-
point connection to every other computer.
Each node (workstation or other device) is connected directly to each of the others.
Some nodes are connected to all the others, but some of the nodes are connected
only to those other nodes with which they exchange the most data.
Advantages
• A mesh network is highly reliable because of redundant multiple paths
between computers.
• The failure of a single computer or a cable fault does not affect network
operations. Computers can be added or removed without affecting the
network. Disadvantages
• It is difficult to install and troubleshoot.
• It is very expensive because of the length of cable required to make multiple
redundant connections.
• Only a limited number of computers can be connected in a mesh topology.
Hybrid Topology
It is combination of any two or more network topologies. These instances can occur
where two basic network topologies, when connected together, can still retain the
basic network character, and therefore not be a hybrid network.
A hybrid topology is a type of network topology that uses two or more differing
network topologies. These topologies can include a mix of bus topology, mesh
topology, ring topology, star topology, and tree topology.
The best cabled network topology for large businesses is the star topology. This is
because it is easier to control from a central console as the management software
just needs to communicate with the switch to get full traffic management features.