0% found this document useful (0 votes)
101 views43 pages

Administrating Network and Hardware TTLM UNIT 1-4

Uploaded by

Tadele Kassa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views43 pages

Administrating Network and Hardware TTLM UNIT 1-4

Uploaded by

Tadele Kassa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 43

Hardware and Network Servicing

Level-II
Based on June 2021, Curriculum Version
1

Module Title: - Administrating Network and Hardware


Peripherals
Module code: EIS HNS2 M04 0322
Nominal duration: 40Hour

Prepared by: JPII


Acronym

List of abbreviation
I/O Input or Output
VDU visual display unit
OS Operating system
HP-UX, AIX Hewlett Packard Unix, Advanced Interactive Executive
Mac OS Macintosh operating system
LAN Local area network
WAN Wide area network
VPN Virtual private network
PSTN public switched telephone network
Ipconfig Internet Protocol Configuration
P2P peer-to-peer
UTP Unshielded twisted-pair
STP Shielded twisted-pair
UTP Unshielded twisted-pair
STP Shielded twisted-pair
ASICs application-specific integrated circuits
ASICs application-specific integrated circuits
VLAN Virtual Local Area Network
CLI command-line interface
GUI Graphical User Interface
HDD or SSD Hard Disk Drive or Solid State Drive
CHKDSK and SFC Check Disk and System File Checker
PDA Personal digital assistant
Introduction to the Module

This module provide you to acquire knowledge of Network devices and hardware
peripherals that allow user interface and networking systems, how to connect
network devices and computer hardware peripherals in general.

This module covers the units:

• Confirm requirements of client


• Obtain required peripherals
• Connect hardware peripherals
• Install peripherals to a network
• Use and maximize operating system
• Administer and support peripheral services
• Maintain peripherals and fix common problems
• Support input and output devices
• Configure peripheral services
Learning Objective of the Module

• Know the client requirements


• Know about network client and its purpose
• Understand remote system administration and available tools.
• Understand Operating system initialization
• To use the OS and to maximize skills
• To know the way of maintenance
• To support I/O devices
• Know how configuration of peripherals
Module Instruction

For effective use this modules trainees are expected to follow the following module
instruction:

• Read the specific objectives of this Learning Guide.


• Read the information that this module contain.
• Complete the Self-check.
• Submit your accomplished Self-check.
• Do the Operations which in the module.
• Do the LAP test in page (if you are ready) and show your output to your
teacher.
*Your teacher will assess your result either satisfactory or unsatisfactory. If
unsatisfactory, your teacher shall advice you on additional work. But if satisfactory
you can proceed to the next topic.
Unit one: Confirm requirements of client

This unit is developed to provide you the necessary information regarding the following content
coverage and topics:

• Client peripheral requirements

• Client requirements and peripherals

• Client requirements

• Client support expectations

This unit will also support you to accomplish the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:

• Classify and verify client peripherals requirements.

• Identify Client requirements and peripherals


• explain Client requirements

• Identify Client support expectations

1.1. Confirm requirements of client


Peripheral are the devices that are attached to the computer’s system unit rear or
front side.

Computer peripherals grouped into

A. I/O (Input or
output), B.
Communications
devices and
C. Secondary storage devices.

1.2. Client requirements


Clients and customers may include but not limited to:

• Internal departments
• External organizations
• Individual people
• Employee

1.3. Client requirements and peripherals


Network equipment should be included but not limited to:-

• LAN
• WAN
• VPN
• The internet
• The use of the PSTN for dial-up modems only  Private lines  Data and
voice.  Workstations
• Personal computers
Modems or other connectivity devices

• Printers
• Hard drives
• Monitors
• Switches
 Hubs
• Personal digital assistant (PDA)
• Other peripheral devices
• Software may included:-
• May include but is not limited to commercial,
• Domestic
• Packaged or adapted software.
Consumables may include:-

Consumables are goods used by individuals and businesses that must be replaced
regularly because they wear out or are used up. They can also be defined as the
components of an end product that is used up or permanently altered in the process
of manufacturing such as semiconductor wafers and basic chemicals.
• ink cartridges
• toner cartridges
• Ribbons
• floppy disks
• CD-RW
Operational Health and Safety (OHS) standards may include:

• Correct posture
• Lighting
• Type of desk
• Type of monitor
• Style of chair
• Typing position
• Repetitive strain injury prevention
• Ventilation
• Light position
• Correct lifting method
• Length of time in front of computer
• Network operating system
May include but is not limited to Novell NetWare 5 or above or any operating
system that has multi-user ability, Linux, Mac OS, Windows 7 or above.

Tools and Equipment

• Hardware peripherals and workstation


• Live network
• Cables
• Network operating system
• Soft wares
• Toolkit
• Cable tester
• Printer (laser printers and ink jet printers[mono or colored])  Command
line tools may include:
• Ping Localhost (127.0.0.1)
• Ipconfig
• Ipconfig/all
• Ping
Self check test-1.
Name: _____________________________ IDNo_________ Date:
___________________

Time started: ____________ Time finished: ________________

Instruction:-Read all questions which given below and you to answer the correct one.(2
points each)

1. Follow Operational Health Safety (OH&S) guideline is not important at


workplace.
A. True B. False
2. Warranty is not important to know what kind of support services are
offered by the prospective supplier.
A. True B. False
3. From the following one is used to control the movement of cursor.
A. keyboard B. Mouse C. Printer D. None

3. All peripheral devices are Input devices.


A. True B. False

4. Which one of the following Input devices that help to write or enter the
letters and numbers in to your computer?
A. Keyboard B. Printer C. Monitor Mouse

5. From the given alternatives One is output device


A. Monitor B. Printer C. Projector D. All are answers

Instruction: Match column A with column B.


Column A Column B
6. Operational Health and Safety A. Modem

7. Clients B. input or output devices

8. Connectivity devices C. Internal departments

9. Peripherals D. Correct posture

Instruction: Say true or false

10. Output peripherals are show the product or display result of input.
11. Keyboard and mouse are not input peripherals
12. Communication devices are produce sounds capture pictures.

0peration sheet-1
Start up your computer

Step 1:- Connect the power cables on the system unit and monitor.

Step 2:-Connect hardware peripherals to the computer on the back side front side.

Step 3:- Boot you Computer.


Lap test 1
Instruction: Answer all the questions listed below, if you have some clarifications –
feel free to ask your teacher.

Identify the following


1. Operating System
_________________________________________________________________
_______
_________________________________________________________________
_______
________________________________________________________________________
________________________________________________________________________
_________________________________________________________________
_______
2. Client
_____________________________________________________________
___________
_____________________________________________________________
___________
________________________________________________________________________
________________________________________________________________________
_____________________________________________________________
___________
3. Equipment
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_____________________________________________________________
___________
_____________________________________________________________
___________
_____________________________________________________________
___________
4. OHS
_____________________________________________________________
___________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
_____________________________________________________________
___________

Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory,
your teacher shall advice you on additional work. But if satisfactory, you can proceed to the
next topic.
Unit Two: Obtain required peripheral
This Unit is developed to provide you the necessary information regarding the following
content coverage and topics

• Obtaining peripheral

• Verifying client requirement

• Equipment inventory Verification


This guide will also assist you to attain the learning outcome stated in the cover page.

Specifically, upon completion of this Learning Guide, you will be able to

• Verify obtaining peripherals

• Explain equipment inventory

• Identify and Verify client requirements

2.1. Obtaining peripheral


The first step in obtaining a peripheral device is to put suppliers of that device.
Then, there are factors you need to consider about the supplier and the devices on
offer, such as support provided and purchase price. This will help you to compare
and choose the most appropriate supplier and the exact model of the device
according to client requirements. Finally, you are ready to place an order for your
organization or client to purchase the device.

2.2. Verifying client requirement

Locating the supplier

There are many ways to find a supplier of peripheral equipment. Some

ways include: i. Searching the Internet

The Internet provides different methods for searching for suppliers. Using search
engines such as Google or Yahoo can help you find a hardware supplier anywhere
in the world. Suppliers will often have their own websites that can provide you with
catalogues of available equipment. Other ways to investigate suppliers are to follow
links from a website such as a manufacturer’s website, or to browse website
directories that may be linked to search engine home pages. ii. Telephone directory

A telephone directory is useful if you need to find a hardware supplier located


within your local area. iii. PC magazines

Computing magazines often contain a large section devoted to advertising current


hardware suppliers. iv. Brochures/advertising material

Many larger hardware suppliers use television, radio or leaflet deliveries to inform
potential customers of their latest hardware.

v. Newspapers

Major newspapers have computer/IT sections or classified advertisements which


can be a source for finding suppliers.
Contacting the manufacturer directly

Manufacturers generally have their own websites. These may list major suppliers in
your area. Emailing or telephoning the manufacturer may also be a way to find out
names of local suppliers. vi. Choosing supplier
With so many choices of suppliers available, how do you find the right one? There
are a few factors to consider: vii. Selecting a peripheral

Once you have selected suitable suppliers you need to contact each supplier.
Information you should find out from the supplier includes:

Model and manufacturer names of peripherals that will satisfy the majority of your
clients requirements (including system specifications, physical dimensions,
support)

You may find it helpful to keep a record of any details that you collect so you refer
to this information quickly and easily. viii. Placing the order

Before an order is submitted, it could also be necessary to obtain final approval


from senior staff. Often an order form might require signatures from the manager or
supervisor before it can be processed. A purchasing department might require
written quotes from three suppliers, a recommendation and justification for the
chosen supplier. Make sure that you find out from your supervisor or manager what
procedures you need to follow when placing an order within your organization. ix.
Sample order form

From ________________________

Date ________________________
Quantity Description Price Supplier: name and telephone
Code

Total price

Delivery point ________________________________

Budget holder’s signature

________________________________ Please come back to the

Purchasing Department_________________________
2.3. Equipment inventory verification

Hardware inventory provides a simple way of finding basic information about your
installed hardware. Hardware includes processors, memory, serial ports, parallel
ports, power supplies, fans, graphics adapters, network adapters.

Hardware inventory organization means keeping a count of every piece of IT


hardware within an inventory database and asset repository. Having solid hardware
inventory organization helps you keep track of your assets, upgrade your inventory
when needed, and avoid theft or losses.

Computer inventory management is a set of best practices used to keep track of


computers within a systems environment, and it can include information about the
following: Files, directories, and storage devices. Hardware inventory provides you
with important information, such as the configuration and location of computers,
which computers require an operating system upgrade, and which computers have
the hardware that is required for a software upgrade.

Details that should be included within a hardware inventory include:

Description of hardware device Serial number


Manufacturer Warranty or maintenance conditions
Supplier Components
Model number Location
Number and identity of authorized users Purchase price
Date of purchase

Storing peripherals

Peripheral devices need to be located in a suitable environment — otherwise there


may be potential problems. It is a good idea to refer to the manufacturer’s manual
to determine what guidelines should be followed.

When storing peripherals it is important to:

• Make sure equipment is kept in ideal working conditions


• Adhere to current Occupational Health and Safety guidelines  Ensure the
electrical safety of the device  Consider security of the device.
• Keeping equipment in ideal working conditions
Each manufacturer will have their own recommendations on how to store their
peripheral equipment. In order to guarantee that a peripheral will function correctly
throughout its life it is important to follow guidelines that have been recommended
by the manufacturer. Some common recommendations may include:

Keep equipment in the correct position — After unpacking, most devices will
usually have a proper resting position. If a device is not kept in its natural position,
there could be problems when trying to operate the device later on. For example,
when a printer is stored in a vertical position, components such as the ink cartridges
could leak or be dislodged.

Keep equipment away from weather, dust and other harmful material — When
finding a storage location, consider what kind of elements the device may be
subjected to. If, for example, you store a USB drive in a cabinet next to chalk, dust
from the chalk could potentially damage the storage device’s USB connection.

Do not expose equipment to extreme temperatures and high humidity — Sudden


changes in temperature can cause condensation in many peripheral devices. For
instance, if a video camera is taken from a cold place to a warm place, condensation
may form on the lens and internal parts.

Avoid storing the device in direct sunlight — Exposure to direct sunlight could
damage many of the external components of a device as well as subject the device
to high temperatures.

Do not expose equipment to water or moisture — If water gets inside many


peripheral devices there is a risk of electric shock.

When positioning peripherals in their permanent locations it is important to take


into account many OH&S considerations as follows.
A. Positioning of the monitor

It is essential to position a monitor correctly to ensure it will suit the needs of the
user. Tips include:

Try to make sure that monitor is in a position away from the glare of sunlight.

Check that the brightness and contrast controls of the screen have been adjusted to
suit lighting conditions in the room.

The top of the screen should be the same level as the user’s eye level.

A. Positioning of other equipment


Some general Occupational Health and safety guidelines to consider when
positioning other peripheral equipment are:

Make sure that you can reach the peripheral device and its components without
having to strain your back.

Place equipment such as scanners and printers at a suitable height so a user is easily
able to reach paper trays, open scanner lids, etc.

Make sure that equipment such as speakers is easily accessible if settings such as
volume control need to be changed.

B. Ensuring electrical safety

Some tips to ensure electrical safety are:

Do not be tempted to add too many extension cables or double socket adapters to
your existing electrical sockets.

C. Never use damaged plugs or leads.

If possible, ask an electrician to check the safety of your system.

Position electrical leads where they will not cause tripping hazards to people.

D. Physical security of devices

In many situations it is important to consider the physical security of the peripheral


devices. Some devices, such as digital cameras, data projectors and USB drives,
may not be permanently connected to a computer so it will be necessary to find a
secure location to store the device. Make sure that these kinds of devices are
secured in a lockable storage cupboard, cabinet or safe when not required. Some
organizations install security devices onto desks to guarantee that computers are
secure and will not be able to be taken from their position unless unlocked.

Storing consumables

The term ―consumables‖ are a product that is used once and then replaced by
others

Example they include:-

Paper, CD or DVD and printer cartridge. These needs to placed at safe and dry

environment i. Paper
Paper needs to be stored in an area which is cool and dry, to prevent moisture from
fusing pages together.

ii. Ink cartridges and toner

Make sure to store cartridges/toner in a cool dry place, away from sparks and open
flames, with adequate ventilation and do not expose the device to high
temperatures. Also ensure that the cartridges are not taken out of their packaging
until they will be used within the printer, as the ink will dry out before use.

When possible, make sure that CDs are kept in their protective case, to minimize
the chances of being scratched. Also keep them out of direct sunlight and extreme
temperatures.
Self check test:-2
Name: _____________________________ IDNo_________ Date:
___________________

Time started: ____________ Time finished: ________________

Instruction: Read the following questions bellow by writing True or False

2. Locating or placing hardware peripheral at suitable environment is not


important.
3. Digital cameras, data projectors and USB drives are not security devices.
4. Check that the brightness and contrast controls of the screen have been
adjusted to suit lighting conditions in the room.
5. When you use damaged plugs, your computer may be damaged immediately.
6. All consumables are used once and replaced by other.
Instruction: Choice
7. If you placing any kind of consumables direct to sunlight or on the wet place
it may________
A. Damaged B. it may reduce its quality C. A & B
D. No answer
8. ____________ is a way of recording and counting hardware or software in
simple manner.
A. Inventory B. Audit C. data capture D.
All
9. From the following questions one is the way to find a supplier of peripheral
equipment.
A. Searching of internet B. Newspaper C. Telephone
directory D. All 10. Which one of the following is not consumables.
A. Paper B. Ink cartridges and toner C. DVD and CD D. None
Instruction: Match column A with Column B
Column A Column B
1. Physical security of devices A. keeping a count of every piece of IT
2. Hardware inventory B. Never use damaged plugs or leads
3. Ensuring electrical safety C. Cupboard, cabinet box
4. Proper resting position D. Locating a supplier
5. Brochures/advertising materials E. Keep equipment in the correct
position

Operation sheet 2
Documenting peripherals used with each computer

If the peripheral is an essential part of the computer system (for example mouse,
keyboard or monitor) it is logical to record information about the device within the
documentation for the computer to which it is connected. Individual computer
inventories will often contain detailed information about the computer’s related
hardware and software. It may also be more practical to record information about
the peripheral inside the computer’s record, if the device is also permanently
connected to a computer (for example a printer or scanner).

Example of Hardware inventory

Manufacturer: Dell
Model: OptiPlex GX280MT Monitor: Dell UltraSharp
Minitower—Power 1905FP flat panel, Operating
System: Windows XP Printer: HP LaserJet IID
Serial number: 12345 Keyboard: Dell USB keyboard
RAM: 128 Mb Pointing device: Dell USB 2-button

optical mouse with


scroll
Hard disk space: 160 Gb

If the device is shared between several computers, it makes more sense to keep
information about the peripheral as an individual entry in an inventory. Devices
such as digital cameras, data projectors and USB drives would more likely to be
used by many computers, thus it would make more sense to record their details
separate to the computer details.

Below is a sample checklist for a typical inkjet printer.

• printer
• cartridge
• power cable
• USB cable
• sample paper
• feeding device
• CD driver
Be attentive when unpacking a peripheral device — handle the packaging and
contents with care, as you do not want to damage your new device. Remove any
packing material surrounding and also within the device. Some printers, for
example, have soft foam and plastic pieces inside the device to ensure that parts are
locked into the correct position. Make sure that you remove these pieces and foam
before installation.

Lap test 2
Name: _____________________________ IDNo _____________Level
____________

Time started: ________________________ Time finished: ________________

Instructions: You are required to perform the following individually with the
presence of your teacher.

1. Start up your computer


2. Open Ms Excel
Write the form given bellow placing an order of peripherals in your word.

From
______________________
__ Date
______________________
__
Quantity Description Price Supplier: name and telephone
Code

Total price

Delivery point ________________________________

Budget holder’s signature

________________________________ Please come back to the

Purchasing Department_________________________
Unit Three: Connect hardware peripherals

This unit is developed to provide you the necessary information regarding the following content
coverage and topics

• Schedule hardware installation time

• Remove old peripherals

• Connect the new peripherals

• Test peripherals
This guide will also assist you to attain the learning outcome stated in the cover page.

Specifically, upon completion of this Learning Guide, you will be able to:

• Schedule installation time

• Explain removing old peripherals

• Explain connecting the new peripherals

• Identify configuration of a computer with the new peripherals

• Test peripherals
3.1. Schedule hardware installation time

Installation (or setup) of a computer program (including device drivers and plug-in),
is the act of making the program ready for execution. Installation refers to the
particular configuration of a software or hardware with a view to making it usable
with the computer.
Thorough planning ensures that you have everything to meet all the prerequisites for the
successful setup and installation of the system. Planning minimizes errors during
installation and enables a quicker upgrade or installation.
Guidelines for hardware/software installation plan. Burn-in means to configure the hardware and run
it for some period of time, usually 24-72 hours.

3.2. Remove old peripherals

Open the My Computer window, right-click on the peripheral device (usually labeled
Removable Disk) and select Eject from the contextual menu. open the My Computer
window, select the peripheral device (usually labeled Removable Disk) and then select Eject
this Disk from the Common Tasks pane of the window.
To remove a piece of hardware or peripheral from your computer, use these
steps:
1. Open Settings.
2. Click on Devices.
3. Click on Bluetooth & other devices.
4. Select the device that you no longer need.
5. Click the Remove device button.
6. Click View tab and select Show hidden devices.
7. Expand the branches in the device tree & look for the faded icons.
8. These indicate unused device drivers.
9. Right-click on it and select Uninstall.

How do I get my external keyboard off?

Just plug it into your laptop, either into the keyboard port or a USB port, whichever
is available. You can start using the keyboard the second it's plugged in. Note that
adding an external keyboard often doesn't disable the laptop's internal keyboard.
You can use both!

Should you delete old drivers?


It is generally not recommended to uninstall GPU drivers solely through the
operating system, as the process may leave some residual files and folders that can
still cause conflicts.
Clean Unplugged Data once a device plugged into your computer, there will be
some space available for it to release or save files. After unplugging, some data of
the device may leave on your computer to occupy some space, Driver Booster can
clean these unplugged data conveniently and thoroughly to spare more space.
Perform the following steps in the Device Manager window that appears:
1. Select View > Show Hidden Devices.
2. Expand the Network Adapters list.
3. Uninstall ALL of the grayed out network adapters (there will likely be
several; do NOT delete drivers).
4. Uninstall any unknown devices.
5. Leave the other network devices alone.
How do I remove old Nic from registry?
Right-click the network adapter interface name (the long alphanumeric string) in
the Windows Registry and select Delete.

3.3. Connect the new peripherals

Peripheral devices can be connected to your computer via USB port, serial port,
parallel port, specialized network card, or Ethernet network. Local area
networks (LANs) commonly use Ethernet networks for machine connection.

What is a new peripheral device?

Peripheral device, also known as peripheral, computer peripheral, input-output


device, or input/output device, any of various devices (including sensors) used to
enter information and instructions into a computer for storage or processing and to
deliver the processed data to a human operator.

The most common peripherals are a printer, scanner, keyboard, mouse, tape
device, microphone, and external modem that
are externally connected to the computer.

3.4. Test peripherals

A test procedure is a formal specification of test cases to be applied to one or more


target program modules. Test procedures are executable. A process called the
VERIFIER applies a test procedure to its target modules and produces an exception
report indicating which test cases, if any, failed. Simply right-click on the Windows
button in the bottom-left corner of your screen, and then click System. In the
window that opens, look near the middle for Device specifications. That's where
you'll find the Device name, Processor, Installed RAM, and other information.

A typical hardware testing process


1. Create a testing environment (e.g., measurement hardware, test software,
cabling, fixtures, etc.)
2. Place part into the condition needed for the measurement (apply pressure,
voltage, temperature, etc.)
3. Take some measurements.
4. Put those measurements through one or more pass/fail criteria.

Use the device troubleshooter to diagnose and resolve the issue.


1. Open Settings.
2. Click on Update & Security.
3. Click on Troubleshoot.
4. Select the troubleshoot that matches the hardware with the problem.
5. Click the Run the troubleshooter button.

Self check test 3.


Name __________________________________ IDNo ______________ Level
____________
Start time ___________________ Finishing time _______________________

Instruction :- Say true or false

1. Installation refers to the particular configuration of a software only.


2. A test procedure is a formal specification of test cases to be applied
to one or more target program modules.
3. When you install a new hardware peripherals you never remove the
old one.

Instruction: Write a short answer.


1. List down steps To remove a piece of hardware or peripheral from your
computer?
a. __________
______________________
b. __________
______________________
c. __________
______________________
d. __________
______________________
e. __________
______________________
f. __________
______________________
g. __________
______________________
h. __________
______________________
i. __________
______________________ 2. What is test
procedure means?
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
___________________________________________________________

Instruction: Match the following columns

Column A Column B
1. Installation A. Measuring hardware
2. Test peripherals B. Configuring hardware or
software
3. Input/output C. Peripherals

Unit Four:-Install and Configure peripherals to a network

This unit is developed to provide you the necessary information regarding the following content
coverage and topics

• Connect peripherals to the network

• Configure security

• Configure workstation
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:

• Meaningful names are used for peripherals and control queues

• How to install software and manage peripherals

• How to Allow access and security for users

• Test the cable correction and operation based on organizational requirement.

• How to locate peripherals its proper place

• How to connect peripherals to the network


4.1. Connect peripherals to the network

Computer networking refers to interconnected computing devices that can


exchange data and share resources with each other. These networked devices use a
system of rules, called communications protocols, to transmit information over
physical or wireless technologies.

A computer network is a set of computers sharing resources located on or provided


by network nodes. The computers use common communication protocols over
digital interconnections to communicate with each other.

A computer network, also referred to as a data network, is a series of


interconnected nodes that can transmit, receive and exchange data, voice and video
traffic. Examples of nodes in a network include servers or modems. Computer
networks commonly help endpoint users share resources and communicate.

Advantage of Networking:

 Share Documents
 Exchange e-mail messages
 Live audio and video broadcast
 Using one device for many computers like printer  Sharing external
memory like Hard disk.  Security.

A computer network is mainly of four types by their geographical coverage:

1. LAN(Local Area Network)


2. PAN(Personal Area Network)
3. MAN(Metropolitan Area Network)
4. WAN(Wide Area Network)
LAN(Local Area Network)

A local area network (LAN) is a collection of devices connected together in one


physical location, such as a building, office, or home.

LAN stands for local area network. A network is a group of two or more connected
computers, and a LAN is a network contained within a small geographic area,
usually within the same building. Home WiFi networks and small business
networks are common examples of LANs.

Personal area network (PAN)

A personal area network (PAN) is a computer network for interconnecting


electronic devices within an individual person's workspace. A PAN provides data
transmission among devices such as computers, smart phones, tablets and personal
digital assistants.

One of the most common real-world examples of a PAN is the connection between
a Bluetooth earpiece and a Smartphone. PANs can also connect laptops, tablets,
printers, keyboards, and other computerized devices.

Features of PAN :

 Low cost, little or No infrastructure setup.


 Short range communication.
 Small personal network , use anywhere.
 Wide range of devices.
 Low power consumption.
 No complex connectivity.
There are two types of Personal Area Network:

• Wired Personal Area Network


• Wireless Personal Area Network
Wireless Personal Area Network:

Wireless Personal Area Network is developed by simply using wireless


technologies such as WiFi, Bluetooth. It is a low range network.

Wired Personal Area Network:

Wired Personal Area Network is created by using the USB and Network cable.

MAN (Metropolitan Area Network)

A metropolitan area network is a network that covers a larger geographic area by


interconnecting a different LAN to form a larger network.

Government agencies use MAN to connect to the citizens and private industries.

In MAN, various LANs are connected to each other through a telephone exchange
line.

The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.

• It has a higher range than Local Area Network(LAN).


Uses Of Metropolitan Area Network:

• MAN is used in communication between the banks in a city.


• It can be used in an Airline Reservation.
• It can be used in a college within a city.
• It can also be used for communication in the military.
WAN (Wide Area Network)

A Wide Area Network is a network that extends over a large geographical area
such as states or countries.

A Wide Area Network is quite bigger network than the LAN.

A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.

The internet is one of the biggest WAN in the world.

A Wide Area Network is widely used in the field of Business, government, and
education.
Advantages of Wide Area Network:

Following are the advantages of the Wide Area Network:

a. Geographical area: A Wide Area Network provides a large geographical


area. Suppose if the branch of our office is in a different city then we can
connect with them through WAN. The internet provides a leased line
through which we can connect with another branch.
b. Centralized data: In case of WAN network, data is centralized. Therefore,
we do not need to buy the emails, files or back up servers.
c. Get updated files: Software companies work on the live server. Therefore,
the programmers get the updated files within seconds.
d. Exchange messages: In a WAN network, messages are transmitted fast.
The web application like Facebook, Whatsapp, Skype allows you to
communicate with friends.
e. Sharing of software and resources: In WAN network, we can share the
software and other resources like a hard drive, RAM.
f. Global business: We can do the business over the internet globally.
g. High bandwidth: If we use the leased lines for our company then this gives
the high bandwidth. The high bandwidth increases the data transfer rate
which in turn increases the productivity of our company.

Disadvantages of Wide Area Network:

The following are the disadvantages of the Wide Area Network:

a. Security issue: A WAN network has more security issues as compared to


LAN and MAN network as all the technologies are combined together that
creates the security problem.
b. Needs Firewall & antivirus software: The data is transferred on the
internet which can be changed or hacked by the hackers, so the firewall
needs to be used. Some people can inject the virus in our system so antivirus
is needed to protect from such a virus.
c. High Setup cost: An installation cost of the WAN network is high as it
involves the purchasing of routers, switches.
d. Troubleshooting problems: It covers a large area so fixing the problem is
difficult.

Category of computer Network by its Functional Relationship:

1. Peer-to-Peer Networking:
2. Client-Server Network

Peer-to-Peer Networking:

In peer-to-peer (P2P) networking, a group of computers are linked together with


equal permissions and responsibilities for processing data. Unlike traditional client-
server networking, no devices in a P2P network are designated solely to serve or to
receive data.

In a peer-to-peer network, computers on the network are equal, with each


workstation providing access to resources and data. This is a simple type of
network where computers are able to communicate with one another and share
what is on or attached to their computer with other users.

The primary goal of peer-to-peer networks is to share resources and help computers
and devices work collaboratively, provide specific services, or execute specific
tasks. As mentioned earlier, P2P is used to share all kinds of computing resources
such as processing power, network bandwidth, or disk storage space.

Other key uses of a P2P network include: File sharing: The use of P2P in file
sharing is extremely convenient for businesses. P2P networking can also save you
money with this feature because it eliminates the need to use another intermediate
server to transfer your file.
Peer-to-Peer computer network is a network that relies on computing power at the
edges of a connection, there is no hierarchy among the computers.

Advantages

• Much easier to set up than a client-server network - does not need specialist
knowledge
• Less initial capital – no need for a dedicated server
• No need for system administration (administrator)
Disadvantages

• Ensuring that viruses are not introduced to the network is the responsibility
of each individual user
• Decentralized – no central repository for the files and application.
• Security – does not provide the security available on a client/server
network.
Client-Server Network

In the environment with more than 10 users, a peer to peer network will not
adequate. There need comes to use a dedicated computer which optimized
(increase) the service of network to clients quickly and ensure the security of files.
Therefore, there will be one or more server computers which serve other station
(client) computers to optimized network system. A dedicated computer with
software that carries out some task on behalf of users.

What is Server?

Server is a dedicated computer that provide resources to Network users or Client


computers.

Advantages of server-based network

• Centralized – resources and data security are controlled through the server 
Scalability – any or all elements can be replaced individually as need
increase.
• Flexibility – new technology can be easily integrated into system
• Interoperability – all components (client/network/server) work together
• Accessibility – server can be accessed remotely and across multiple
platforms.
Disadvantages of server-Based computer networks

• Expensive – requires initial investment in dedicated server


• Maintenance – large networks will require a staff to ensure efficient
operations  Dependence- when a server goes down, operations will cease
across the network.
• Server may fail- incase the server failed, the entire network goes down
Types of Server:

- File and Printer server

- Mail server

- Communication server

- Directory service server

- Application server

- Fax server

- Backup Server

Network Topology

Network topology is the arrangement of the elements of a communication network.


Network topology can be used to define or describe the arrangement of various
types of telecommunication networks, including command and control radio
networks, industrial field busses and computer networks.

Network topology is the topological structure of a network and may be depicted


physically or logically.

The term topology, or more specifically, network topology, refers to the


arrangement or physical layout of computers, cables, and other components on the
network. ―Topology‖ is the standard term that most network professionals use
when they refer to the network’s basic design. In addition, the term ―topology‖
you will find several other terms that are used to define a network’s:

Physical design network diagram/Map

1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology
5. Hybrid Topology

Bus topology

, also known as line topology, is a type of network topology in which all devices in
the network are connected by one central RJ-45 network cable or coaxial cable. The
single cable, where all data is transmitted between devices, is referred to as the bus,
backbone, or trunk.

An example of bus topology is connecting two floors through a single line. Ethernet
networks also use a bus topology. In a bus topology, one computer in the network
works as a server and other computers behave as clients. The purpose of the server
is to exchange data between client computers.

It is often referred to as a ―linear bus‖ because the computers are connected in a


straight line. This is the simplest and most common method of networking
computers.

In a bus topology, all computers are connected to a shared communication line,


called a trunk or a backbone.

The computers are connected to the backbone using T-connectors.

Both ends of the backbone use terminators in order to prevent reflection of signals.

If the terminator is missing or is deliberately removed, the data transmissions are


disrupted.

There is no central device or any special configuration.


Advantages

• A bus network is the cheapest of all topologies.


• No special configuration is required.
• It is easy to install, and no special equipment is  needed for installation.
• It needs less cable length than do other topologies.
Disadvantages

1. A break in cable or a missing terminator can


2. bring down the entire network.
3. It is not possible to add or remove computers
4. without disrupting the network.
5. It is difficult to troubleshoot and administer.
6. Addition of more computers degrades performance.

Star Topology

Star topology is a network topology in which each network component is


physically connected to a central node such as a router, hub or switch. In a star
topology, the central hub acts like a server and the connecting nodes act like clients.

A star network is a local area network (LAN) in which all nodes (workstations or
other devices) are directly connected to a common central Hub or Switch.

Every workstation is indirectly connected to each other through the central Hub or
Switch.

Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination. The hub, switch, or concentrator manages and controls
all functions of the network. It also acts as a repeater for the data flow. This
configuration is common with twisted pair cable; however, it can also be used with
coaxial cable or fiber optic cable.
Advantages of a Star Topology

• Easy to install and wire.


• No disruptions to the network when connecting or removing devices. 
Easy to detect faults and to remove parts.
Disadvantages of a Star Topology

• Requires more cable length than a linear topology.


• If the hub, switch, or concentrator fails, nodes attached are disabled.
• More expensive than linear bus topologies because of the cost of the hubs,
etc.
Ring topology

Ring topology is a type of network topology in which each device is connected to


two other devices on either side via an RJ-45 cable or coaxial cable. This forms a
circular ring of connected devices which gives it its name. Data is commonly
transferred in one direction along the ring, known as a unidirectional ring.

A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node – a
ring. Data travels from node to node, with each node along the way handling every
packet.
A Comparison Table for Advantages and Disadvantages of Ring Topology
Advantages Disadvantages

Fast Execution Quite Expensive

Better Administration Slow Activity Rate

Straightforward Adaptability Unprotected use


Easy to install

Need for Hardiness

Break in a cable /fault computer can bring slow down


entire network

Difficult to troubleshoot
Mesh Topology

A mesh topology is a network setup where each computer and network device is
interconnected with one another. This topology setup allows for most transmissions
to be distributed even if one of the connections goes down. It is a topology
commonly used for wireless networks.

In a mesh topology, all computers in the network are connected to every other
computer, forming a mesh of connections and each computer makes a point-to-
point connection to every other computer.

There are two types of mesh topology

Full mesh topology

Each node (workstation or other device) is connected directly to each of the others.

Partial mesh topology

Some nodes are connected to all the others, but some of the nodes are connected
only to those other nodes with which they exchange the most data.

Advantages
• A mesh network is highly reliable because of redundant multiple paths
between computers.
• The failure of a single computer or a cable fault does not affect network
operations.  Computers can be added or removed without affecting the
network. Disadvantages
• It is difficult to install and troubleshoot.
• It is very expensive because of the length of cable required to make multiple
redundant connections.
• Only a limited number of computers can be connected in a mesh topology.
Hybrid Topology

It is combination of any two or more network topologies. These instances can occur
where two basic network topologies, when connected together, can still retain the
basic network character, and therefore not be a hybrid network.

A hybrid topology is a type of network topology that uses two or more differing
network topologies. These topologies can include a mix of bus topology, mesh
topology, ring topology, star topology, and tree topology.

Advantages of Hybrid Topology

• Used for a vast network


• Reliable to use
• Any topology can be combined to make a new network
• Scalable and very effective
Disadvantages of Hybrid Topology

• Costly very expensive


• Difficult to install
• Need more Hardware requirements
• Cable failure
Some of the major applications of the hybrid topology are the financial and banking
sector, automated industries, multi-national companies, research organizations, and
many educational institutions.

The best cabled network topology for large businesses is the star topology. This is
because it is easier to control from a central console as the management software
just needs to communicate with the switch to get full traffic management features.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy