Configure Network Peripherals Guide
Configure Network Peripherals Guide
Computer networking refers to interconnected computing devices that can exchange data
and share resources with each other.
Computer networks commonly help endpoint users share resources and communicate.
Advantage of Networking:
Share Documents
Exchange e-mail messages
Live audio and video broadcast
Using one device for many computers like printer
Sharing external memory like Hard disk.
Security.
A computer network is mainly of four types by their geographical coverage:
Home WiFi networks and small business networks are common examples of LANs.
Personal area network (PAN)
PANs can also connect laptops, tablets, printers, keyboards, and other
computerized devices.
Features of PAN :
Low cost, little or No infrastructure setup.
Short range communication.
Small personal network , use anywhere.
Wide range of devices.
Low power consumption.
No complex connectivity.
There are two types of Personal Area Network:
Government agencies use MAN to connect to the citizens and private industries.
In MAN, various LANs are connected to each other through a telephone exchange
line.
The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
c. Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
Cont’s
d. Exchange messages: In a WAN network, messages are transmitted fast. The web
application like Facebook, Whatsapp, Skype allows you to communicate with friends.
e. Sharing of software and resources: In WAN network, we can share the software
and other resources like a hard drive, RAM.
g. High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in turn
increases the productivity of our company.
Disadvantages of Wide Area Network:
a. Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security problem.
b. Needs Firewall & antivirus software: The data is transferred on the internet which can
be changed or hacked by the hackers, so the firewall needs to be used. Some people can
inject the virus in our system so antivirus is needed to protect from such a virus.
c. High Setup cost: An installation cost of the WAN network is high as it involves the
purchasing of routers, switches.
1. Peer-to-Peer Networking
In P2P networking, a group of computers are linked together with equal permissions
and responsibilities for processing data. Unlike traditional client-server networking,
no devices in a P2P network are designated solely to serve or to receive data.
In a peer-to-peer network, computers on the network are equal, with each workstation
providing access to resources and data.
This is a simple type of network where computers are able to communicate with one
another and share what is on or attached to their computer with other users.
Cont’s
The primary goal of peer-to-peer networks is to share resources and help computers
and devices work collaboratively, provide specific services, or execute specific tasks.
As mentioned earlier, P2P is used to share all kinds of computing resources such as
processing power, network bandwidth, or disk storage space.
Other key uses of a P2P network include: File sharing: The use of P2P in file sharing
is extremely convenient for businesses. P2P networking can also save you money with
this feature because it eliminates the need to use another intermediate server to
transfer your file.
Much easier to set up than a client-server network - does not need specialist
knowledge
Less initial capital – no need for a dedicated server
No need for system administration (administrator)
Disadvantages
Ensuring that viruses are not introduced to the network is the responsibility of
each individual user
Decentralized – no central repository for the files and application.
Security – does not provide the security available on a client/server network.
2. Client-Server Network
In the environment with more than 10 users, a peer to peer network will not
adequate. There need comes to use a dedicated computer which optimized
(increase) the service of network to clients quickly and ensure the security of files.
Therefore, there will be one or more server computers which serve other station
(client) computers to optimized network system. A dedicated computer with
software that carries out some task on behalf of users.
What is Server?
Server is a dedicated computer that provide resources to Network users or Client computers.
Centralized – resources and data security are controlled through the server
Scalability – any or all elements can be replaced individually as need increase.
Flexibility – new technology can be easily integrated into system
Interoperability – all components (client/network/server) work together
Accessibility – server can be accessed remotely and across multiple platforms.
Mail server
Communication server
Application server
Fax server
Backup Server
Network Topology
Network topology is the arrangement of the elements of a communication
network. Network topology can be used to define or describe the arrangement of
various types of telecommunication networks, including command and control
radio networks, industrial field busses and computer networks.
a. Bus Topology
b. Star Topology
c. Ring Topology
d. Mesh Topology
e. Hybrid Topology
a. Bus topology
Both ends of the backbone use terminators in order to prevent reflection of signals.
Disadvantages
A star network is a local area network (LAN) in which all nodes (workstations or
other devices) are directly connected to a common central Hub or Switch.
Every workstation is indirectly connected to each other through the central Hub or
Switch.
Data on a star network passes through the hub, switch, or concentrator before
continuing to its destination. The hub, switch, or concentrator manages and controls
all functions of the network. It also acts as a repeater for the data flow. This
configuration is common with twisted pair cable; however, it can also be used with
coaxial cable or fiber optic cable.
Advantages of a Star Topology
Some nodes are connected to all the others, but some of the nodes are connected
only to those other nodes with which they exchange the most data.
Advantages
A mesh network is highly reliable because of redundant multiple paths between
computers.
The failure of a single computer or a cable fault does not affect network
operations.
Computers can be added or removed without affecting the network.
Disadvantages
It is difficult to install and troubleshoot.
It is very expensive because of the length of cable required to make multiple
redundant connections.
Only a limited number of computers can be connected in a mesh topology.
Hybrid Topology
The best cabled network topology for large businesses is the star topology.
This is because it is easier to control from a central console as the
management software just needs to communicate with the switch to get full
traffic management features.
Network Transmission Media
Transmission Media is the physical path between the transmitter and the receiver
in a data communication system.
Transmission Media categorized in two categories:-
1. Wired/Guided
Wire/Guided Transmission Media uses a "cabling" system that guides the data
signals along a specific path. The data signals are bound by the "cabling" system.
Guided Media is also known as Bound Media. Cabling is meant in a generic
sense in the previous sentences and is not meant to be interpreted as copper wire
cabling only.
Cont’s
2. Wireless/Unguided
travel but nothing to guide them along a specific path. The data signals are not bound
b. Coaxial Cable
compatibility.
The oldest, least expensive and most commonly used transmission media.
Two types of twisted-pair cable:-
Unshielded twisted pair (UTP) cables are widely used in the computer and
telecommunications industry as Ethernet cables and telephone wires. In an UTP
cable, conductors which form a single circuit are twisted around each other in
order to cancel out electromagnetic interference (EMI) from external sources.
UTP cables are mostly used for LAN networks. They can be used for voice, low-
speed data, high-speed data, audio and paging systems, and building automation
and control systems. UTP cable can be used in both the horizontal and backbone
cabling subsystems.
Cont’s
Uses a woven copper braid jacket and higher quality protective jacket. Also
uses foil wrap b/n and around the wire pairs
The outer shield protects the inner conductor from outside electrical signals. The
distance between the outer conductor (shield) and inner conductor plus the type of
material used for insulating the inner conductor determine the cable properties or
impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV, 50
ohms for Ethernet Thinnet and Thicknet. The excellent control of the impedance
characteristics of the cable allow higher data rates to be transferred than Twisted Pair
cable.
c. Fiber optic (Optical Fiber)
Optical fiber is the technology associated with data transmission using light pulses travelling along
with a long fiber which is usually made of plastic or glass. Metal wires are preferred for transmission
in optical fiber communication as signals travel with fewer damages. Optical fibers are also unaffected
by electromagnetic interference. The fiber optical cable uses the application of total internal reflection
of light. An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by
a concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is
easier to install, but cannot carry the light pulses for as long a distance as glass.
The basic function of any optical fiber is to guide light, i.e., to act as a dielectric waveguide. Light
injected into one end should stay guided in the fiber. In other words, it must be prevented from getting
lost e.g. by reaching the outer surface and escaping there. We explain this here for glass fibers, but the
operation principle of plastic optical fibers is the same.
In principle, the simplest solution for guiding light would be a homogeneous glass rod. If it is thin
enough, it can also be bent to some degree. The outer surface can reflect light via total internal
reflection. Due to the large refractive index contrast, this works for a considerable range of input beam
angles, and in principle there don't need to be any power losses.
Two types of optical fiber are commonly available:
Single-mode fiber is used for long runs because it can transmit data 50 times
further than multimode fiber and at a faster rate. For example, single-mode fiber
might be used on an organization’s corporate campus between buildings. Single-
mode fiber (SMF), on the other hand, has a small core that allows only a single
light beam to pass. The light transmissions in single-mode fiber pass through the
core in a direct line, like a flashlight beam.
Difference between Single mode and Multimode
Multimode fiber (MMF)
Multimode fiber (MMF) has a larger core than single-mode. This larger core
allows hundreds of light rays to flow through the fiber simultaneously.
The numerous light beams in multimode fiber bounce around inside the core,
inching toward their destination. Because light beams bounce within the core, the
light beams slow down, reduce in strength, and take some time to travel along the
cable. Multimode fiber provides high bandwidth at high speeds over medium
distances (up to about 3000 feet) but can be inconsistent for very long runs.
Cabling system
Three types of Ethernet cables are available
Straight-through cable
Crossover cable
Rolled cable
The straight-through cable is used to connect
Host to switch or hub
Router to switch or hub
The crossover cable can be used to connect
Switch to switch
Hub to hub
Host to host
Hub to switch
Router direct to host
Pc to Pc
Rolled Cable
You can use a rolled Ethernet cable to connect a
host to a router console serial communication
(com) port.
Networking Devices
The network device is one kind of device used to connect devices or computers
together to transfer resources or files like fax machines or printers.
Hub
Switch
Router
Bridge
Gateway
Modem
Repeater
Access Point
HUB
A network hub is a node that broadcasts data to every computer or Ethernet-
based device connected to it. A hub is less sophisticated than a switch, the latter
of which can isolate data transmissions to specific devices. Network hubs are
best suited for small, simple local area network (LAN) environments.
Passive
Active
Intelligent network.
They do not improve the performance of local area networks (LANs), and may
limit maximum media distances. Typically, passive hubs are connected to other
devices in a star configuration.
Switch
Just like a hub and a bridge, a switch is also used to connect multiple devices in a
LAN segment. A switch is the upgraded version of the bridge. Besides providing
all the functionalities of a bridge, it also offers several additional features.
Unlike the generic processors that we use in our PC, ASICs are specialized
processors built only to perform particular tasks. Usually, the ASICs in switches
have a single task and that is switching the frames as fast as they can.
An ASIC occupied switch performs this task blazingly fast. For example, an
entry-level 2960 Catalyst Switch can process 2.7 million frames per second.
Router
A router connects different network segments. It switches data packets between networks that
are either located in different logical segments or constructed with different network-layer
protocols.
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet.
When a router receives a data packet on any of its interfaces, it checks the destination address
of that packet, and based on that destination address, forwards that data packet to the interface
that is associated with the destination address.
To forward data packets to their destination, the router keeps a record of the connected network.
These records are maintained in a database table known as the routing table. Routing tables can
be created statically or dynamically.
The main functions of routers are the following: -
A bridge is used to divide a large network into smaller segments. The basic functions
of a bridge are the following: -
A bridge can connect two different types of media or network architecture, but it
cannot connect two different types of network layer protocols such as TCP/IP or IPX.
It requires the same network-layer protocols across all segments.
There are three types of bridge:-
Local Bridge: - The Bridge directly connects two LAN segments. In Ethernet
implementations, this is known as a transparent bridge. In the Token Ring network,
this is called a source-routed bridge.
Remote Bridge: - This Bridge connects with another Bridge over the WAN link.
Wireless Bridge: - This Bridge connects with another Bridge without using wires. It
uses radio signals for connectivity.
In networking models such as the OSI layers model and TCP/IP model, the
functionalities of Bridges are defined in the physical layer and data link layer.
Just like a Hub, a Bridge is also no longer used in the computer network. Bridges
have been replaced by switches.
Gateway
Gateway is used to forward packets that originate from a local host or a local network and are intended for remote
networks. If a data packet does not get its destination address in the local network then it takes the help of the
gateway device to find the destination address in the remote network. The gateway device knows the path to the
remote destination address. If necessary, it also encapsulates the packet so that it can travel through other networks
to reach its destination address.
Modem
A modem is a device that is used to connect to the Internet. Technically, it is the device that enables digital data to
be transmitted over telecommunication lines.
A Telco company uses entirely different data transmission technology from the technology that a PC uses for data
transmission. A modem understands both technologies. When it receives signals from the PC, it converts them into
the format that the Telco company understands. When it receives signals from the Telco company, it converts them
into a format that the PC understands.
Repeater
Repeaters are usually used to strengthen signals going long distances.
Because the repeater does not check on the contents of the data it receives
or retransmits, frames that are corrupted by noise and other factors can also
be repeated.
The development of the hub replaced the repeater for all practical
purposes, because it performs the same functions, and can include
additional features.
Network Interface Cards (NICs)
NICs are the mechanisms by which computers connect to a
network.
NICs come in all shapes and sizes, and they come in prices to suit
all budgets.
Known as network card, network adapter, and LAN adapter, etc.
When buying one consider
Depending on the size of the network, one or more WAPs may be required.
Additional WAPs are used to allow access to more wireless clients and to
expand the range of the wireless network.
Transceivers
The term transceiver does not necessarily describe a separate network device
but rather an integrated technology embedded in devices.
transceiver = transmitter and a receiver
device that receives data, converts it, and then sends it to another location
can also be used in pairs to insert a fiber segment into copper networks
Firewall
The most common type is used to protect a computer or an entire network from
unauthorized access from the Internet.
can also be used to control the flow of data to and from multiple networks within
the same organization. Firewalls
can be programmed to filter data packets based on the information that is contained
in the packets.
IP Terminology
Bit A bit is one digit, either a 1 or a 0.
Network address This is the designation used in routing to send packets to a remote
network for example, [Link], [Link], and [Link].
Dotted-decimal, as in [Link]
Binary, as in 10101100.00010000.00011110.00111000
Hexadecimal, as in AC.10.1E.38
Three classes of networks
Network Address Range: Class A
0xxxxxxx
00000000 = 0
01111111 = 127
10000000 = 128
10111111 = 191
Network Address Range: Class C
11000000 = 192
11011111 = 223
The addresses between 224 to 255 are reserved for Class D and E networks.
Class D (224–239) is used for multicast addresses and Class E (240–255) for scientific
purposes
Private IP Addresses.
Subnet Masks
A subnet mask is a 32-bit value that allows the recipient of IP packets to
distinguish the network ID portion of the IP address from the host ID portion of
the IP address.
The network administrator creates a 32-bit subnet mask composed of 1s and 0s.
The 1s in the subnet mask represent the positions that refer to the network or
subnet addresses.
Configure security
The Network Security Configuration feature lets apps customize their network
security settings in a safe, declarative configuration file without modifying app
code. These settings can be configured for specific domains and for a specific app.
These devices are ideal targets for malicious cyber actors because most or
all organizational and customer traffic must pass through them.
Configure workstation
Do you have a question ?