Académique Documents
Professionnel Documents
Culture Documents
Student’s Name:
Course / Session:
Class Schedule:
Term:
1
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Table of Contents
Lecture Module
1. Introduction to Communication and Networks -------------------------------------------------------------------------- 3
2. LAN Topologies ----------------------------------------------------------------------------------------------------------- 8
3. Network Connectivity Devices ------------------------------------------------------------------------------------------- 11
4. Network Protocols and Standards ---------------------------------------------------------------------------------------- 17
5. Computer Operating System ---------------------------------------------------------------------------------------------- 20
6. Network / Transmission Media ------------------------------------------------------------------------------------------- 21
7. Network Cable Construction ------------------------------------------------------------------------------------------- 25
8. 7 Layers of OSI Model & IP Addressing ------------------------------------------------------------------------------ 28
9. P2P Connection ------------------------------------------------------------------------------------------------------------ 33
10. File and Printer Sharing --------------------------------------------------------------------------------------------------- 36
Activity
1. Constructing Ethernet Cable --------------------------------------------------------------------------------------------- 37
2. P2P Connection ------------------------------------------------------------------------------------------------------------ 38
3. File & Printer Sharing ----------------------------------------------------------------------------------------------------- 39
Quizzes
#1 ----------------------------------------------------------------------------------------------------------------------------- 40
#2 ----------------------------------------------------------------------------------------------------------------------------- 41
#3 ----------------------------------------------------------------------------------------------------------------------------- 42
#4 ----------------------------------------------------------------------------------------------------------------------------- 43
#5 ----------------------------------------------------------------------------------------------------------------------------- 44
#6 ----------------------------------------------------------------------------------------------------------------------------- 45
#7 ----------------------------------------------------------------------------------------------------------------------------- 46
#8 ----------------------------------------------------------------------------------------------------------------------------- 47
#9 ----------------------------------------------------------------------------------------------------------------------------- 48
# 10 ----------------------------------------------------------------------------------------------------------------------------- 49
# 11 ----------------------------------------------------------------------------------------------------------------------------- 50
# 12 ----------------------------------------------------------------------------------------------------------------------------- 51
# 13 ----------------------------------------------------------------------------------------------------------------------------- 52
# 14 ----------------------------------------------------------------------------------------------------------------------------- 53
# 15 ----------------------------------------------------------------------------------------------------------------------------- 54
2
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 1:
Introduction to Communication and Networks
1.1. Communication
Communication – describes a process in which two or more computer or devices transferring data, instructions, and
information.
Data – considered as the input of a system; also called unprocessed information
Instruction – set of process or method used in transforming data into a meaningful information
Information – considered as the output of a system; also called processed data
Communication Paradigm
The first public telephone exchange was opened in the U.S. in 1878 and operators were used to connect subscribers.
Strowger invented the automatic exchange (switch) in 1891 and this system remained in use until the 1960s when crossbar
switches were introduced. The connection between two exchanges is called a trunk and trunk switches in each exchange
route calls. The connection between a subscriber and the local exchange is called the local loop. In the 1970‘s computer
controlled switches were introduced and digital switching began. Here, voice signals are converted to digital signals.
In the telegraph network text was transmitted using codes, beginning with Morse, and then Baudot codes. These were
predecessors of the modern ASCII code, which is frequently used in computers to represent text.
The concept of a start-stop code system was developed to tell a receiver that a character was being transmitted.
Seven pulses were transmitted on the line. Five were used to represent the character. A start pulse indicated that a character
was to be transmitted and a stop pulse that the character was finished.
This idea is the basis of the RS232 serial interface. The serial interface is the communications interface used between
computers and devices such as modems, printers and computer terminals. RS232 is the name of the standard that defines the
interface (e.g. how many wires are used, what each wire is used for and so on).
This type of transmission is asynchronous. Characters are transmitted independently of each other as opposed to
synchronous transmission where blocks of characters are transmitted and precise timing is critical.
3
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
There are 3 different transmission modes characterized according to the direction of the exchanges:
A simplex connection is a connection in which the data flows in only one direction, from the transmitter to the receiver.
This type of connection is useful if the data do not need to flow in both directions (for example, from your computer to the
printer or from the mouse to your computer...).
A half-duplex connection (sometimes called an alternating connection or semi-duplex) is a connection in which the data
flows in one direction or the other, but not both at the same time. With this type of connection, each end of the connection
transmits in turn. This type of connection makes it possible to have bidirectional communications using the full capacity of
the line.
A full-duplex connection is a connection in which the data flow in both directions simultaneously. Each end of the line
can thus transmit and receive at the same time, which means that the bandwidth is divided in two for each direction of data
transmission if the same transmission medium is used for both directions of transmission.
The transmission mode refers to the number of elementary units of information (bits) that can be simultaneously
translated by the communications channel. In fact, processors (and therefore computers in general) never process (in the case of
recent processors) a single bit at a time; generally they are able to process several (most of the time it is 8: one byte), and for
this reason the basic connections on a computer are parallel connections.
Parallel connection means simultaneous transmission of N bits. These bits are sent simultaneously over N different
channels (a channel being, for example, a wire, a cable or any other physical medium). The parallel connection on PC-type
computers generally requires 10 wires.
N physical lines: in which case each bit is sent on a physical line (which is why parallel cables are made up of several wires
in a ribbon cable)
one physical line divided into several sub-channels by dividing up the bandwidth. In this case, each bit is sent at a different
frequency...
Since the conductive wires are close to each other in the ribbon cable, interference can occur (particularly at high speeds)
and degrade the signal quality...
In a serial connection, the data are sent one bit at a time over the transmission channel. However, since most
processors process data in parallel, the transmitter needs to transform incoming parallel data into serial data and the receiver
needs to do the opposite.
These operations are performed by a communications controller (normally a UART (Universal Asynchronous Receiver
Transmitter) chip). The communications controller works in the following manner:
The parallel-serial transformation is performed using a shift register. The shift register, working together with a clock,
will shift the register (containing all of the data presented in parallel) by one position to the left, and then transmit the most
significant bit (the leftmost one) and so on:
The serial-parallel transformation is done in almost the same way using a shift register. The shift register shifts the
register by one position to the left each time a bit is received, and then transmits the entire register in parallel when it is full:
4
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Given the problems that arise with a parallel-type connection, serial connections are normally used. However, since a single
wire transports the information, the problem is how to synchronize the transmitter and receiver, in other words, the receiver can
not necessarily distinguish the characters (or more generally the bit sequences) because the bits are sent one after the other.
There are two types of transmission that address this problem:
An asynchronous connection, in which each character is sent at irregular intervals in time (for example a user sending
characters entered at the keyboard in real time). So, for example, imagine that a single bit is transmitted during a long
period of silence... the receiver will not be able to know if this is 00010000, 10000000 or 00000100...
To remedy this problem, each character is preceded by some information indicating the start of character transmissio n (the
transmission start information is called a START bit) and ends by sending end-of-transmission information (called STOP
bit, there may even be several STOP bits).
In a synchronous connection, the transmitter and receiver are paced by the same clock. The receiver continuously receives
(even when no bits are transmitted) the information at the same rate the transmitter sends it. This is why the transmitter and
receiver are paced at the same speed. In addition, supplementary information is inserted to guarantee that there are no errors
during transmission.
During synchronous transmission, the bits are sent successively with no separation between each character, so it is
necessary to insert synchronization elements; this is called character-level synchronization.
The main disadvantage of synchronous transmission is recognizing the data at the receiver, as there may be differences
between the transmitter and receiver clocks. That is why each data transmission must be sustained long enough for the receiver
to distinguish it. As a result, the transmission speed cannot be very high in a synchronous link.
1.6. Interferences
In communications and electronics, especially in telecommunications, interference is anything which modifies, or
disrupts a signal as it travels along a channel between a source and a receiver. The term typically refers to the addition of
unwanted signals to a useful signal. Common examples are:
6
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
1.12. Client-Server
One computer act as a server that provides services to the workstations
(clients)
A server controls the access to the hardware/software and other resources
on the network and provides a centralized storage for program and data
A client is a computer that request services from a server computer
Usually used in small and large networks
Easy to manage
1.13. Peer-to-Peer
Simple, inexpensive network that typically connects fewer than 10
computers.
All computers in the network have equal capabilities to use the resources
(hardware, software, data, and file etc.)
Cheaper cabling cost
Hard to manage
Allow installation of individual software in each computers
No server required
7
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 2:
Local Area Network Topologies
LANs can be organized into various different structures. The key thing is that there are physical and logical
topologies. The physical topology is how wires are organized. The logical topology is how the network behaves logically.
2.1 Addressing
To support several transfer modes, there are several different addressing schemes.
• Unicast: Addressing is one-to-one, where one computer sends a frame to another computer. Even though many stations can
receive the same data, they should ignore it since it is not addressed to them.
• Multicast: Addressing is one-to-many, where one computer is sending a frame to many other computers. This can be done via
a list of addresses, or some masking scheme that selects a subset of addresses.
• Broadcasting: Addressing is one-to-all, where one computer sends data to all computers connected to the LAN.
The bus topology is basically a wire that all devices connect to using a passive
interface (they listen, but don‘t amplify/repeat). There are terminators on both
ends of the wire to remove the frame. Since all computers are connected to the
medium, they all get all the frames sent. The terminators are responsible for
the removal of the frame. In baseband setup, each computer sends frames in all
(both, as there are 2) directions. In broadband setup, the transmission is
unidirectional (but then it can use a separate channel for transmissions in the
opposite direction). The bus topology generally uses coaxial cable.
Ring topology is somewhat different from the bus topology. The major differences are:
• There is no need for terminators (the receiving or sending stations remove the frame).
• Devices are active: they receive a message and then they retransmit it.
8
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
9
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
More expensive than linear bus topologies because of the cost of the concentrators.
The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called the
star-wired ring.
2.7 Tree Topology
Tree topologies integrate multiple star topologies together onto a bus. In its
simplest form, only hub devices connect directly to the tree bus and each
hub functions as the "root" of a tree of devices. This bus/star hybrid
approach supports future expandability of the network much better than a
bus (limited in the number of devices due to the broadcast traffic it
generates) or a star (limited by the number of hub connection points) alone.
10
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 3:
Network Connectivity Devices
3.1. Network Interface Controller
A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter,
and by similar terms) is a computer hardware component that connects a computer to a computer network.
Early network interface controllers were commonly implemented on expansion cards that plugged into a computer
bus; the low cost and ubiquity of the Ethernet standard means that most newer computers have a network interface built into
the motherboard.
A 1990s Ethernet network interface controller card which connects to the motherboard
via the now-obsolete ISA bus. This combination card features both a BNC
connector (left) for use in (now obsolete) 10BASE2 networks and an8P8C connector
(right) for use in 10BASE-Tnetworks.
Common manufacturers
Connects to
Motherboard via one of: Intel
Realtek
Integrated Broadcom
PCI Connector 3Com
ISA Connector
PCI-E
FireWire
USB
Thunderbolt
Network via one of:
Ethernet
Wi-Fi
Token ring
ATM
Hubs
Hubs are commonly used LAN connectivity devices. They serve as the
central connection points for LANs). A basic hub contains no active
electronics and therefore cannot be used to extend a LAN It basically
organizes your cables and relays data signals to all the computers on the
LAN.
Hubs are most commonly used on networks that use twisted-pair cabling.
Ports available on the back of the hub provide the connection points for the
devices on the network. Computers and other devices are attached to the hub by individual network cables. Hubs come in many
sizes and shapes and supply different numbers of ports.
In cases where the LAN outgrows the size of the hub, a new hub can be attached (the hubs are "daisy chained" together using a
short connection cable often referred to as a rat tail) to the current hub, thus providing greater port density
11
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Repeaters
A repeater takes the signal that it receives from computers and other devices on the LAN and
regenerates the signal so that the signal maintains its integrity along a longer media run than is
normally possible.
Repeaters don't have any capabilities for directing network traffic or deciding the particular
route certain data should take; they are simple devices that just sit on the network, boosting the
data signals they receive. The problem with repeaters is that they amplify the entire signal that
they receive, including any line noise. So, in worst-case scenarios, they pass on data traffic that
is barely discernable from the background noise on the line.
12
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Bridges
One strategy for conserving network bandwidth is to chop the network up into
smaller segments. These segments are connected to a bridge. Bridges are smarter
than hubs and repeaters and actually use some software to help get the job done. A bridge is able to read the MAC address
(also known as the hardware address—remember it's burned onto the NIC in each computer on the network) of each data
packet circulating on the network segments connected to the bridge. By learning which MAC addresses live on each of the
network segments, the bridge can help keep data traffic that is local to a particular segment from spreading to the other network
segments that are serviced by the bridge.
13
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Switches
A switch is another internetworking device used to manage
the bandwidth on a large network. A switch, which is often
referred to as a "bridge on steroids," controls the flow of
data by using the MAC address that is placed on each data
packet (which coincides with the MAC address of a
particular computer's network card). Switches divide
networks into what are called Virtual LANs or VLANs.
The great thing about a VLAN, which is a logical grouping
of computers on the network into a sort of communication
group, is that the computers don't have to be in close
proximity or even on the same floor. This allows you to
group computers that serve similar types of users into a
VLAN. For example, even if your engineers are spread all
over your company's office building, their computers can
still be made part of the same VLAN, which would share bandwidth.
Switches use a combination of software and hardware to switch packets between computers and other devices on the network.
Switches have their own operating system. Understanding what is being shown in this figure requires an understanding of the
switch's OS. Basically, this particular screen shows the hardware/MAC address of the switch and the IP address of the switch.
Other statistics relate to the number of packets sent and received by the switch (which are all at 0 because the switch has just
been placed on the network).
Because switches can offer a high density of connection ports, they can even replace the hub on a network. This means that
each computer on the network can be connected to its own port on the switch. When PCs are directly connected to a switch, it
can supply each PC with a dedicated amount of bandwidth. For example, users on a 10Mbps Ethernet network can realize
bandwidth of 10Mbps. The computers don't compete for the bandwidth the way computers do on a network that is connected
via a hub.
Routers
A router links computers to the Internet, so users can share the connection. A router acts as a dispatcher, choosing the best
path for information to travel so it's received quickly.
Switches create networks, routers connect networks.
14
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
15
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Modem
16
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 4:
Network Protocols and Standards
4.1 Network Protocol
A network protocol defines rules and conventions for communication between network devices. Protocols for
computer networking all generally use packet switching techniques to send and receive messages in the form of packets.
Network protocols include mechanisms for devices to identify and make connections with each other, as well as
formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message
acknowledgement and data compression designed for reliable and/or high-performance network communication. Hundreds of
different computer network protocols have been developed each designed for specific purposes and environments.
Groups of network protocols that work together at higher and lower levels are often called a protocol family. Students
of networking traditionally learn about the OSI model that conceptually organizes network protocol families into specific
layers for teaching purposes.
Assembling the physical pieces of a computer network by itself is insufficient to make it function – connected devices
also require a method of communication. These communication languages are called network protocols.
Consider a comparison between network protocols with how a postal service handles physical paper mail. Just as the postal
service manages letters from many sources and destinations, so too do network protocols keep data flowing along many paths
continuously. Unlike physical mail, however, network protocols also provide some advanced capabilities like delivering a
constant flow of messages to one destination (called streaming) and automatically making copies of a message and delivering it
to multiple destinations at once (called broadcasting).
17
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
1. simplex vs. duplex. A simplex connection allows only one device to transmit on a network. Conversely, duplex network
connections allow devices to both transmit and receive data across the same physical link.
3. layer. Network protocols normally work together in groups (called stacks because diagrams often depict protocols as boxes
stacked on top of each other). Some protocols function at lower layers closely tied to how different types of wireless or
network cabling physically works. Others work at higher layers linked to how network applications work, and some work at
intermediate layers in between.
IP works well for moving individual messages from one network to another but does not support the concept of a
conversation (a connection over which a stream of messages can travel in one or both directions). The Transmission Control
Protocol (TCP) protocol extends IP with this higher layer capability, and because point-to-point connections are so essential on
the Internet, the two protocols are usually paired together and known as TCP/IP.
Both TCP and IP operate somewhere in the middle layers of a network protocol stack. Popular applications on the
Internet have sometimes implemented their own protocols on top of TCP/IP. HyperText Transfer Protocol (HTTP) is used by
Web browsers and servers worldwide. TCP/IP in turn runs on top of lower-level network technologies like Ethernet. Other
popular network protocols in the IP family include ARP, ICMP and FTP.
Network applications in turn support the higher level protocols which talk to the operating system. A Web browser,
for example, is capable of translating addresses like 'http://wireless.about.com/' into HTTP packets that contain the necessary
data that a Web server can receive and in turn send back the correct Web page.
The rise of open standards not owned by any one company has been a great boon to customers of computer and
networking products, as well as the manufacturers that sell to them. In order to facilitate the development of open standards,
however, organizations are needed that will coordinate the creation and publishing of these documents. Generally, these are
18
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
non-profit organizations that specifically take a neutral stance regarding technologies and work for the betterment of the
industry as a whole.
Here are some of the standards organizations that you are likely to encounter when reading about networking and the
Internet:
o International Organization for Standardization (ISO): Probably the biggest standards organization in
the world, the ISO is really a federation of standards organizations from dozens of nations. In the networking world,
the ISO is best known for its OSI Reference Model.
o American National Standards Institute (ANSI): ANSI is the main organization responsible for
coordinating and publishing computer and information technology standards in the United States. While they are
commonly thought of as developing and maintaining standards, they do neither. Instead, they oversee and accredit the
organizations that actually create the standards, qualifying them as Standards Developing Organizations or SDOs.
ANSI also publishes the standards documents created by the SDOs, and serves as the United States' representative to
the ISO.
o Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in the
information technology (computer) industry. ITIC is the SDO approved by ANSI to develop and process standards
related to many computer-related topics. It was formerly known as the Computer and Business Equipment
Manufacturers Association (CBEMA).
o National Committee for Information Technology (NCITS): A committee established by the ITIC to
develop and maintain standards related to the information technology world. NCITS was formerly known by the
name Accredited Standards Committee X3, Information Technology, or more commonly, just X3. It maintains several
sub-committees that develop and maintain standards for various technical subjects.
o Institute of Electrical and Electronics Engineers (IEEE): The IEEE (pronounced ―eye-triple-ee‖) is
a well-known professional organization for those in the electrical or electronics fields, including computers and
networking. IEEE's main claim to fame in the networking industry is the IEEE 802 Project, which encompasses many
popular networking technologies including Ethernet.
o Electronic Industries Alliance (EIA): The EIA is an international industry association that is best known
for publishing electrical wiring and transmission standards.
o Telecommunications Industry Association (TIA): The TIA is the communications sector of the EIA,
and is responsible for developing communications standards. Since communications, wiring and transmission are all
related, and since the TIA and EIA organizations are also related, standards produced by the EIA or TIA are often
labeled with the combined prefixes ―EIA/TIA‖ or ―TIA/EIA‖.
19
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 5:
Computer Operating System
5.1 What Is a Computer Operating System?
Computers use low-level software called an operating system (O/S) to help people build and run their own programs.
Operating system software runs not just on laptop computers but also on cell phones, network routers and other so-called
embedded devices.
The early versions of Microsoft Windows did not provide any computer networking support. Microsoft added basic
networking capability into its operating system starting with Windows 95 and Windows for Workgroups. Microsoft also
introduced its Internet Connection Sharing (ICS) feature in Windows 98 Second Edition (Win98 SE). Contrast that with Unix,
which was designed from the beginning with networking in view. Nearly any consumer O/S today qualifies as a network
operating system due to the popularity of the Internet.
20
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 6:
Network Media or Transmission Media
Network Media – also known as ―Transmission Media‖. It refers to the medium over which signals can travel in a
network.
One of the most convenient way to transfer data from one computer to another, even before the birth of networking,
was to save it on some storage media and transfer physical from one station to another. Though it may seem odd in today‘s
world of high speed Internet, but when the size of data to transfer is huge, Magnetic media comes into play.
In these kinds of cases, data backup is stored onto magnetic tapes or magnetic discs and then shifted physically at
remote places.
STPcables comes with twisted wire pair covered in metal foil. This makes it more
indifferent to noise and crosstalk.
UTPhas seven categories, each suitable for specific use. In computer networks,
Cat-5, Cat-5e and Cat-6 cables are mostly used. UTP cables are connected by RJ45
connectors.
Categories of Twisted-Pair
There are two types of twisted-pair: UTP and STP. In STP, a metallic shield around the wire pairs minimizes the
impact of outside interference. Most implementations today use UTP.
Twisted-pair is divided into categories that specify the maximum data rate possible. In general, the cable category term refers
to ANSI/TIA/EIA 568-A: Commercial Building Telecommunications Cabling Standards. The purpose of EIA/TIA 568-A was
to create a multiproduct, multivendor standard for connectivity. Other standards bodies—including the ISO/IEC, NEMA, and
ICEA—are also working on specifying Category 6 and above cable.
The following are the cable types specified in ANSI/TIA/EIA 568-A:
Category 1—Cat 1 cable was originally designed for voice telephony only, but thanks to some new techniques, long-
range Ethernet and DSL, operating at 10Mbps and even faster, can be deployed over Cat 1.
Category 2—Cat 2 cable can accommodate up to 4Mbps and is associated with token-ring LANs.
Category 3—Cat 3 cable operates over a bandwidth of 16MHz on UTP and supports up to 10Mbps over a range of
330 feet (100 m). Key LAN applications include 10Mbps Ethernet and 4Mbps token-ring LANs.
Category 4—Cat 4 cable operates over a bandwidth of 20MHz on UTP and can carry up to 16Mbps over a range of
330 feet (100 m). The key LAN application is 16Mbps token ring.
21
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Category 5—Cat 5 cable operates over a bandwidth of 100MHz on UTP and can handle up to 100Mbps over a range
of 330 feet (100m). Cat 5 cable is typically used for Ethernet networks running at 10Mbps or 100Mbps. Key LAN
applications include 100BASE-TX, ATM, CDDI, and 1000BASE-T. It is no longer supported, having been replaced by
Cat 5e.
Category 5e—Cat 5e (enhanced) operates over a bandwidth of 100MHz on UTP, with a range of 330 feet (100 m).
The key LAN application is 1000BASE-T. The Cat 5e standard is largely the same as Category 5, except that it is made
to somewhat more stringent standards. Category 5e is recommended for all new installations and was designed for
transmission speeds of up to 1Gbps (Gigabit Ethernet). Although Cat 5e can support Gigabit Ethernet, it is not currently
certified to do so.
Category 6—Cat 6, specified under ANSI/TIA/EIA-568-B.2-1, operates over a bandwidth of up to 400MHz and
supports up to 1Gbps over a range of 330 feet (100 m). It is a cable standard for Gigabit Ethernet and other network
protocols that is backward compatible with the Cat 5/5e and Cat 3 cable standards. Cat 6 features more stringent
specifications for crosstalk and system noise. Cat 6 is suitable for 10BASE-T/100BASE-TX and 1000BASE-T (Gigabit
Ethernet) connections.
Category 7—Cat 7 is specified in the frequency range of 1MHz to 600MHz. ISO/IEC11801:2002 Category 7/Class F
is a cable standard for Ultra-Fast Ethernet and other interconnect technologies that can be made backward compatible
with traditional Cat 5 and Cat 6 Ethernet cable. Cat 7, which is based on four twisted copper pairs, features even more
stringent specifications for crosstalk and system noise than Cat 6. To achieve this, shielding has been added for
individual wire pairs and the cable as a whole.
The predominant cable categories in use today are Cat 3 (due to widespread deployment in support of 10Mbps Ethernet—
although it is no longer being deployed) and Cat 5e. Cat 4 and Cat 5 are largely defunct.
Coaxial cables have two wires of copper. The core wire lies in center and is made of
solid conductor. Core is enclosed in an insulating sheath. Over the sheath the second
wire is wrapped around and that too in turn encased by insulator sheath. This all is
covered by plastic cover.
Because of its structure coax cables are capable of carrying high frequency signals than
that of twisted pair cables. The wrapped structure provides it a good shield against
noise and cross talk. Coaxial cables provide high bandwidth rates of up to 450 mbps.
Cables are connected using BNC connector and BNC-T. BNC terminator is
used to terminate the wire at the far ends.
22
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Greater bandwidth—Compared to twisted-pair, coax provides greater bandwidth system wide, and it also offers greater
bandwidth for each channel. Because it has greater bandwidth per channel, it supports a mixed range of services. Voice,
data, and even video and multimedia can benefit from the enhanced capacity.
Lower error rates—Because the inner conductor is in a Faraday shield, noise immunity is improved, and coax has lower
error rates and therefore slightly better performance than twisted-pair. The error rate is generally 10–9 (i.e., 1 in 1 billion)
bps.
Greater spacing between amplifiers—Coax's cable shielding reduces noise and crosstalk, which means amplifiers can
be spaced farther apart than with twisted-pair
Disadvantages of Coaxial Cable
Problems with the deployment architecture—The bus topology in which coax is deployed is susceptible to congestion,
noise, and security risks.
Bidirectional upgrade required—In countries that have a history of cable TV, the cable systems were designed for
broadcasting, not for interactive communications. Before they can offer to the subscriber any form of two-way services,
those networks have to be upgraded to bidirectional systems.
Great noise—The return path has some noise problems, and the end equipment requires added intelligence to take care
of error control.
High installation costs—Installation costs in the local environment are high.
Susceptible to damage from lightning strikes—Coax may be damaged by lightning strikes. People who live in an area
with a lot of lightning strikes must be wary because if that lightning is conducted by a coax, it could very well fry the
equipment at the end of it.
Power Line communication is Layer-1 (Physical Layer) technology which uses power cables to transmit data signals.
Send in PLC modulates data and sent over the cables. The receiver on the other end de-modulates the data and interprets.
Because power lines are widely deployed, PLC can make all powered devices controlled and monitored. PLC works
in half-duplex.
Narrow band PLC provides lower data rates up to 100s of kbps, as they work at lower frequencies (3-5000 kHz). But can
be spread over several kilometers.
Broadband PLC provides higher data rates up to 100s of Mbps and works at higher frequencies (1.8 – 250 MHz). But
cannot be much extended as Narrowband PLC.
Fiber Optic works on the properties of light. When light ray hits at critical angle it
tends to refracts at 90 degree. This property has been used in fiber optic. The core
of fiber optic cable is made of high quality glass or plastic. From one end of it light
is emitted, it travels through it and at the other end light detector detects light
stream and converts it to electric data form.
Fiber Optic provides the highest mode of speed. It comes in two modes; one is
single mode fiber and second is multimode fiber. Single mode fiber can carries
single ray of light whereas Multimode fiber is capable of carrying multiple beams
of light.
23
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
24
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 7:
Network Cables Construction: Straight-Through and Crossover Cable
7.1 Straight-Through Wired Cables
Straight-Through refers to cables that have the pin assignments on each end of the cable. In other words Pin 1
connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 etc. Straight-Through wired cables are most commonly used to
connect a host to client. When we talk about cat5e patch cables, the Straight-Through wired cat5e patch cable is used to
connect computers, printers and other network client devices to the router switch or hub (the host device in this instance).
MATERIALS:
PROCEDURES:
Cut into the plastic sheath about 1 inch (2.5 cm) from the end of the cut cable. The
crimping tool has a razor blade that will do the trick with practice. 1 inch is about
the size of your finger units.
Unwind and pair the similar colors so that arranging the individual wires will be
easier and faster. Is the individual wires are loosely twined, tie a knot at the middle
section of the UTP cable. This will prevent the colored wires from sliding
unconditionally.
Pinch the wires between your fingers and straighten them out as shown. The color
order is important to get correct.
Use scissors to make a straight cut across the wires1/2 Inch (1.3 cm) from the cut
sleeve to the end of the wires.
Push the wires into the connector. Note the position of the plastic shielding. Also
note how the wires go all the way to the end. RJ-45 has its locking mechanism
upon crimping. This pushes a part of the RJ-45 to the plastic shielding.
26
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
A view from the top. All the wires are all the way in. There are no short wires. The
middle section of the RJ-45 serves as a scale window to see if the wires are cut
straight.
WRONG WAY - Note how the plastic sleeve is not inside the connector where it
can be locked into place. The wires are too long. The wires should extend only 1/2
inch from the cut sleeve.
WRONG WAY - Note how the cables do not go all the way to the end of the
connector. This happen if the colored wires are cut very short.
CRIMPING THE CABLE - Carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing tabs on the
connector will pierce into each of the eight wires. There is also a locking tab that
holds the outer plastic sleeve in place for a tight compression fit. When you remove
the cable from the crimper, that end is ready to use.
For a standard "Straight Through" cable, repeat all steps and wire color order on
the other end of cable. For a ―Crossover‖ cable, the other end will have a different
color order.
NOTE - The maximum cable length of CAT-5, CAT-5e or CAT-6 Ethernet cable is 328 feet or 100 meters.
27
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 8:
7 Layers of Open System Interconnection (OSI) Model
And Internet Protocol (IP) Addressing
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and
mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards
and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
- Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured
raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to the physical
medium, and carries the signals for all of the higher layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better accommodate the
characteristics of the physical medium, and to aid in bit and frame synchronization. It determines:
o What signal state represents a binary 1
o How the receiving station knows when a "bit-time" starts
o How the receiving station delimits a frame
Physical medium attachment, accommodating various possibilities in the medium:
o Will an external transceiver (MAU) be used to connect to the medium?
o How many pins do the connectors have and what is each pin used for?
Transmission technique: determines whether the encoded bits will be transmitted by baseband (digital) or broadband
(analog) signaling.
Physical medium transmission: transmits bits as electrical or optical signals appropriate for the physical medium, and
determines:
o What physical medium options can be used
28
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
o How many volts/db should be used to represent a given signal state, using a given physical medium
The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing
layers above it to assume virtually error-free transmission over the link. To do this, the data link layer provides:
Link establishment and termination: establishes and terminates the logical link between two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available.
Frame sequencing: transmits/receives frames sequentially.
Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers from errors that occur in the
physical layer by retransmitting non-acknowledged frames and handling duplicate frame receipt.
Frame delimiting: creates and recognizes frame boundaries.
Frame error checking: checks received frames for integrity.
Media access management: determines when the node "has the right" to use the physical medium.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing,internetworking,
error handling, congestion control and packet sequencing.
- Layer 3 Network examples include AppleTalk DDP, IP, IPX.
The network layer controls the operation of the subnet, deciding which physical path the data should take based on network
conditions, priority of service, and other factors. It provides:
Routing: routes frames among networks.
Subnet traffic control: routers (network layer intermediate systems) can instruct a sending station to "throttle back" its
frame transmission when the router's buffer fills up.
Frame fragmentation: if it determines that a downstream router's maximum transmission unit (MTU) size is less than
the frame size, a router can fragment a frame for transmission and re-assembly at the destination station.
Logical-physical address mapping: translates logical addresses, or names, into physical addresses.
Subnet usage accounting: has accounting functions to keep track of frames forwarded by subnet intermediate systems,
to produce billing information.
Communications Subnet
The network layer software must build headers so that the network layer software residing in the subnet intermediate
systems can recognize them and use them to route data to the destination address.
This layer relieves the upper layers of the need to know anything about the data transmission and intermediate
switching technologies used to connect systems. It establishes, maintains and terminates connections across the intervening
communications facility (one or several intermediate systems in the communication subnet).
In the network layer and the layers below, peer protocols exist between a node and its immediate neighbor, but the
neighbor may be a node through which data is routed, not the destination station. The source and destination stations may be
separated by many intermediate systems.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error
recovery and flow control. It ensures complete data transfer.
- Layer 4 Transport examples include SPX, TCP, UDP.
The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It
relieves the higher layer protocols from any concern with the transfer of data between them and their peers.
29
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
The size and complexity of a transport protocol depends on the type of service it can get from the network layer. For a
reliable network layer with virtual circuit capability, a minimal transport layer is required. If the network layer is unreliable
and/or only supports datagrams, the transport protocol should include extensive error detection and recovery.
Typically, the transport layer can accept relatively large messages, but there are strict message size limits imposed by
the network (or lower) layer. Consequently, the transport layer must break up the messages into smaller units, or frames,
prepending a header to each frame.
The transport layer header information must then include control information, such as message start and message end
flags, to enable the transport layer on the other end to recognize message boundaries. In addition, if the lower layers do not
maintain sequence, the transport header must contain sequence information to enable the transport layer on the receiving end to
get the pieces back together in the right order before handing the received message up to the layer above.
End-to-end layers
Unlike the lower "subnet" layers whose protocol is between immediately adjacent nodes, the transport layer and the
layers above are true "source to destination" or end-to-end layers, and are not concerned with the details of the underlying
communications facility. Transport layer software (and software above it) on the source station carries on a conversation with
similar software on the destination station by using message headers and control messages.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets up,
coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session
and connection coordination.
- Layer 5 Session examples include NFS, NetBios names, RPC, SQL.
The session layer allows session establishment between processes running on different stations. It provides:
Session establishment, maintenance and termination: allows two application processes on different machines to
establish, use and terminate a connection, called a session.
Session support: performs the functions that allow these processes to communicate over the network, performing
security, name recognition, logging, and so on.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating from
application to network format, and vice versa. The presentation layer works to transform data into the form that the application
layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility
problems. It is sometimes called the syntax layer.
- Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
The presentation layer formats the data to be presented to the application layer. It can be viewed as the translator for the
network. This layer may translate data from a format used by the application layer into a common format at the sending station,
then translate the common format to a format known to the application layer at the receiving station.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified, quality of service is
identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this
layer is application-specific. This layer provides application services for file transfers, e-mail, and
other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application
architectures are part of this layer.
- Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
The application layer serves as the window for users and application processes to access network services. This layer
contains a variety of commonly needed functions:
8.2.IP ADDRESS
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer)
participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal
functions: host or network interface identification and location addressing. Its role has been characterized as follows:
"A name indicates what we seek. An address indicates where it is. A route indicates how to get there.
1st Octet 1st Octet High Network/Host ID Default Subnet Number of Host per Network
Class
Decimal Range Order Bits (N=Network, H=Host) Mask Networks (Usable Addresses)
16,382 (214 –
B 128 – 191 10 N.N.H.H 255.255.0.0 65,534 (216 – 2)
2)
2,097,150
C 192 – 223 110 N.N.N.H 255.255.255.0 21 254 (28 – 2)
(2 – 2)
Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback and diagnostic functions.
8.4.Private IP Addresses
31
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
For the hosts within the organization that do not require direct access to the Internet, IP addresses that do not duplicate
already-assigned public addresses are required. To solve this addressing problem, the Internet designers reserved a portion of
the IP address space and named this space the private address space. An IP address in the private address space is never
assigned as a public address. IP addresses within the private address space are known as private addresses. Because the public
and private address spaces do not overlap, private addresses never duplicate public addresses.
The private address space specified in RFC 1918 is defined by the following three address blocks:
10.0.0.0/8
The 10.0.0.0/8 private network is a class A network ID that allows the following range of valid IP addresses: 10.0.0.1
to 10.255.255.254. The 10.0.0.0/8 private network has 24 host bits that can be used for any subnetting scheme within
the private organization.
172.16.0.0/12
The 172.16.0.0/12 private network can be interpreted either as a block of 16 class B network IDs or as a 20-bit
assignable address space (20 host bits) that can be used for any subnetting scheme within the private organization. The
172.16.0.0/12 private network allows the following range of valid IP addresses: 172.16.0.1 to 172.31.255.254.
192.168.0.0/16
The 192.168.0.0/16 private network can be interpreted either as a block of 256 class C network IDs or as a 16-bit
assignable address space (16 host bits) that can be used for any subnetting scheme within the private organization. The
192.168.0.0/16 private network allows the following range of valid IP addresses: 192.168.0.1 to 192.168.255.254.
32
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Lecture Module 9:
Application of Peer-to-Peer (P2P) Connection
OBJECTIVES:
At the end of this actual practice / presentation, the students should be able to:
Create a simple peer-to-peer network between two PC‘s.
Identify the proper cable to connect the two PCs.
Configure workstation IP address information.
Test connectivity using the ‗ping‘ command.
BACKGROUND:
PEER-TO-PEER (P2P) CONNECTION
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or
workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-
to-peer network of nodes.
Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly
available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both
suppliers and consumers of resources, in contrast to the traditional client–server model in which the consumption and supply of
resources is divided. Emerging collaborative P2P systems are going beyond the era of peers doing similar things while sharing
resources, and are looking for diverse peers that can bring in unique resources and capabilities to a virtual community thereby
empowering it to engage in greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial to
all the peers.
The first P2P distributed system platform was Pipes Platform by PeerLogic. One of PeerLogic's first licensees
was Texas Instruments in 1993. While P2P systems were used in many application domains, the architecture was popularized
by the file sharing system Napster, originally released in 1999. The concept has inspired new structures and philosophies in
many areas of human interaction.
TCP / IP
Short for Transmission Control Protocol/Internet Protocol, TCP/IP also commonly abbreviated as TCP was
developed in 1978 and driven by Bob Kahn and Vint Cerf. Today, TCP/IP is a language governing communications among all
computers on the Internet.
TCP/IP is two separate protocols, TCP and IP that are used together. The Internet Protocol standard dictates
how packets of information are sent out over networks. IP has a packet-addressing method that lets any computer on the
Internet forward a packet to another computer that is a step (or more) closer to the packet's recipient. The Transmission
Control Protocol ensures the reliability of data transmission across Internet connected networks. TCP checks packets for
errors and submits requests for re-transmissions if errors are found.
PROCEDURES:
The steps described below are provided as a general guide that will work for most home networking situations.
However, it may not work for all scenarios. Use the following steps to help you set up your own inclusive home network:
1. Make sure both systems have Network Interface Cards (NICs) installed and are using the proper cables.
2. For PCs with Windows XP, the home networking wizard can be used to set up Windows for your network.
a. Click Start, and then Control Panel.
33
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Ping Information
Sent/received: Total number of packets sent and received.
Packet loss (%): Packet loss in percentage.
Min resp. time: Minimum response time in milliseconds.
Max resp. time: Maximum response time in milliseconds.
Average resp. time: Average response time in milliseconds.
Note: If the computer does not reply, check the cable and computer connections.
C. Confirm the TCP/IP network settings by running the ipconfig command from the MS-DOS prompt.
C:/>ipconfig
34
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
35
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
5. To share a printer
When you first connect a printer to your PC, you have the option of sharing it. But even if you didn't choose to share it
originally, you can still do it later. Here's how:
1. Click Start, and then click Printers and Faxes.
2. Right-click the printer you want to share, and then click Sharing.
3. Click Share this printer, and then click OK.
Cabling /
Construction
(50 pts.)
Testing
CROSSOVER CABLE
Actual
Generalization Remarks Rating
Presentation
(50 pts.)
Cabling /
Construction
(50 pts.)
Testing
37
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
( DCL )
Schedule: Instructor: Date:
Try omitting the values the Default Gateway on both devices then try the connectivity procedures.
2.2. Does it work? _____Why?
Based on you analysis, what is the main function of the TCP/IP address?
2.
3.
2.
3.
38
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
1. Setup a Network
2. Specify Sharable Elements
3. Create a folder on the desktop with a folder name activity_(surname_firstname)
4. Create a text file with the following information:
Save this text file using the file name activity_(surname_firstname)and save it on the folder you created.
5. Share the file or folder
6. Add and Share a printer
7. Access the shared files and folders.
8. Access the shared printers
9. Print the file created on the other device within the network connection. (Print the file that your classmate had created)
10. Troubleshoot any problems encountered
Instruction: Enumerate all or some of the best answers according to the specified items to be enumerated.
A. Construct the Communication Paradigm
F. Two (2) types of transmission that address the problem that arises on the transmission transformation
40
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Enumeration
41
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
General Instructions:
Use uppercase letter only.
Strictly no erasures.
Any form of cheating is strictly prohibited.
a. Data f. Sender and Receiver k. Communication paradigm p. MAN
b. Communication media g. Transmission media l. Network q. Communication
c. Computer architecture h. LAN m. Use for resource sharing devices
d. WAN i. Devices n. Interference r. Signal
e. Communication j. Instruction o. Information s. Wave
Multiple Choice
Instruction: Choose the letter of the best answer within the given choices.
1. It describes the process in which two or more computer or devices transferring data, instructions, and information.
2. Set of processes or methods used in transforming data into meaningful information
3. Considered as the output of a system; also called processed data
4. Considered as the input of a system; also called unprocessed information
5. Major elements of communication
6. Messages and request travels through a network in a form of _________
7. A collection of computers and devices connected together via communication devices through a transmission media
8. Also called a medium in which signal travels through a network; categorized as wired (physical) or wireless (infrared,
radiowave, satellite, etc.)
9. Also called transmission media or network media
10. _________ are object being connected such as PC, printer, scanner, etc.
11. e.g. NIC, Hub, Router, Switch, Modem etc
12. One (1) Importance of Computer Network
13. A data network designed for towns or cities and handles bulk communication activity across a region
14. Composed of widespread LANs and MAN and being utilized by business and government entities. Internet is the world‘s
largest of this type of network
15. Type of network in which computers are typically closed together and it is limited in size. It has an accumulated speed of
approximately 10mbps to 10gbps
16. Overall design of the computer network that describes how a network is configured and what strategies are being used. It
focuses mainly on the functionality of the network
42
Understanding Computer System Fundamentals, DCL – Data Communication and Local Computer Systems Servicing
its Architecture, Installation, and Basic Servicing Area Networks (CSS) NC II
Identification
Topology Broadband Star Web Internet
Physical topology Baseband Hybrid Circular Root / Peak
Logical topology Unguided Ring Chain
Unicast Guided Tree Pyramid
Multicast Bus Concentrator Cluster
Broadcasting Mesh Backbone Media
Enumeration
Instruction: Enumerate all or some of the best answers according to the specified items to be enumerated.
TRUE or FALSE
Write true if the given statement is correct and appropriate, if not, write false.
Right minus Wrong method of correction.
If you are sure with your answer, write it. If not, I advise you to leave it blank.
1. The maximum length of cat 5, cat 5E, and cat 6 upon installation is 100 m. (approx 330 ft.).
3. Topology came from the greek word ―topos‖ which means network and ―logos‖ which means
communication.
4. Topology is the understanding of something that is being arranged according to functionality of each
element.
5. Tree topology can be define according to the idea presented by a collection star topology arranged in a
8. In peer-to-peer network, each host devices (e.g. PC) can function as servers in a network.
10. In star topology, the entire network is affected severely when a device connected to the hub fails to
function.
11. A linear bus topology exists with a presence of a common connection and a terminator connected to it.
12. In bus and star topology respectively, the common connection can be in a form of a hub or switch, while
Connects to
Speeds
Common Manufacturers
Write a short description and function of the following Network Connectivity Devices
Hub
Repeaters
Bridges
Switches
Routers
Modem
46
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
47
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
Network Standards
Identify the following acronyms.
1. ISO -
2. ANSI -
3. ITIC -
4. NCITS -
5. IEEE -
6. EIA -
7. TIA -
8. ITU-T -
9. ETSI –
10. DCL –
48
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
Some operating systems are designed for certain types of equipment, such as
(8)_________________________ (a variant of Linux), and (9)______________________ for cell phones
(10)________________________ and other variants of Unix - for server computers
(11)________________________ - for mainframe computers
Other operating systems enjoyed a period of notoriety but are of only historical interest now:
(12)________________________was a popular O/S for PCs in the 1990s
(13)________________________was an early PC O/S that competed with Microsoft Windows for a time but had limited success
(14)________________________ was an especially innovative operating system created in the 1960s for mainframes, that
influenced the later development of Unix
The early versions of (16)______________________________ did not provide any computer networking support.
Microsoft added basic networking capability into its operating system starting with (17)________________________ and
Windows for Workgroups. Microsoft also introduced its (18)____________________________________________ feature in
Windows 98 Second Edition (Win98 SE). Contrast that with (19)_____________________, which was designed from the
beginning with networking in view. Nearly any consumer O/S today qualifies as a network operating system due to the popularity
of the Internet.
An embedded OS can also be found inside an increasing number of consumer gadgets including phones (iPhone OS), PDAs
(Windows CE), and (20)____________________ (ipodlinux).
49
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
1. __________ cable is made of two plastic insulated copper wires twisted together to form a single media. Out
of these two wires only one carries actual signal and another is used for ground reference. The twists between
wires is helpful in reducing noise (electro-magnetic interference) and crosstalk.
2. __________ network cable operates with the exception that TX and RX lines are crossed (they are at opposite
positions on either end of the cable. Using the 568-B standard such that Pin 1 on connector A goes to Pin 3 on
connector B. Pin 2 on connector A goes to Pin 6 on connector B ect. These cables are commonly used to
connect two hosts directly.
3. ___________ cable works on the properties of light. When light ray hits at critical angle it tends to refracts at
90 degree. This property has been used in fiber optic. The core of fiber optic cable is made of high quality
glass or plastic.
4. ___________ cable is made up of several layers of protection and insulation. It is commonly used for
commercial purposes.Because of its structure, these cables are capable of carrying high frequency signals than
that of twisted pair cables.
5. ___________ cables comes with twisted wire pair covered in metal foil. This makes it more indifferent to
noise and crosstalk.
6. ___________ network cable refers to cables that have the pin assignments on each end of the cable. In other
words Pin 1 connector A goes to Pin 1 on connector B, Pin 2 to Pin 2 ect. It is the wired cables that are
commonly used to connect a host to client. It uses the 568-A color code standard.
8. STP
9. RJ
10. RG
11. NTSC
12. PAL
13. Hz
50
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
TRUE or FALSE
Write true if the given statement is correct and appropriate, if not, write false.
Right minus Wrong method of correction.
If you are sure with your answer, write it. If not, I advise you to leave it blank.
1. In a satellite transmission, the messages travels within the earth‘s horizon, then to the outer space directly
transmitting to the satellite, then back to the earth‘s horizon for confirmation.
3. Broadband transmission scheme refers to the wired transmission media that are being used upon the
4. Baseband transmission scheme uses the whole capacity of the medium upon data transmission.
5. The white-banded twisted wire on UTP, the metal foil of the STP, and the copper/aluminum mesh of the
coaxial all functions as an active line for the individual transmission media given.
6. Messages travelling into a network can be in a form of electrical impulse, digital signal, and configured light
beams.
7. BNC connector is used for coaxial cable while RJ-45 and RJ-11 is used as a connector for UTP/STP cable.
8. The term ―wire‖ is different with the term ―cable‖ in terms of their applications and functionality.
9. Straight-through cable uses both the 568-A and 568-B color code standard upon construction, with the
specification of having the same color code standard on both terminal ends of the network cable.
10. The LAN tester is composed of the separating parts namely the master control as the access point and the
11. A typical crimping tool has available features of a basic crimper, a wire stripper, and a cutter.
12. Fiber-optic cable uses solid copper conductor that acts as the main line upon transmitting messages from
source to destination.
13. The outer insulator covering the coaxial cable is made of rubber-plastic-foam material that absorbs, heat,
51
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
Enumeration
Two (2) types of network architecture
1.
2.
Six (6) types of network topology
3.
4.
5.
6.
7.
8.
Four (4) considerations when using a topology
9.
10.
11.
12.
Five (5) structural parts of coaxial cable
13.
14.
15.
16.
17.
Three (3) categories of coaxial cable
18.
19.
20.
52
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
53
Understanding Computer Networks, Connectivity DCL – Data Communication and Local Computer Systems Servicing
Media, Protocols and Basic Structure Area Networks (CSS) NC II
IP address classes
A 1 – 126*
B N.N.H.H 255.255.0.0
E 240 – 254
Private IP Addresses
54