Cblmcss Module 2
Cblmcss Module 2
Cblmcss Module 2
INTRODUCTION ................................................................................... 3
HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL ..................... 4
LIST OF COMPETENCIES ..................................................................................... 6
MODULE CONTENT ........................................................................................ 7
LEARNING OUTCOME 1 INSTALL NETWORK CABLES ........................................ 9
LEARNING EXPERIENCE 1................................................................................... 11
INFORMATION SHEET 1.1-1 COMPUTER NETWORK, DIAGRAM, & DEVICES ..... 12
SELF CHECK 2.1-1............................................................................................... 49
LEARNING OUTCOME 2 SETUP NETWORK CONFIGURATION ........................ 51
LEARNING EXPERIENCE 2................................................................................... 53
TASK SHEET 2.2-1 CREATE LOCAL AREA CONNECTION .................................... 60
LEARNING OUTCOME 3 SETUP ROUTER / WIFI / WIRELESS ACCESSPOINT /
REPEATER CONFIGURATION ....................................................................... 62
LEARNING EXPERIENCE 3................................................................................... 64
INFORMATION SHEET 2.3-1 IP ADDRESSING ..................................................... 65
SELF CHECK 2.3-1............................................................................................... 80
INFORMATION SHEET 2.3-2 WIRELESS NETWORK DEVICES CONFIGURATION 82
TASK SHEET 2.3-2 ............................................................................................... 99
LEARNING OUTCOME 4 INSPECT & TEST CONFIGURED COMPUTER NETWORKS
.................................................................................................................... 94
LEARNING EXPERIENCE 4.................................................................................103
INFORMATION SHEET 2.4-1 TESTING & TROUBLESHOOTING NETWORK........104
TASK SHEET 2.4-1 TROUBLESHOOTING NETWORK CONNECTIVITY ................111
BIBLIOGRAPHY .......................................................................................... 112
You may already have some or most of the knowledge and skills covered in
this learner's guide because you have:
been working for some time
already completed training in this area.
At the end of this module is a Learner’s Diary. Use this diary to record
important dates, jobs undertaken and other workplace events that will assist
you in providing further details to your trainer or assessor. A Record of
Achievement is also provided for your trainer to complete once you complete
the module.
This module was prepared to help you achieve the required competency,
in Constructing Aquaculture Facilities. This will be the source of information
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 4 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
for you to acquire knowledge and skills in this particular trade independently
and at your own pace, with minimum supervision or help from your
instructor.
Talk to your trainer and agree on how you will both organize the
Training of this unit. Read through the module carefully. It is divided
into sections, which cover all the skills, and knowledge you need to
successfully complete this module.
Work through all the information and complete the activities in each
section. Read information sheets and complete the self-check.
Suggested references are included to supplement the materials
provided in this module.
Your trainer will tell you about the important things you need to
consider when you are completing activities and it is important that you
listen and take notes.
Use the self-check questions at the end of each section to test your own
progress.
When you are ready, ask your trainer to watch you perform the
activities outlined in this module.
As you work through the activities, ask for written feedback on your
progress. Your trainer keeps feedback/ pre-assessment reports for this
reason. When you have successfully completed each element, ask your
trainer to mark on the reports that you are ready for assessment.
When you have completed this module (or several modules), and feel
confident that you have had sufficient practice, your trainer will arrange
an appointment with registered assessor to assess you. The results of
your assessment will be recorded in your competency Achievement
Record.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 5 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
COMPUTER HARDWARE SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
MODULE DESCRIPTOR:
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
CONTENTS:
Safety Procedures
Network Diagram
Identification and familiarization of different network materials, tools,
equipment and testing devices
Wire splicing
Standard color coding and crimping of network cables
5s and 3Rs implementation
Types of network configuration
ASSESSMENT CRITERIA:
CONDITIONS:
Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
- Utility software
- Computer system
- Crimping tool
- LAN Tester
METHODOLOGIES:
Lecture
Discussion
Demonstration
Viewing multimedia
ASSESSMENT METHODS:
Written examination
Practical examination
Learning Objectives:
Introduction
To understand how networks function, you need to become familiar with the
basic elements of a network. This module explains networks by introducing
fundamental computer and network concepts and the characteristics, functions,
benefits, metrics, and attributes used to describe network features and performance.
This chapter also introduces the Open System Interconnection (OSI) reference model,
data communications terms and concepts, and the TCP/IP protocol, which serves as
the de facto standard for most of today's computer networks. Finally, this chapter
provides you with an opportunity to connect two PCs in a point-to-point serial
network.
What is a Network?
The first task in understanding how to build a computer network is defining what a
network is and understanding how it is used to help a business meet its objectives.
A network is a connected collection of devices and end systems, such as computers
and servers that can communicate with each other.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 12 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Networks carry data in many types of environments, including homes, small
businesses, and large enterprises. In a large enterprise, a number of locations might
need to communicate with each other, and you can describe those locations as
follows:
Main office: A main office is a site where everyone is connected via a network
and where the bulk of corporate information is located. A main office can have
hundreds or even thousands of people who depend on network access to do
their jobs. A main office might use several connected networks, which can
span many floors in an office building or cover a campus that contains several
buildings.
Remote locations: A variety of remote access locations use networks to
connect to the main office or to each other.
Branch offices: In branch offices, smaller groups of people work and
communicate with each other via a network. Although some corporate
information might be stored at a branch office, it is more likely that branch
offices have local network resources, such as printers, but must access
information directly from the main office.
Home offices: When individuals work from home, the location is called a
home office. Home office workers often require on-demand connections to the
main or branch offices to access information or to use network resources such
as file servers.
Mobile users: Mobile users connect to the main office network while at the
main office, at the branch office, or traveling. The network access needs of
mobile users are based on where the mobile users are located.
Figure 1-1 shows some of the common locations of networks that can be used
to connect users to business applications.
Network Locations
Many different types and locations of networks exist. You might use a network in
your home or home office to communicate via the Internet, to locate information, to
These are the four major categories of physical components in a computer network:
Serial Connection
Switches: Switches are devices that provide network attachment to the end
systems and intelligent switching of the data within the local network.
Switch Symbol
Routers: Routers interconnect networks and choose the best paths between
networks.
Router Symbol
Servers
Data and applications: When users are connected through a network, they
can share files and even software application programs, making data more
easily available and promoting more efficient collaboration on work projects.
Physical resources: The resources that can be shared include both input
devices, such as cameras, and output devices, such as printers.
Network storage: Today the network makes storage available to users in
several ways. Direct attached storage (DAS) directly connects physical storage
to a PC or a shared server. Network attached storage (NAS) makes storage
available through a special network appliance. Finally, storage area networks
(SAN) provide a network of storage devices.
Backup devices: A network can also include backup devices, such as tape
drives, that provide a central means to save files from multiple computers.
Network storage is also used to provide archive capability, business
continuance, and disaster recovery.
In recent years, the open access to devices that was once pervasive in networking
has been replaced with a need for caution. There have been many well-advertised
acts of "cyber vandalism," in which both end systems and network devices have been
broken into; therefore, the need for network security has to be balanced with the
need for connectivity.
E-mail: E-mail is a valuable application for most network users. Users can
communicate information (messages and files) electronically in a timely
manner, to not only other users in the same network but also other users
outside the network (suppliers, information resources, and customers, for
example). Examples of e-mail programs include Microsoft Outlook and Eudora
by Qualcomm.
Web browser: A web browser enables access to the Internet through a
common interface. The Internet provides a wealth of information and has
become vital to the productivity of both home and business users.
Communicating with suppliers and customers, handling orders and
fulfillment, and locating information are now routinely done electronically over
the Internet, which saves time and increases overall productivity. The most
commonly used browsers are Microsoft Internet Explorer, Netscape Navigator,
Mozilla, and Firefox.
Instant messaging: Instant messaging started in the personal user-to-user
space; however, it soon provided considerable benefit in the corporate world.
Now many instant messaging applications, such as those provided by AOL
and Yahoo!, provide data encryption and logging, features essential for
corporate use.
Collaboration: Working together as individuals or groups is greatly facilitated
when the collaborators are on a network. Individuals creating separate parts
of an annual report or a business plan, for example, can either transmit their
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 18 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
data files to a central resource for compilation or use a workgroup software
application to create and modify the entire document, without any exchange
of paper. One of the best-known traditional collaboration software programs
is Lotus Notes. A more modern web-based collaboration application is a wiki.
Database: This type of application enables users on a network to store
information in central locations (such as storage devices) so that others on the
network can easily retrieve selected information in the formats that are most
useful to them. Some of the most common databases used in enterprises today
are Oracle and Microsoft SQL Server.
The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the
TIA/EIA 568-B standard in 2002 and has been updated since. Both standards
define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair
cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-
out specification appear to be related and interchangeable, but are not the
same and should not be used interchangeably.
Basic Theory:
This section covers basic network configuration set up and testing. Also covered are
basic concepts and operations, including the difference between LAN and WAN
networks and how IP Addressing is used.
Because routers help computers inside the LAN “talk” with computers outside of the
LAN. The security of a company’s LAN may be compromised by gaps of open ports
in the router. Security measures may have been instituted to compensate for these
vulnerabilities. Consult your network administrator to learn about the security
measures taken to protect your network. VPN, or virtual private network, is one
Simply put, a LAN is a computer network that connects a relatively small area (a
single building or group of buildings). Most LANs connect workstations and
computers to each other. Each computer (also known as a “node”), has its own
processing unit and executes its own programs; however, it can also access data and
devices anywhere on the LAN. This means that many users can access and share
the same information and devices. A good example of a LAN device is a network
printer. Most companies cannot afford the budgetary or hardware expense of
providing printers for each of its users. Therefore, one printer (i.e., device) is placed
on the LAN where every user can access the same printer.
The LAN uses IP addresses to route data to different destinations on the network.
An IP Address is a 32-bit numeric address written as four numbers separated by
periods (For example, 1.160.10.240.
Note: For more information on IP Addresses, see your local network administrator.
A wide area network connects two or more LANs and can span a relatively large
geographical area. For example, Telex Headquarters in Burnsville, MN is connected
to several of its branch offices in Nebraska and Arkansas over the wide area network.
The largest WAN in existence is the Internet.
Using the initial IP address, then converting it to a valid WAN IP address is how the
network address translation works in theory. Once the IP address is changed, it is
up to the network interface device (such as a router, gateway, switch, etc.) to keep
track of which computers are talking on which ports. For example, if two local
devices (PC1 and PC2 in Figure 3) both wanted to talk via port 1031, then the network
interface device would have to change one of the port requests to the next available
port, 1032.
Ports
In general, a network port is an endpoint to a logical connection. The port number
identifies what type of port it is. For example, port 80 is used for HTTP traffic.
When you type an address into the address bar of a web browser, your computer
goes to find an IP address for the url you are requesting (http:// www.telex.com).
To obtain this address, the computer contacts a DNS server (Domain Name
Server). Once the IP address is found, it tries to connect to the http port of the
network device (port 80). See Table 1 for a list of the more well-known Port
numbers.
Each network device can be set up to respond or not respond to the various ports.
The function of responding or “hosting a service” is called “serving”.
To
10.2.100.1 1031 192.156.136.22 80 99.5.1.30 1032 192.156.136.22 80
Internet
Port Port
Description Description
Number Number
1 TCP Port Service Multiplexer 118 SQL Services
(TCPMUX)
5 Remote Job Entry (RJE) 119 Newsgroup (NNTP)
7 ECHO 137 NetBIOS Name Service
18 Message Send Protocol (MSP) 139 NetBIOS Datagram Service
20 FTP – Data 143 Interim Mail Access Protocol
(IMAP)
21 FTP – Control 150 NetBIOS Session Service
23 Telnet 156 SQL Server
25 Simple Mail Transfer 161 SNMP
Protocol (SMTP)
Step 1
Purchase your cable and your RJ-45 connectors. Most Ethernet cable is
sold on spools of varying lengths, so you might have to measure and cut the
amount you need when you get home.
Step 2
Strip 1 to 2 inches (2.5 to 5.1 cm) of the outer skin at the end of the cable
wire by making a shallow cut in the skin with a utility knife. Run the knife
around the cable, and the jacket should slide off easily. There will be 4 pairs of
twisted wires exposed, each of them a different color or color combination.
Step 6 Arrange the untwisted wires in a row, placing them into the
position, running from right to left, in which they will go into the RJ-45
connector:
Step 8 Trim the wires in small increments, checking frequently to ensure a correct
fit. It's better to cut the untwisted wires a few times than have to go back and start
all over again because you trimmed off too much.
Step 10 Use the crimping tool to crimp the RJ-45 connector to the cable by
pressing the jacket and cable into the connector so that the wedge at the bottom of
the connector is pressed into the jacket. Recrimp the cable once more to ensure
proper connection.
Step 12 Use a cable tester to assure that your cable is working properly when
both ends are crimped.
You hear about fiber-optic cables whenever people talk about the telephone
system, the cable TV system or the Internet. Fiber-optic lines are strands of
optically pure glass as thin as a human hair that carry digital information
over long distances. They are also used in medical imaging and mechanical
engineering inspection.
Fiber optics (optical fibers) are long, thin strands of very pure glass about
the diameter of a human hair. They are arranged in bundles called optical
cables and used to transmit light signals over long distances.
If you look closely at a single optical fiber, you will see that it has the
following parts:
Core - Thin glass center of the fiber where the light travels
Cladding - Outer optical material surrounding the core that reflects the light
back into the core
Buffer coating - Plastic coating that protects the fiber from damage and
moisture
Single-mode fibers have small cores (about 3.5 x 10-4 inches or 9 microns in
diameter) and transmit infrared laser light (wavelength = 1,300 to 1,550
nanometers). Multi-mode fibers have larger cores (about 2.5 x 10-3 inches or
62.5 microns in diameter) and transmit infrared light (wavelength = 850 to
1,300 nm) from light-emitting diodes (LEDs).
Some optical fibers can be made from plastic. These fibers have a large core
(0.04 inches or 1 mm diameter) and transmit visible red light (wavelength =
650 nm) from LEDs.
The light in a fiber-optic cable travels through the core (hallway) by constantly
bouncing from the cladding (mirror-lined walls), a principle called total internal
reflection. Because the cladding does not absorb any light from the core, the light
wave can travel great distances.
Now, imagine doing this when the ships are on either side of the ocean separated
by thousands of miles and you have a fiber-optic communication system in place
between the two ships. Fiber-optic relay systems consist of the following:
Transmitter
The transmitter is like the sailor on the deck of the sending ship. It receives and
directs the optical device to turn the light "on" and "off" in the correct sequence,
thereby generating a light signal.
The transmitter is physically close to the optical fiber and may even have a lens to
focus the light into the fiber. Lasers have more power than LEDs, but vary more
with changes in temperature and are more expensive. The most common
wavelengths of light signals are 850 nm, 1,300 nm, and 1,550 nm (infrared, non-
visible portions of the spectrum).
Optical Regenerator
As mentioned above, some signal loss occurs when the light is transmitted through
the fiber, especially over long distances (more than a half mile, or about 1 km) such
as with undersea cables. Therefore, one or more optical regenerators is spliced
along the cable to boost the degraded light signals.
Optical Receiver
The optical receiver is like the sailor on the deck of the receiving ship. It takes the
incoming digital light signals, decodes them and sends the electrical signal to the
other user's computer, TV or telephone (receiving ship's captain). The receiver uses
a photocell or photodiode to detect the light.
Less expensive - Several miles of optical cable can be made cheaper than
equivalent lengths of copper wire. This saves your provider (cable TV,
Internet) and you money. Thinner - Optical fibers can be drawn to smaller
diameters than copper wire. Higher carrying capacity - Because optical
fibers are thinner than copper wires, more fibers can be bundled into a
given-diameter cable than copper wires. This allows more phone lines to go
over the same cable or more channels to come through the cable into your
cable TV box. Less signal degradation - The loss of signal in optical fiber is
less than in copper wire. Light signals - Unlike electrical signals in copper
wires, light signals from one fiber do not interfere with those of other fibers
in the same cable. This means clearer phone conversations or TV reception.
Low power - Because signals in optical fibers degrade less, lower-power
transmitters can be used instead of the high-voltage electrical transmitters
needed for copper wires. Again, this saves your provider and you money.
Digital signals - Optical fibers are ideally suited for carrying digital
information, which is especially useful in computer networks. Non-
flammable - Because no electricity is passed through optical fibers, there is
no fire hazard. Lightweight - An optical cable weighs less than a
comparable copper wire cable. Fiber-optic cables take up less space in the
ground. Flexible - Because fiber optics are so flexible and can transmit and
receive light, they are used in many flexible digital cameras for the following
purposes:
There are numerous other methods for terminating fiber optic connectors
that can be found in our Installation Pocket Reference Guide.
Fiber stripper
Ruler
Marker
Step 4: Make sure the stripper’s cutting face is clean. Use the front, large V-
notch on the cable stripper to remove the 900-micron tight buffer.
Step 6: Keeping the pressure light, carefully slide the jacket off of the fiber.
Be careful to avoid breaking the fragile glass fiber. Repeat step to remove
the remaining 20 mm of jack.
Step 7: Carefully remove any of the leftover 250-micron coating (notice the
white film on the fiber) using the smaller, back V-notch on the tool.
Step 9: Ensure that both clamps (C) are clean and free of fiber. Squeeze
buttons A and B at the same time to open clamps.
Step 11: Slowly turn the knob 360 degrees to cut the fiber.
Step 12: Squeeze button A, remove the scrap fiber and place it in the scrap
fiber bin.
Step 15: Ensure the components are in the starting position. If not, slide
the VFL coupler back toward the cover hinge until it locks. Verify the load
button is released and the connector cradle is against the travel stop.
Depress the reset button to return the wrench to the start position.
Step 17: Remove the dust cap from connector and squeeze the load button
to move the connector cradle away from the wrench.
Step 18: With the connector oriented up, load the connector into the tool by
inserting it (lead-in tube first, into the wrench). Slowly release the load
button while guiding the connector into the connector cradle.
Step 20: Close the cover and check for the error light. If the error light
remains off, there are no problems.Insert the cleaved fiber into the back of
the lead-in tube. Insert the fiber until you feel it firmly stop against the fiber
stub. The visual mark should be within 2 mm of the lead-in tube.While
maintaining enough inward pressure, squeeze the CAM button in until it
locks. Check the termination lights. If the green light is illuminated, the
termination was successful. If the red light is illuminated, press the reset
button, remove the fiber and repeat the termination process.
Step 22: Open the cover and slide the VFL coupler back into its starting position.
Slightly squeeze the button to remove the connector. Ensure the clear ferrule dust
cap is installed. Slide the boot up the back of the connector until it reaches the
cam
1. Interconnections
2. Switches
3. Patch panel
4. Email
5. Database
6. LAN
7. WAN
8. Network port
9. Instant messaging
10. Web Browser
CONTENTS:
ASSESSMENT CRITERIA:
Lecture
Discussion
Demonstration
Viewing multimedia
ASSESSMENT METHODS:
Written examination
Practical examination
Learning Objectives:
Introduction
A LAN, or local area network, is a great way to share files and devices between
multiple computers. If you have several computers in your home, setting up
a network will allow you to share an Internet connection, data, printers, and
other devices between your computers - all without wires. Fortunately, the
process is simple, and you can learn how to set up a LAN in your home by
following a few easy steps.
Steps 1: Assess your needs in a network. The devices you use to set your
network up will determine your network's capabilities. You should address
your needs in terms of cost, security, connection speed, expandability (adding
more computers or devices later) and distance between computers. In general,
you will need to keep all the computers in the network within 100 yards (91
m) of each other.
Step 4 Purchase a wireless router. You will need to broadcast your Internet
connection wirelessly, and for this, you need a router. When buying a router,
make sure you get one that is designed for your connection type (cable, DSL,
etc.). You should also consider the strength of the router's signal. The
packaging will describe how far you can expect the router's signal to
broadcast. It will need to reach every computer in your network.
Supplies/Materials :
Ethernet Cables
Mother Board manual
Network Drivers
Assessment Method:
CRITERIA YES NO
Did you….
1. Ensure that safety measures, policies and procedures
followed, and that work is appropriately sequenced in
accordance with the industry standards?
2. Successfully created a local area connection?
CONTENTS:
ASSESSMENT CRITERIA:
CONDITIONS:
Lecture
Discussion
Demonstration
Viewing multimedia
ASSESSMENT METHODS:
Written examination
Practical examination
Learning Objectives:
Introduction
An Internet Protocol address (IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in a
computer network that uses the Internet Protocol for communication.
IPV4 ADDRESSING
IPv4 supports three different types of addressing modes.:
A single IP address can contain information about the network and its sub-
network and ultimately the host. This scheme enables the IP Address to be
hierarchical where a network can have many sub-networks which in turn
can have many hosts.
Subnet Mask
The 32-bit IP address contains information about the host and its network.
It is very necessary to distinguish both. For this, routers use Subnet Mask,
which is as long as the size of the network address in the IP address. Subnet
Mask is also 32 bits long. If the IP address in binary is ANDed with its
Subnet Mask, the result yields the Network address. For example, say the IP
Address is 192.168.1.152 and the Subnet Mask is 255.255.255.0 then:
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 67 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
This way the Subnet Mask helps extract the Network ID and the Host from
an IP Address. It can be identified now that 192.168.1.0 is the Network
number and 192.168.1.152 is the host on that network.
Binary Representation
The positional value method is the simplest form of converting binary from
decimal value. IP address is 32 bit value which is divided into 4 octets. A
binary octet contains 8 bits and the value of each bit can be determined by
the position of bit value '1' in the octet.
The first octet referred here is the left most of all. The octets numbered as
follows depicting dotted decimal notation of IP Address:
The number of networks and the number of hosts per class can be derived
by this formula:
Class A Address
The first bit of the first octet is always set to 0 (zero). Thus the first octet
ranges from 1 – 127, i.e.
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The
IP range 127.x.x.x is reserved for loopback IP addresses.
Class B Address
An IP address which belongs to class B has the first two bits in the first
octet set to 10, i.e.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host
addresses.
Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is:
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host
addresses.
Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110,
giving a range of:
Class E Address
This IP Class is reserved for experimental purposes only for R&D or Study.
IP addresses in this class ranges from 240.0.0.0 to 255.255.255.254. Like
Class D, this class too is not equipped with any subnet mask.
Each IP class is equipped with its own default subnet mask which bounds
that IP class to have prefixed number of Networks and prefixed number of
Hosts per network. Classful IP addressing does not provide any flexibility of
having less number of Hosts per Network or more Networks per IP Class.
Class A Subnets
In Class A, only the first octet is used as Network identifier and rest of three
octets are used to be assigned to Hosts (i.e. 16777214 Hosts per Network).
To make more subnet in Class A, bits from Host part are borrowed and the
subnet mask is changed accordingly.
For example, if one MSB (Most Significant Bit) is borrowed from host bits of
second octet and added to Network address, it creates two Subnets (21=2)
with (223-2) 8388606 Hosts per Subnet.
Class B Subnets
By default, using Classful Networking, 14 bits are used as Network bits
providing (214) 16384 Networks and (216-1) 65534 Hosts. Class B IP
Addresses can be subnetted the same way as Class A addresses, by
Class C Subnets
Class C IP addresses are normally assigned to a very small size network
because it can only have 254 hosts in a network. Given below is a list of all
possible combination of subnetted Class B IP address:
Internet Service Providers may face a situation where they need to allocate
IP subnets of different sizes as per the requirement of customer. One
customer may ask Class C subnet of 3 IP addresses and another may ask
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 74 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
for 10 IPs. For an ISP, it is not feasible to divide the IP addresses into fixed
size subnets, rather he may want to subnet the subnets in such a way
which results in minimum wastage of IP addresses.
The following procedure shows how VLSM can be used in order to allocate
department-wise IP addresses as mentioned in the example.
Step - 1
Make a list of Subnets possible.
Step - 2
Sort the requirements of IPs in descending order (Highest to Lowest).
Sales 100
Purchase 50
Accounts 25
Management 5
Step - 3
Allocate the highest range of IPs to the highest requirement, so let's assign
192.168.1.0 /25 (255.255.255.128) to the Sales department. This IP subnet
with Network number 192.168.1.0 has 126 valid Host IP addresses which
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 75 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
satisfy the requirement of the Sales department. The subnet mask used for
this subnet has 10000000 as the last octet.
Step - 4
Allocate the next highest range, so let's assign 192.168.1.128 /26
(255.255.255.192) to the Purchase department. This IP subnet with Network
number 192.168.1.128 has 62 valid Host IP Addresses which can be easily
assigned to all the PCs of the Purchase department. The subnet mask used
has 11000000 in the last octet.
Step - 5
Allocate the next highest range, i.e. Accounts. The requirement of 25 IPs can
be fulfilled with 192.168.1.192 /27 (255.255.255.224) IP subnet, which
contains 30 valid host IPs. The network number of Accounts department will
be 192.168.1.192. The last octet of subnet mask is 11100000.
Step - 6
Allocate the next highest range to Management. The Management
department contains only 5 computers. The subnet 192.168.1.224 /29 with
the Mask 255.255.255.248 has exactly 6 valid host IP addresses. So this
can be assigned to Management. The last octet of the subnet mask will
contain 11111000.
By using VLSM, the administrator can subnet the IP subnet in such a way
that least number of IP addresses are wasted. Even after assigning IPs to
every department, the administrator, in this example, is still left with plenty
of IP addresses which was not possible if he has used CIDR.
Intro
An escalating demand for IP addresses acted as the driving force behind the
development of the large address space offered by the IPv6. According to
industry estimates, in the wireless domain, more than a billion mobile phones,
Personal Digital Assistants (PDA), and other wireless devices will require
Internet access, and each will need its own unique IP address.
The extended address length offered by IPv6 eliminates the need to use
techniques such as network address translation to avoid running out of the
available address space. IPv6 contains addressing and control information to
route packets for the next generation Internet.
2001:cdba:0000:0000:0000:0000:3257:9652
2001:cdba:0:0:0:0:3257:9652
2001:cdba::3257:9652
http://[2001:cdba:0000:0000:0000:0000:3257:9652]/
The IPv6 networks are denoted by Classless Inter Domain Routing (CIDR)
notation. A network or subnet using the IPv6 protocol is denoted as a
contiguous group of IPv6 addresses whose size must be a power of two. The
initial bits of an IPv6 address (these are identical for all hosts in a network)
form the networks prefix. The size of bits in a network prefix are separated
with a /. For example, 2001:cdba:9abc:5678::/64 denotes the network address
2001:cdba:9abc:5678. This network comprises of addresses rearranging from
2001:cdba:9abc:5678:: up to 2001:cdba:9abc:5678:ffff:ffff:ffff:ffff. In a similar
fashion, a single host may be denoted as a network with a 128-bit prefix. In
this way, IPv6 allows a network to comprise of a single host and above.
::/96 The zero prefix denotes addresses that are compatible with the
previously used IPv4 protocol.
fc00::/7 This is called the Unique Local Address (ULA). These addresses
are routed only within a set of cooperating sites. These were introduced
in the IPv6 to replace the site-local addresses. These addresses also
provide a 40-bit pseudorandom number that reduces the risk of address
conflicts.
Learning Objectives:
STEP 1 Purchase a wireless router. Routers come in all shapes and sizes.
Compare features to find the router that is right for you. If you have more
area that you need to cover, or have lots of walls in your home, you’ll need a
router that offers the option of upgrading antenna(s) with high gain types - if
not supplied in the box. If more than one wireless device will be connecting
at the same time at different speeds, a MiMo type router is recommended,
otherwise the speed for all devices will drop the highest supported by all at
that time.
Connect the router and the modem with an Ethernet cable. Most
routers come packaged with a short Ethernet cable that you can use for
this.
Connect the modem to the WAN/Internet port on your router. It is
usually offset, and may be a different color from the LAN ports
STEP 3 Connect any devices you want to hard wire with CAT 5 (or better)
Ethernet cables. If you have computers that are close, or a video game
console or TV, you can connect them to the router via Ethernet. This will
result in a more stable and faster connection, and doesn’t require any extra
configuration.
STEP 4 Connect at least one computer via Ethernet. You will need at least
one computer connecting via Ethernet cable in order to adjust your router
settings. You can disconnect this computer afterwards if you want to connect
wirelessly
If your router came with an installation disc, you can run the
configuration program from that instead. It will accomplish many of the
same functions.
Check the box to enable SSID broadcast. This will essentially “turn
on” the wireless network so that it may be readily seen by anyone in
range of the signal. *See the Tips section below for additional
information on the SSID setting
STEP 13 Change your router’s username and password from the default.
Once you have your network configured, you should change the username
and password that you use to access your router. This will help protect your
router from unauthorized changes. You can change these from the
Administration section of the router configuration menu.[2]
The physical setup for a wireless access point is pretty simple: You take it out
of the box, put it on a shelf or on top of a bookcase near a network jack and
a power outlet, plug in the power cable, and plug in the network cable.
The software configuration for an access point is a little more involved, but
still not very complicated. It's usually done via a Web interface. To get to the
configuration page for the access point, you need to know the access point's
IP address. Then, you just type that address into the address bar of a browser
from any computer on the network.
SSID: The Service Set Identifier used to identify the network. Most
access points have well-known defaults. You can talk yourself into
thinking that your network is more secure by changing the SSID from
the default to something more obscure, but in reality, that only protects
you from first-grade hackers. By the time most hackers get into the
second grade, they learn that even the most obscure SSID is easy to get
around. So leave the SSID at the default and apply better security
measures.
Larger networks that have more demanding DHCP requirements are likely to
have a separate DHCP server running on another computer. In that case, you
can defer to the existing server by disabling the DHCP server in the access
point.
If you have a large building or a sprawling piece of property and want Internet
access throughout, you will probably have to extend a wireless network. This
extension will allow you to maintain a strong wireless signal over a much
larger area. To start learning some basic guidelines to extend a wireless
network, scroll past the jump.
STEP 1 Set your main router as your base station. Make sure your router
is connected to your computer via Ethernet cable. This will allow you to login
directly to the router.
Login to the router from a browser (in the URL bar: 192.168.0.1 or
192.168.1.1 are the standards). If you've enabled a password, enter
your login and password credentials now. If you haven't, then standard
settings for most routers are a login of admin and a password of
password, or admin and admin.
You will establish your primary router as your base station at this
point. Make sure that you select the base station functions for this
router and not repeater settings.
The first sets should be 192.168.0 (or 192.168.1), and you will enter
the final digit. You can enter any number between 1 and 255. Write
down this new IP address because you will need it to login to the
wireless repeater if you need to change settings in the future.
STEP 9 Save these settings and disconnect the repeater from your
computer.
Supplies/Materials :
Ethernet Cables
Mother Board manual
Network Drivers
Steps/Procedure:
1. Create a network diagram having a wireless router, wireless repeater and two
work stations as client.
2. Configure the first router as the main router assign the ip address range,
dhcp server, wireless network name and password.
3. Connect the second router to the main router using Ethernet cable. Plug it
to the LAN ports of the routers.
4. Configure the 2nd router as wireless access point.
5. Connect the two laptop clients to the wireless access point.
6. Check if the access point inherits the configuration of the main router.
7. Check each client’s network settings and perform a ping test.
8. Reset the 2nd router and reconfigure it as wireless repeater.
9. Connect the two laptop to the wireless repeater.
10. Check if the wireless repeater inherits the main router’s configuration.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 99 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
11. Check each client network setting and perform and ping test.
Assessment Method:
CRITERIA YES NO
Did you….
1. Configure the main router based on the given
specifications?
CONTENTS:
ASSESSMENT CRITERIA:
CONDITIONS:
Lecture
Discussion
Demonstration
Viewing multimedia
ASSESSMENT METHODS:
Written examination
Practical examination
Introduction
Home networking equipment has reached a point of such ubiquity that
it will soon be counted among common household appliances such as your
TV, microwave and refrigerator. Unfortunately, it seems that the extent of
most people's troubleshooting knowledge ends with rebooting their router and
whining at the closest person they consider their personal tech support
representative. This guide aims to provide a series of tools which can help you
repair problems yourself, thus alleviating the pressure placed on those around
you with any tech knowledge at all.
The ping tool, one of the simplest network troubleshooting tools available, is
present in most common operating systems. It provides the ability to
monitor attempts to transfer and return a network packet from one point in
the network to another, thus proving that basic communication is possible.
Angry IP Scanner
Using your Ping tool, attempt to confirm your connection to an internal host.
Your router is a good option because if you can ping it, there is nothing
between it and you that should be causing Internet connectivity issues. To
do so, bring up a command prompt and enter ping [the IP address of your
router]. By default, your router will most likely be found at 192.168.0.1, or
10.0.0.1. Having successfully pinged an internal host, attempt to ping a host
external to your network using the command "ping google.com".
If you are still connected to your local network, the next step is to confirm
connectivity to your router. Do this by attempting to navigate to its
administration panel using a web browser. Simply type the IP address of the
router into your address bar. Note that some brands of routers require the
user to specify the network port for access to the admin panel. Do this by
appending the necessary port number to the IP address in your address bar
using a colon. Most routers that require a defined port will default to :8080.
Now that you’ve logged into your router’s admin panel, it is possible to
determine whether external hosts are accessible from that point. Most good
routers will have a ping tool built into the admin panel, often included in a
diagnostics tab. If your router can successfully ping external hosts, while
you cannot from your local machine the you can confirm that the problem
exists within your network and can subsequently be fixed. As opposed to
problems which exist outside of your network, and thus are out of your
control.
Now that you’ve logged into your router’s admin panel, it is possible to
determine whether external hosts are accessible from that point. Most good
routers will have a ping tool built into the admin panel, often included in a
diagnostics tab. If your router can successfully ping external hosts, while
you cannot from your local machine the you can confirm that the problem
exists within your network and can subsequently be fixed. As opposed to
problems which exist outside of your network, and thus are out of your
control.
Assessment Method:
CRITERIA
YES NO
Did you….
1. Followed proper procedure in configuring a LAN
connection?
2. Tested the network connectivity using the network
tools and software?
3. Established network connectivity using static and
dynamic IP Address?
Websites
http://www.networkworld.com/article/2280110/lan-wan/chapter-1--
building-a-simple-network.html?page=2
http://www.tested.com/tech/2412-how-to-diagnose-and-repair-basic-
network-connection-problems/
http://www.wikihow.com/Create-a-Local-Area-Network-%28LAN%29
http://www.tutorialspoint.com/ipv4/ipv4_example.htm
http://www.wikihow.com/Extend-a-Wireless-Network
http://www.dummies.com/how-to/content/configuring-a-wireless-access-
point.html
https://en.wikipedia.org/wiki/IPv6_address
https://www.anixter.com/en_au/about-us/news-and-events/news/how-to-
terminate-fiber-optic-cable-step-by-step.html
Other Materials