GENBN401 - Perform Basic Networking Note
GENBN401 - Perform Basic Networking Note
Purpose statement
This module Describes the skills, Knowledge and attitude required to Perform
basic Networking. This module intended to prepare students Pursuing TVET
in Level 4 Software Development. At the end of this module, the students will
be able to Establish network media connectivity, Perform Basic Network
Configuration, Maintain Network system
2
Learning outcome 1: Establish network media connectivity
Network classifications/types:
Classifying network by components roles
Networks can be classified into different categories based on various criteria,
including their size, scope, purpose, and architecture. Here are some
common network classifications:
Based on Size:
o Personal Area Network (PAN): A small network typically
within a range of a few meters, used for connecting personal
devices like smartphones, laptops, and tablets.
o Local Area Network (LAN): Covers a limited geographic area,
such as a home, office, or campus. LANs connect devices like
computers, printers, and servers.
o Metropolitan Area Network (MAN): Larger than a LAN but
smaller than a WAN, covering a city or a large campus. MANs are
used by organizations with multiple locations in a city.
o Wide Area Network (WAN): Spans a large geographic area,
often connecting LANs or MANs across different cities, regions, or
countries. The internet is the most extensive WAN.
o Global Area Network (GAN): A network that covers a global or
international scale, often using satellite links and undersea
cables. The internet can be considered a GAN.
Based on Purpose:
o Public Network: Open to the public, such as the internet, where
anyone can access and use its resources.
o Private Network: Restricted to a specific organization, group,
or individuals. Examples include corporate intranets and private
cloud networks.
o Hybrid Network: Combines elements of both public and private
networks, often for security and cost considerations. Hybrid
clouds, which use a mix of public and private cloud services, are
an example.
o Peer-to-Peer (P2P) Network: Devices in this type of network
communicate directly with each other without a central server.
Common in file sharing applications.
Based on Topology:
o Star Topology: Devices connect to a central hub or switch.
3
o Bus Topology: Devices share a single communication line.
o Ring Topology: Devices form a closed-loop or ring.
o Mesh Topology: Devices connect to multiple other devices,
creating redundancy.
o Hybrid Topology: A combination of two or more different
topologies.
Based on Ownership and Control:
o Public Network: Owned and operated by a public entity or
organization and accessible to anyone.
o Private Network: Owned and operated by a specific
organization, restricting access to authorized users.
o Community Network: Shared by a specific community or
group, often for a common purpose, such as a housing complex
or university campus network.
o Cooperative Network: Jointly owned and operated by multiple
organizations or entities for mutual benefit.
Based on Network Services and Applications:
o Data Network: Primarily used for data transmission and
communication, such as the internet and corporate data
networks.
o Voice Network: Designed for voice communication, such as
traditional telephone networks (PSTN) and Voice over IP (VoIP)
networks.
o Video Network: Focused on transmitting video content,
including cable TV networks and streaming platforms.
o IoT Network: Supports the connectivity of Internet of Things
(IoT) devices, sensors, and machines.
Based on Architecture:
o Client-Server Network: Devices are categorized as clients
(requesters) and servers (providers of services or resources).
Common in corporate networks and the internet.
o Peer-to-Peer (P2P) Network: Devices communicate directly
with each other without a central server. Often used in file-
sharing applications and some blockchain networks.
Network benefits
Main benefits of networks include:
Networks offer numerous benefits across various domains and industries due
to their ability to connect devices, systems, and people. Here are some key
advantages of networks:
4
Data Sharing: Networks facilitate the sharing of data and resources.
Users can access shared files, databases, and applications, leading to
improved productivity and collaboration.
Resource Sharing: Devices and resources such as printers, scanners,
and storage devices can be shared across a network, reducing costs
and optimizing resource utilization.
Centralized Data Management: Networks allow for central storage
and management of data, making it easier to back up, secure, and
access data when needed.
Remote Access: With network connectivity, users can access data
and applications from remote locations, enabling flexible work
arrangements and remote troubleshooting and support.
Cost Efficiency: Sharing resources and centralized management can
lead to cost savings in terms of hardware, software, and maintenance.
Global Connectivity: The internet, a global network, offers access to
information, services, and markets worldwide, fostering globalization
and international trade.
Security: While networks can pose security challenges, they also
enable the implementation of security measures, such as firewalls,
intrusion detection systems, and encryption, to protect data and
resources.
Data Backup and Disaster Recovery: Networks make it easier to
back up data and implement disaster recovery plans, reducing the risk
of data loss and downtime.
Resource Optimization: Networks can optimize resource usage
through load balancing and efficient routing, ensuring that resources
are used effectively.
Monitoring and Management: Network management tools allow
administrators to monitor network performance, troubleshoot issues,
and make adjustments to optimize network operation.
Innovation and Development: Networks are the foundation for
many technological advancements, such as the Internet of Things
(IoT), cloud computing, and edge computing, driving innovation in
various industries.
Accessibility and Inclusivity: Networks can enhance accessibility by
providing online education, telehealth services, and access to
information for people with disabilities or those in remote areas.
Environmental Benefits: By enabling remote work and virtual
meetings, networks can reduce the need for commuting, leading to
lower carbon emissions and environmental benefits.
Entertainment and Content Delivery: Networks enable the
streaming of movies, music, and online gaming, providing
entertainment options and revenue streams for content creators.
Research and Collaboration: Networks facilitate collaborative
research, connecting scientists, researchers, and institutions globally,
leading to advancements in various fields.
5
E-commerce and Online Shopping: Networks have transformed the
retail industry, making it possible for consumers to shop online,
compare prices, and access a wide range of products and services.
Community and Social Interaction: Social networks and online
communities bring people together, fostering social interaction,
information sharing, and support networks.
Advantages of Networks:
Disadvantages of Networks:
6
3. Maintenance Costs: Networks require ongoing maintenance, including
hardware upgrades, software updates, and security measures. These costs
can add up over time.
4. Privacy Concerns: Networks can potentially compromise individual privacy,
as personal data may be accessible or vulnerable to surveillance.
5. Downtime: Network failures or outages can disrupt communication and
business operations. Downtime can result in financial losses and customer
dissatisfaction.
6. Bandwidth Limitations: In data networks, bandwidth limitations can lead
to slow data transfer speeds and congestion, affecting performance.
7. Technical Issues: Networks can experience technical problems, including
connectivity issues, hardware failures, and software glitches, which may
require troubleshooting and downtime.
1. Computer Networks:
Internet: The global network that connects millions of computers and
devices worldwide, enabling communication, information sharing, and
online services.
Local Area Networks (LANs): Networks that connect devices within
a limited geographic area, such as a home, office, or campus, to share
resources like printers and files.
Wide Area Networks (WANs): Networks that span larger
geographical areas, often connecting multiple LANs and providing long-
distance communication capabilities.
Intranets and Extranets: Internal corporate networks (intranets) and
extended networks (extranets) for secure communication and
collaboration within and between organizations.
2. Telecommunications:
Telephone Networks: Traditional voice communication networks,
including landlines and cellular networks.
Voice over IP (VoIP): Networks that transmit voice and multimedia
content over the internet, offering cost-effective communication.
Fiber Optic Networks: High-speed data transmission networks using
optical fibers, commonly used in long-distance and high-bandwidth
applications.
3. Data Centers:
7
Data Center Networks: Networks within data centers that connect
servers, storage, and networking equipment to support cloud
computing, web services, and big data applications.
4. Transportation:
Traffic Control Systems: Networks used in traffic lights, sensors, and
cameras to manage traffic flow, improve safety, and reduce
congestion.
Fleet Management: Networks for tracking and managing vehicles in
logistics and transportation companies.
5. Healthcare:
Health Information Exchange (HIE): Networks that enable the
secure sharing of patient health records and medical data among
healthcare providers for improved patient care.
Telemedicine: Networks that support remote medical consultations
and diagnosis, bringing healthcare services to remote or underserved
areas.
6. Financial Services:
Electronic Banking: Networks that enable online banking, ATM
transactions, and electronic fund transfers.
Stock Exchanges: Networks that facilitate trading and real-time
financial data transmission for stock markets worldwide.
7. Manufacturing and Industrial Automation:
Industrial Control Systems (ICS): Networks used in factories and
industrial environments to control machinery and automation
processes.
Internet of Things (IoT): Networks connecting various sensors and
devices to collect and transmit data for monitoring and control.
8. Entertainment and Media:
Streaming Services: Networks that deliver multimedia content, such
as video and music streaming, to users over the internet.
Online Gaming: Networks that enable multiplayer online gaming
experiences, including cloud gaming services.
9. Education:
E-Learning: Networks that support online education platforms, virtual
classrooms, and remote learning opportunities.
10. Social Networks:
Social Media: Online platforms connecting individuals and
organizations for social interaction, content sharing, and
communication.
11. Agriculture:
Precision Agriculture: Networks and IoT devices used in farming to
monitor crops, manage resources, and improve crop yields.
12. Smart Cities:
Public Wi-Fi: Networks that provide internet access in public spaces,
promoting connectivity and digital services in urban areas.
Network technologies
8
Network technologies encompass a wide range of tools, protocols, hardware,
and software used to create and manage computer networks. These
technologies enable the efficient transfer of data, communication between
devices, and the sharing of resources. Here are some key network
technologies:
9
12. VPN (Virtual Private Network): VPN technology creates a secure
and encrypted connection over a public network, such as the internet. It's
commonly used for remote access, privacy, and secure communication.
13. VoIP (Voice over IP): VoIP technology allows voice calls to be
transmitted over IP networks. It's the basis for services like Skype, Zoom,
and business phone systems.
14. IoT (Internet of Things) Protocols: IoT networks use various
protocols such as MQTT, CoAP, and Zigbee to enable communication
between IoT devices and platforms.
These are just a few examples of network technologies, and the field is
constantly evolving as new innovations emerge. Network technologies are
crucial for modern communication, data sharing, and the functioning of the
internet.
1. Star Topology:
Description: In a star topology, all devices (computers, printers, etc.)
are connected to a central hub or switch.
Advantages: Easy to install and manage, fault isolation (a problem in
one device does not affect others), centralized control.
Disadvantages: If the central hub or switch fails, the entire network
can be affected.
‘
2. Bus Topology:
Description: In a bus topology, all devices are connected to a single
central cable (the "bus").
Advantages: Simple and inexpensive to set up, suitable for small
networks.
Disadvantages: Susceptible to cable failure, limited scalability,
performance degrades as more devices are added.
10
3. Ring Topology:
Description: In a ring topology, devices are connected in a circular or
ring-like fashion, where each device is connected to exactly two other
devices.
Advantages: Even data distribution, no collisions, predictable
performance.
Disadvantages: A failure in one device or cable segment can disrupt
the entire network, typically slower than star or bus topologies.
4. Mesh Topology:
Description: In a mesh topology, every device is connected to every
other device. There are two variations: full mesh (all devices connect
to all others) and partial mesh (only some devices connect to all
others).
Advantages: High redundancy, fault tolerance, can handle heavy
traffic loads.
Disadvantages: Expensive to implement and manage, complex
cabling, scalability challenges in full mesh.
5. Hybrid Topology:
Description: Hybrid topologies are a combination of two or more
different topology types. For example, a network might use a
combination of star and ring topologies.
Advantages: Can leverage the strengths of multiple topologies,
adaptable to specific network requirements.
11
Disadvantages: Can be complex to design and manage.
Each topology has its own strengths and weaknesses, and the right choice
can greatly impact a network's performance and reliability.
Network components
1. End Devices:
Computers: Such as desktops, laptops, servers, and workstations.
Mobile Devices: Such as smartphones, tablets, and wearable devices.
Printers: For document and image printing.
IP Phones: Voice-over-IP (VoIP) phones for voice communication over
the network.
IoT Devices: Sensors, cameras, and other Internet of Things (IoT)
devices.
2. Networking Hardware:
Router: A device that connects different networks and directs traffic
between them.
12
Switch: A device that connects devices within a local network and
efficiently forwards data packets based on MAC addresses.
Hub: An older networking device that broadcasts data packets to all
connected devices.
Access Point (AP): Facilitates wireless connectivity by allowing
devices to connect to a wired network wirelessly (Wi-Fi).
Firewall: A security device or software that monitors and controls
network traffic, often used to protect against unauthorized access and
threats.
Modem: Converts digital data from a network into a format suitable
for transmission over specific types of media (e.g., DSL, cable, fiber).
Gateway: Acts as an entry and exit point between different networks,
translating data formats and protocols.
3. Network Infrastructure:
Cabling: Includes Ethernet cables (e.g., CAT6), fiber-optic cables, and
coaxial cables for wired connections.
Wireless Infrastructure: Access points, wireless controllers, and
antennas for Wi-Fi networks.
Network Servers: Systems responsible for hosting applications, files,
and services on the network.
Data Centers: Facilities housing network equipment, servers, and
storage devices for centralized data processing and storage.
Racks and Cabinets: Housing units for organizing and securing
network equipment.
4. Networking Software and Protocols:
Operating Systems: Such as Windows, Linux, and macOS, which
include networking features and protocols.
Network Protocols: TCP/IP, UDP, HTTP, FTP, SNMP, DNS, DHCP, etc.,
enabling communication and data transfer.
Network Management Software: Tools for monitoring, configuring,
and managing network devices.
Virtualization Software: Such as VMware and Hyper-V, used for
creating virtual network environments and virtual servers.
5. Network Services and Applications:
Email Services: Like Microsoft Exchange and SMTP/POP/IMAP servers.
Web Services: Hosting websites and web applications.
File Sharing Services: Such as Network Attached Storage (NAS) and
cloud-based file sharing platforms.
VoIP Services: Voice over IP services for telephony and video
conferencing.
DNS Servers: Resolving domain names to IP addresses.
DHCP Servers: Assigning IP addresses automatically to devices on
the network.
6. Security Components:
Firewalls: As mentioned earlier, protecting the network from threats.
Intrusion Detection Systems (IDS) and Intrusion Prevention
Systems (IPS): Monitoring and preventing unauthorized access and
attacks.
13
Antivirus and Antimalware Software: Protecting end devices from
malicious software.
Virtual Private Networks (VPNs): Securing data transmitted over
public networks.
Authentication and Access Control Systems: Managing user
access rights and permissions.
Materials
1. Network Cables (twisted, coaxial, and Fiber optic)
3. Connectors
Types of Connectors
That’s all for this tutorial. If you like this tutorial, please don’t forget to share
it with friends through your favorite social network.
Barrel connectors that are used to connect coaxial cables are known as BNC
barrel connectors. The following image shows BNC barrel connectors.
15
Barrel connectors that are used to connect STP or UTP cables are known
as Ethernet LAN jointers or couplers. The following image shows Ethernet
LAN jointers or couplers.
Barrel connectors do not amplify the signals. It means, after joining, the total
cable length must not exceed the maximum supporting length of the cable.
For example, a standard UTP cable supports a maximum distance of 100
meters. You can join two UTP cables if their sum is not more than 100.
16
Cable 1 (45 meters) + cable 2 (30 meters) = joint cable (75 meters = 45
meters + 30 meters)
Cable 1 (65 meters) + cable 2 (45 meters) = joint cable (110 meters = 65
meters + 45 meters)
F connectors
Terminator connectors
When a device places signals on the coaxial cable, the signals travel along
the end of the cable. If another device is connected to the other end of the
cable, the device will receive the signal. But if the other end of the cable is
open, the signals will bounce and return in the same direction they came
from. To stop signals from bouncing back, all endpoints must be terminated.
17
T type connectors
RJ-11 Connectors
RJ-11 connectors have the capacity for six small pins. However, in many
cases, only two or four pins are used. For example, a standard telephone
connection uses only two pins, and a DSL modem connection uses four pins.
They have a small plastic flange on top of the connector to ensure a secure
connection.
18
RJ-45 connectors
RJ-45 connectors look likes RJ-11 connectors, but they are different. They
have 8 pins. They are also bigger in size than RJ-11. RJ-45 connectors are
mostly used in computer networks. They are used with STP and UTP cables.
Some old Ethernet implementations use only four of the eight pins. Modern
Ethernet implementation uses all 8 pins to achieve the fastest data transfer
speed.
19
One of the most popular uses of a DB-9 connector is to connect the serial
port on a computer with an external modem.
USB connectors are the most popular. They support 127 devices in the
series. All modern computers have USB ports. Most devices that you can
connect to the system have USB ports. Some examples of devices that
support or have USB ports are mice, printers, network cards, digital cameras,
keyboards, scanners, mobile phones, and flash drives.
If the device has a USB port, you can use a cable that has a USB connector
on both ends to connect the device to the computer. If the device does not
have a USB port, you can still connect the device to the USB port. For that,
you can use a cable that has a USB connector on one side and the
corresponding connector on the other.
SC connectors
Straight tip (ST) connectors are also known as bayonet connectors. They
have a long tip extending from the connector. They are commonly used with
MMF cables. They use a half-twist bayonet type of lock. An ST connector
connects to a terminating device by pushing the connector into the
terminating equipment and then twisting the connector housing to lock it in
place.
LC connectors
22
4. Cable Ties :
5. Cable clips
6. Cable Sockets
The RJ45 socket is a standard
socket for the Internet and is
used to connect network
devices. It consists of a plug for
connecting a cable. The RJ45
socket usually contains one
plug, but there can be up to
four. Sockets are used to
connect the jack to a patch
7. Wall plugs panel or to connect a
computer.
Tools
1. Cutting Tools and Stripping tools
23
2. Drilling Tools
3. Fixing Tool
4. Patching Panel
24
How to Wire a Patch Panel
When buying the patch panel, ensure it has 110 style insulation
displacement connectors. Similarly, make sure that there are enough patch
connectors that can fit the Ethernet cables. Be sure to conduct a little
research so that you can buy the right patch panel.
left arrow
right arrow
This will be the only guide indicating to which panel connector a particular
incoming cable is connected. Remember, there could be a need for system
25
upgrades changes in future, so prepare the right map and label the patch
panels accurately for this as well as problem diagnosis.
Cable jackets must be removed from the incoming Ethernet cables, and this
is best done with the help of wire strippers. Cut the jacket approximately 1.5
inches from the cable, remove and discard it. Wire strippers are also
available in hardware and electrical stores.
Sometimes you will be handling Cat6 type incoming Ethernet cables. These
often come with an internal plastic jacket, which too should be removed. Use
wire cutters in this operation and exercise absolute care. If you are using
Cat5e incoming cables, however, you will not be required to undertake this
step.
Inside the Ethernet cables, you will find four pairs of twisted wires. Unwind
these wires, but be careful not to mix them up. Four of the wires have solid
colors while the rest have a strip of white alongside the solid color.
Each of the wires should then be set to the patch panel. The connector pins
are fitted with labels containing color codes, which should guide you in
selecting the type of wire that goes to a particular connector.
Using a patch panel punch down tool, press each of the wires down firmly.
This ensures that the wire is held in place by the insulation connector teeth.
If this tool has a cutting edge, place it over the cut end of your Ethernet
cables to cut off any extra wire while pressing. If it lacks the cutting edge, on
the other hand, use your wire cutter to remove the excess wires that are
spread over the edges of your connector.
RJ45 cable is used for connect the ALL HMI and engineer station through a
switch to communicated each other. It is used to download the any
modification and which is made in graphics in engineering station.RJ45 cable
also used for communicate the printer with computer
26
1. Ethernet Cable – Category 5e or CAT5e or CAT6
2. RJ-45 Crimping tool
3. RJ45 Crimp able Connectors
27
There is two kinds of Ethernet cable is used for communication.
1. Straight Through
2. Cross over cable
STRAIGHT THROUGH Ethernet cables are the standard cable used for almost
all purposes, and are often called “patch cables”. It is highly recommend you
duplicate the color order as shown on the left. Note how the green pair is not
side-by-side as are all the other pairs. This configuration allows for longer
wire runs.
Important Instruction: Always remember that both end connector clip facing
away from you when check the color.
CROSSOVER CABLES –
28
Procedure to make RJ45 cable :
Step 1: Cut into the plastic sheath about 1 inch (2.5 cm) from the end of the
cut cable. Do not cut deep which may cause damage the insulation of core.
Step 2: Unwind and pair the similar colors. Pinch the wires between your
fingers and straighten them out in a sequence of color as u want to make
cable (Straight cable or cross over cable). The color order is important to get
correct
29
Step 3: A straight cut across the 8 wires to shorten them to 1/2 Inch (1.3
cm) from the cut sleeve to the end of the wires by crimping tool. Carefully
push all 8 unstrapped colored wires into the connector. Plastic sleeve should
be inserted proper in connector.
Wrong way: The plastic sleeve is not inside the connector where it can be
locked into place. The wires are too long. The wires should extend only 1/2
inch from the blue cut sleeve. The wires do not go all the way to the end of
the connector. The wires are too short.
Crimping the cable: Carefully place the connector into the Ethernet Crimper
and cinch down on the handles tightly. The copper splicing tabs on the
connector will pierce into each of the eight wires. There is also a locking tab
that holds the plastic sleeve in place for a tight compression fit. When you
remove the cable from the crimper, that end is ready to use.
Test the cable: Check the continuity of both connectors each other .Check
the cable threw a cable tester or ping from a computer. To check the cable
30
through computer connects both connector in two computers for cross cable
and straight cable connect through a switch then ping the computer.
N.B: When you connect two devices of different types together, you
use a straight through cable. When you connect two devices of the
same type together, you use a crossover cable. All cables are straight
through if you insert a network device between two devices of the same
kind.
5. Crimping tools
To cut the network cable of the required length from the bundle.
To remove the outer and inner jackets of the network cable.
To attach the connectors on both ends of the cable.
6. Testing tool
a
Network cable testing and troubleshooting tools
31
A network cable testing and troubleshooting tool is used for the following
purposes.
Equipment
1. Computer: A computer is a machine that can be programmed to carry
out sequences of arithmetic or logical operations (computation)
automatically.
32
3. Inverter: An inverter converts the DC voltage to an AC voltage. In
most cases, the input DC voltage is usually lower while the output AC
is equal to the grid supply voltage of either 120 volts, or 240 Volts
depending on the country.
33
6. Rack:
Known by many names, a network rack is a metal frame chassis that holds,
stacks, organizes, secures and protects various computer network and server
hardware devices. The term “network” refers to the rack actually housing
this type of hardware.
34
7. Brackets
Open-Wire
Aerial
Above-Grounds Conduits
Underground
Underwater
Built in
Semi built in
Open-Wire: Open-wire lines were historically used for
telecommunication purposes, including telephone and telegraph
systems. Multiple wires were often strung together, and different wires
were dedicated to different communication circuits.
Aerial: In networking and telecommunications, the term "aerial"
typically refers to an antenna. An antenna is a device used to transmit
and receive wireless signals, such as radio waves, microwaves, or
other electromagnetic waves. Aerials play a crucial role in wireless
communication, including wireless networking, cellular
communications, and broadcasting. Here are some key points about
aerials in networking:
36
Satellite Communication: In satellite communication, both ground-
based and satellite-based antennas are used to establish connections with
satellites in orbit. Ground stations use directional aerials to communicate
with satellites, and the satellites themselves have aerials to transmit
signals back to Earth.
MIMO (Multiple Input, Multiple Output): In advanced wireless
technologies like 4G and 5G, multiple-input, multiple-output (MIMO)
systems use multiple aerials at both the transmitter and receiver to
improve signal quality and increase data throughput.
Above-Grounds Conduits:
Above-ground conduits, also known as overhead conduits or overhead cable
trays, are physical structures used in networking and telecommunications to
support and protect cables, wires, and other infrastructure components.
They are typically installed above the ground or overhead, often attached to
walls, ceilings, or support structures. Above-ground conduits have several
applications in networking:
Data Centers: In data centers, where large quantities of cables are used to
connect servers, switches, and other networking equipment, above-ground
conduits are used to route and protect cables. They help maintain cable
organization and facilitate maintenance and changes.
37
Suspended Ceilings: In office buildings and commercial environments,
above-ground conduits can be used to route cables through
suspended(hang) ceilings, providing a clean and organized appearance.
Maintenance Access: They allow easy access to cables for maintenance,
inspection, and future upgrades. This is particularly important in data centers
and other networking environments.
Underground
"Underground" in the context of networking and telecommunications
typically refers to the deployment of cables, conduits, or infrastructure
beneath(under) the ground. Underground installations are common for
various purposes in networking and utilities. Here are some key aspects of
underground installations in networking:
Data Centers: Data centers may have underground cable routes to connect
different parts of the facility.
Residential and Commercial Utilities: Utilities like electricity, water, and gas
may use underground installations to supply homes and businesses. These
utilities may share underground infrastructure with telecommunications
networks, as they can use common conduits to reduce installation costs and
environmental impact.
38
Underwater:
In networking and telecommunications, "underwater" typically refers to the
deployment of network infrastructure, cables, and communication systems
beneath the surface of bodies of water, such as oceans, seas, rivers, and
lakes. Underwater networking is essential for a variety of applications,
including:
Wood
Stainless
39
3. Cable termination
twisted pair cabling
Fiber-optic cabling
Coaxial cabling
shielded twisted pair
3. Connection of Network Media
Labelling
Properly labeling your network cables can be critical for a successful
installation, as well as for your network in the long run. Using labeled cables
helps prevent people from unplugging the wrong cable at the wrong time,
1. Patching:
40
Patching refers to the physical connection of cables. This process involves
connecting network cables from active devices (e.g., computers, servers,
switches) to passive devices (e.g., patch panels or wall outlets) or to other
active devices.
Patch panels are commonly used in data centers and server rooms to
terminate and manage network connections. Each port on a patch panel
corresponds to a specific location or device.
Cables are connected to the patch panel on one end and to the active
devices or wall outlets on the other end, forming the physical links in the
network.
2. Tagging:
41
Compliance and Standards: In some industries and data centers,
compliance with labeling and documentation standards is required for
regulatory reasons.
1. Requirements Gathering:
Select appropriate routers and switches. Cisco, Juniper, and other vendors
offer various options.
Configure routing protocols (e.g., OSPF, BGP) based on the network's size
and complexity.
5. Security:
42
Implement security measures, including firewalls, intrusion
detection/prevention systems, and access control lists (ACLs).
Encrypt sensitive data with technologies like VPNs or SSL/TLS.
6. VLANs (Virtual LANs):
Divide the network into VLANs to segregate traffic and improve security.
Plan VLAN assignments based on department, function, or security
requirements.
7. Wireless Networks (Wi-Fi):
What Is an IP Address?
An IP address allows computers to send and receive data over the internet.
Most IP addresses are purely numerical, but as internet usage grows, letters
have been added to some addresses.
Types of IP Addresses
43
There are four different types of IP addresses: public, private, static, and
dynamic. While the public and private are indicative of the location of the
network—private being used inside a network while the public is used
outside of a network—static and dynamic indicate permanency.
The Internet Protocol (IP) is a set of networking rules that enable computers
to communicate over the Internet. IP has two primary purposes:
When you send something online, the IP breaks data into smaller chunks
called packets. Each packet has attached IP info that ensures whatever you
send reaches the right recipient. This process occurs automatically and looks
like this:
What Is IPv4?
IPv4 is the first major version of the Internet Protocol that's been the go-to
communication model for the Internet since the 1980s.
45
IPv4 assigns 32-bit IP addresses to devices. Each address has four groups of
numbers (8-bit sections called octets) separated by a period, such as:
192.158.1.38
The value of each octet ranges from 0 to 255, so the IPv4 model includes
every address between 0.0.0.0 and 255.255.255.255. All IPv4 addresses
have two parts:
The network ID (the first three octets) that indicates which network
the device is on.
The host ID (the fourth octet) that identifies the specific device on
that network.
46
IPv4 Features
What Is IPv6?
IPv6 is the latest Internet Protocol version and the successor to IPv4. IPv6
aims to fulfill the need for more IP addresses, the main issue of the previous
IP. Another common name for IPv6 is IPng (Internet Protocol next
generation).
IPv6 addresses are significantly longer than IPv4 variants (eight 16-bit blocks
with groups of four symbols, often called hextets or quartets) and are
alphanumeric. Also, whereas IPv4 relies on periods for formatting, IPv6 uses
colons, such as in this example:
2001:0db8:0000:0001:0000:ff00:0032:7879
The model omits leading zeros (like in IPv4), and you'll sometimes find IP
addresses that have a double colon (::) that designate any number of
0 bits (such as 1201:2db7::fa00:0040:6669, in which the third, fourth, and
fifth hextets are 0000).
While IPv6 is more sustainable than IPv4, the majority of the Internet
still uses IPv4. Upgrading all the routers, servers, and switches that have
used IPv4 for decades takes a lot of time and money.
IPv6 Features
Both IPv4 and IPv6 identify connected devices on the network. However,
there are slight differences in the way they operate. IPv6 is the newer IP
version and was introduced to address the limitations IPv4 posed on the
availability of IP addresses.
In IPv4, binary bits are separated by a dot (.); IPv6 separates binary bits
by a colon (:).
IPv4 offers 12 header fields and IPv6 offers eight header fields.
Looking up an IP address
There are many ways to look up the IP address of a device. However, the
simplest way is to type what is my IP address? into an internet browser, such
as Google Chrome. The returning address will be the public IP address of the
requesting device.
48
1. Select Start>Settings>Network & internet>Wi-Fi and the Wi-Fi
network you're connected to.
2. Under Properties, look for your IP address listed next to IPv4 address.
1. Unicast IP Addresses
host.
2. Multicast IP Addresses
49
3. Broadcast IP Addresses
This type of IP is used to send data to all the possible destinations within the
broadcast domain.
IP Address Terminology
Static means the IP address never changes as long as you stay with the
same provider or same server.
Public means the IP address can be visited from any computer in the world.
Private means the IP address can only be used by those on the same
network.
Shared means other people use your IP address for their connection or
websites.
Dedicated means no one else uses your IP address for their connection or
websites.
Class identifies the range of your IP address and the default subnet mask.
There are two versions of IP addresses, IPv4 and IPv6. In this tutorial, we will
discuss how IPv4 organizes IP addresses. In IPv4, there are 4,294,967,296 IP
addresses. These addresses are organized into five IP classes. These classes
are A, B, C, D, and F.
Computers understand only the binary system. The binary system uses bits
to store and process data. A bit can store only two values: zero (0) and
one (1). If the value 'zero' is stored, the bit is known as the OFF bit. If the
value 'one' is stored, the bit is known as ON bit. The binary system uses a
unique combination of ON and OFF bits for each letter and number.
Using IP addresses in the binary format is not easy. But the good news is that
unless you are a software developer or a network administrator, you never
need to write and use IP addresses in binary notation. You can write and use
them in decimal format. The software program that you use to assign the IP
address on the interface automatically converts the assigned IP address into
binary format.
If you are a software developer or a network administrator, you can also use
IP addresses in decimal format. But you should also understand how IP
addresses work in the binary system. Since interfaces use the binary system
to process IP addresses, learning IP addresses in binary format can make
your IP related tasks easy.
In short, you can write and use IP addresses in two notations: binary notation
and decimal-dotted notation. In binary notation, all the individual bits of each
byte are expressed as a binary number. In decimal notation, all four binary
bytes are converted and expressed to their decimal equivalent numbers.
IP addresses structure
An IP address consists of 32 bits. These bits are divided into four sections.
Sections are separated by a dot (.). Each section contains 8 bits. 8 bits are
equal to 1 byte or 1 octet. The following image shows how bits are organized
in an IP address.
By using 32 bits with two possible values for each position, the binary system
can create 4,294,967,296 (232) unique combinations or IP addresses. These
51
addresses can be used without any addressing scheme or with an addressing
scheme that arranges them in such a way that it becomes easier to access
them.
If addresses are used without any addressing scheme, all routers on the
network will need to store the address of each and every interface on the
network. Depending on the size of the network, this may affect routing. If the
network size is small, it can make routing slow. If the network size is
moderate, it can make routing very slow. If the network size is large, it can
make routing completely impossible.
IP address classes
Based on the following rules, IP addresses are categorized into five classes;
A, B, C, D, and E.
In class A, the first bit of the first byte always remains OFF (0).
In class B, the first bit of the first byte always remains ON and the second bit
of the first byte always remains OFF.
In class C, the first two bits of the first byte always remain ON and the third
bit of the first byte always remains OFF.
In class D, the first three bits of the first byte always remain ON and the
fourth bit of the first byte always remains OFF.
In class E, the first four bits of the first byte always remain ON.
By turning all remaining bits of the first byte ON and OFF, we can make the
first and last address of that class.
The following table lists the value of the first byte or octet in both notations.
Class Fix bits First address (binary Last address (binary First address (de
notation) notation) notation)
A 0 00000000 01111111 0
52
In the second level of the hierarchical addressing scheme, each address is
further divided into two addresses: the network address and host address.
To learn more about how the network addresses and host addresses work,
you can check the following tutorial.
The following image shows how bits are defined for network addresses and
host addresses in each IP class.
In IP addresses, host bits are flexible. Administrators can adjust the length of
host bits to meet the requirements of their networks. They can use host bits
as network bits to utilize maximum addresses from all available addresses. If
hosts bits are used as the network bits, this is known as the subnetting.
Class D and E are not used for the host addressing. Class D addresses are
used for multicast addresses. Class E addresses are reserved for research
and development purposes. Multicast addresses are explained in the
following tutorial.
53
IP addresses use an additional component to distinguish between network
addresses and host addresses. This component is known as the subnet
mask. In simple words, the subnet mask tells, how many bits in the IP
address are used as the network address and how many bits are left for the
host address.
IP addresses are always written with the subnet mask. The following table
lists the default subnet mask for all IP classes.
A 255.0.0.0 11111111.00000000.00000000.00000000
Examples of IP addresses
1.2.3.4 00000001.00000010.00000011.00000100
255.0.0.0 11111111.00000000.00000000.00000000
54
10.10.10.10 00001010.00001010.00001010.00001010
255.0.0.0 11111111.00000000.00000000.00000000
25.147.191.14 00011001.10010011.10111111.00001110
255.0.0.0 11111111.00000000.00000000.00000000
95.86.75.4 01011111.01010110.01001011.00000100
255.0.0.0 11111111.00000000.00000000.00000000
127.0.0.1 01111111.00000000.00000000.00000001
255.0.0.0 11111111.00000000.00000000.00000000
129.12.36.42 10000001.00001100.00100100.00101010
255.255.0.0 11111111.11111111.00000000.00000000
168.172.1.1 10101000.10101100.00000001.00000001
255.255.0.0 11111111.11111111.00000000.00000000
175.66.43.12 10101111.01000010.00101011.00001100
255.255.0.0 11111111.11111111.00000000.00000000
145.186.175.23 10010001.10111010.10101111.11101010
4 11111111.11111111.00000000.00000000
255.255.0.0
190.60.152.25 10111110.00111100.10011000.00011001
255.255.0.0 11111111.11111111.00000000.00000000
192.168.1.1 11000000.10101000.00000001.00000001
255.255.255.0 11111111.11111111.11111111.00000000
210.20.30.40 11010010.00010100.00011110.00101000
255.255.255.0 11111111.11111111.11111111.00000000
216.123.145.1 11011000.01111011.10010001.00010000
6 11111111.11111111.11111111.00000000
55
255.255.255.0
220.86.76.43 11011100.01010110.01001100.00101011
255.255.255.0 11111111.11111111.11111111.00000000
220.60.80.100 11011100.00111100.01010000.01100100
255.255.255.0 11111111.11111111.11111111.00000000
Benefits of subnetting
Questions
A. If you subtract the number of network bits from the number of total bits,
you can calculate the total number of hosts a subnet can have.
A. Small networks don’t require subnets. However, large LANs are prime
candidates as IP address allocation will be impactful with group devices to
maximize organization.
Q. What is an IP class?
Binary system
57
Digits: In the binary system, each digit is called a "bit," which is short for
"binary digit." A bit can have one of two values, either 0 or 1.
Place Value: Just like in the decimal system, the binary system uses place
value. Each position from right to left represents a power of 2. For example,
in the binary number 1101, the rightmost digit is 2^0, the next is 2^1, the
next is 2^2, and the leftmost digit is 2^3.
Boolean Logic: The binary system aligns with Boolean logic, where 0 typically
represents "false" or "off," and 1 represents "true" or "on." This is
fundamental in computer programming and digital circuit design.
Binary is the basis for all digital communication and computation. It's used
for encoding, storage, processing, and transmission of data in computers and
other digital systems, making it a fundamental concept in the field of
information technology.
Types of Subnetting
There are two types of Subnetting FLSM and VLSM. In FLSM, all subnets have
equal number of host addresses and use same Subnet mask. In VLSM, subnets have
flexible number of host addresses and use different subnet mask.
There are two types of Subnetting: FLSM and VLSM. In FLSM, all subnets
have an equal number of host addresses and use the same subnet mask. In
VLSM, subnets have a flexible number of host addresses. They use a subnet
mask based on the number of hosts.
58
Default IP subnets have a large number of IP addresses. Most networks do
not need too many IP addresses. If they use the default subnet, all unused IP
addresses become useless. To utilize free IP addresses, we use subnetting.
FLSM stands for Fixed Length Subnet Mask. In it, we break the default IP
subnet into the same-sized subnets. For example, if the default subnet has
12 IP addresses, we can break it into three equal-sized subnets having 4 IP
addresses in each.
VLSM stands for Variable Length Subnet Mask. In it, we break the default IP
subnet into subnets having various sizes. For example, if the default subnet
has 12 IP addresses, we can break it into two subnets where the first subnet
has 8 IP addresses and the second subnet has 4 IP addresses.
The following table lists the differences between FLSM and VLSM.
59