COMPUTER NETWORK SETUP
UNIT CODE: 0612 451 04A
Unit Description:
This unit covers the competencies required in terminating network cables, connecting network
cables and performing computer network Maintenance.
Summary of Learning Outcomes
1. Terminate network cables
2. Connect network cables
3. Perform computer network Maintenance
Terminate network cables
Fundamentals of networking
Definition of network
A Computer Network is a system where two or more devices are linked together
to share data, resources and information.
These networks can range from simple setups, like connecting two devices in
your home, to massive global systems, like the Internet. Below are some uses of
computer networks
Definition of network terminologies
Network: A group of connected computers and devices that can communicate and
share data with each other.
Node: Any device that can send, receive, or forward data in a network. This
includes laptops, mobiles, printers, earbuds, servers, etc.
Networking Devices: Devices that manage and support networking functions.
This includes routers, switches, hubs, and access points.
Transmission Media: The physical or wireless medium through which data
travels between devices.
Wired media: Wired media, also known as guided media, are physical pathways
like cables that transmit data between devices in a computer network. The three
main types are twisted pair cables, which are common for local networks; coaxial
cables, used for higher speed and longer distances like broadband; and fiber optic
cables, which use light to transmit data at extremely high speeds over long
distances. Wired media offers higher speed, reliability, and security compared to
wireless alternatives.
Wireless media: Wireless communication is also referred to as Unguided Media
or Unbounded transmission media.
In this mode, no physical medium is required for the transmission of electromagnetic
signals. In wireless communication, we can transfer our message through the air,
water or vacuum i.e. Infrared, Radio wave, Microwave wave. So, we don't worry
about the cables or any material to transfer messages, as we can send out a message
without and medium. Wi-Fi, Bluetooth, infrared
Service Provider Networks: Networks offered by external providers that allow
users or organizations to lease net
Types of Network Topology
Network topology refers to the arrangement of different elements like nodes, links, or
devices in a computer network. Common types of network topology include bus, star,
ring, mesh, and tree topologies, each with its advantages and disadvantages.
What is Network Topology?
Network topology is the way devices are connected in a network. It defines how these
components are connected and how data transfer between the network.
Understanding the different types of network topologies can help in choosing the right
design for a specific network.
There are two major categories of Network Topology i.e.
Physical Network topology and Logical Network Topology.
Physical Network Topology refers to the actual structure of the physical medium for the
transmission of data.
Logical network Topology refers to the transmission of data between devices present in
the network irrespective of the way devices are connected. The structure of the network is
important for the proper functioning of the network. one must choose the most suitable
topology as per their requirement.
Types of Network Topology
Below mentioned are the types of Network Topology
Point to Point Topology
Mesh Topology
Star Topology
Bus Topology
Ring Topology
Tree Topology
Hybrid Topology
Point to Point Topology
Point-to-point topology is a type of topology that works on the functionality of the sender and
receiver. It is the simplest communication between two nodes, in which one is the sender and the
other one is the receiver. Point-to-Point provides high bandwidth.
Point to Point Topology
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel. Every
device is connected to another via dedicated channels. These channels are known as links. In
Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
Mesh Topology
Suppose, the N number of devices are connected with each other in a mesh topology, the
total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices
connected to each other, hence the total number of ports required by each device is 4. The
total number of ports required = N * (N-1).
Suppose, N number of devices are connected with each other in a mesh topology, then the
total number of dedicated links required to connect them is N C 2 i.e. N(N-1)/2. In Figure 1,
there are 5 devices connected to each other, hence the total number of links required is 5*4/2
= 10.
Advantages of Mesh Topology
Communication is very fast between the nodes.
Mesh Topology is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
Provides security and privacy.
Disadvantages of Mesh Topology
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet service
providers are connected to each other via dedicated channels. This topology is also used in
military communication systems and aircraft navigation systems.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be
intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45
cables are used to connect the computers. In Star Topology, many popular Ethernet LAN
protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
Star Topology
Advantages of Star Topology
If N devices are connected to each other in a star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports
required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
Disadvantages of Star Topology
If the concentrator (hub) on which the whole topology relies fails, the whole system will
crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office where all
computers are connected to a central hub. This topology is also used in wireless networks where
all devices are connected to a wireless access point.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a
single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because
if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access
Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha,
CDMA, Slotted Aloha, etc.
Bus Topology
Advantages of Bus Topology
If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10
Mbps.
The cost of the cable is less compared to other topologies, but it is used to build small
networks.
Bus topology is familiar technology as installation and troubleshooting techniques are well
known.
CSMA is the most common method for this type of topology.
Disadvantages of Bus Topology
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this, various
protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are connected to a
single coaxial cable or twisted pair cable. This topology is also used in cable television networks.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then the
data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring
Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.
Ring Topology
The most common access method of ring topology is token passing.
Token passing: It is a network access method in which a token is passed from one node to
another node.
Token: It is a frame that circulates around the network.
Operations of Ring Topology
One station is known as a monitor station which takes all the responsibility for performing
the operations.
To transmit the data, the station has to hold the token. After the transmission is done, the
token is to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in the ring.
There are two types of token release techniques: Early token release releases the token just
after transmitting the data and Delayed token release releases the token after the
acknowledgment is received from the receiver.
Advantages of Ring Topology
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Disadvantages of Ring Topology
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the whole topology.
Less secure.
Tree Topology
Tree topology is the variation of the Star topology. This topology has a hierarchical flow of
data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration) are used.
Tree Topology
In tree topology, the various secondary hubs are connected to the central hub which contains the
repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to
the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It
is a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.
Advantages of Tree Topology
It allows more devices to be attached to a single central hub thus it decreases the distance that
is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Disadvantages of Tree Topology
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
A common example of a tree topology is the hierarchy in a large organization. At the top of the
tree is the CEO, who is connected to the different departments or divisions (child nodes) of the
company. Each department has its own hierarchy, with managers overseeing different teams
(grandchild nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected
to their respective managers and departments.
Hybrid Topology
Hybrid Topology is the combination of all the various types of topologies we have studied
above. Hybrid Topology is used when the nodes are free to take any form. It means these can be
individuals such as Ring or Star topology or can be a combination of various types of topologies
seen above. Each individual topology uses the protocol that has been discussed earlier.
Hybrid Topology
The above figure shows the structure of the Hybrid topology. As seen it contains a combination
of all different types of networks.
Advantages of Hybrid Topology
This topology is very flexible .
The size of the network can be easily expanded by adding new devices.
Disadvantages of Hybrid Topology
It is challenging to design the architecture of the Hybrid Network.
Hubs used in this topology are very expensive.
The infrastructure cost is very high as a hybrid network requires a lot of cabling and
network devices .
A common example of a hybrid topology is a university campus network. The network may have
a backbone of a star topology, with each building connected to the backbone through a switch or
router. Within each building, there may be a bus or ring topology connecting the different rooms
and offices. The wireless access points also create a mesh topology for wireless devices. This
hybrid topology allows for efficient communication between different buildings while providing
flexibility and redundancy within each building.
Why is Network Topology Important?
Network Topology is important because it defines how devices are connected and how they
communicate in the network. Here are some points that defines why network topology is
important.
Network Performance: Upon choosing the appropriate topology as per requirement, it helps
in running the network easily and hence increases network performance.
Network Reliability: Some topologies like Star, Mesh are reliable as if one connection fails,
they provide an alternative for that connection, hence it works as a backup.
Network Expansion : Chosing correct topology helps in easier expansion of Network as it
helps in adding more devices to the network without disrupting the actual network.
Network Security: Network Topology helps in understanding how devices are connected
and hence provides a better security to the network.
In conclusion, network topologies play a crucial role in determining the efficiency and reliability
of a computer network. Each topology, whether it’s bus, star, ring, mesh, or tree, offers unique
benefits and potential drawbacks. By understanding these different arrangements, network
designers can choose the most appropriate topology to meet the specific needs of their systems,
ensuring optimal performance and connectivity.
Components of a computer networks
Network components : are the individual hardware and software pieces, like routers, switches,
servers, clients, transmission media, and protocols, that work together to create a communication
system, allowing devices to connect and share information.
These components provide the infrastructure and services for data transmission, network
operations, and resource sharing.
Hardware Components End Devices (Clients/Hosts): Devices used by people, such as :
computers, smartphones, and laptops, that connect to the network to access resources.
Servers: Powerful computers that store, manage, and provide data, applications, or other
network resources to clients.
Network Interface Cards (NICs): Hardware that enables a computer to connect to a network.
Transmission Media: The physical or wireless path used to connect devices, such as cables
(Ethernet, fiber optic) or wireless signals.
Switches: Devices that connect multiple devices within a local network, directing data to the
correct destination based on the physical address.
Routers: Connect different computer networks, directing data traffic between them and across
larger networks like the internet.
Wireless Access Points (WAPs): Allow devices to connect to a network wirelessly.
Firewalls: Security devices that monitor and control incoming and outgoing network traffic
based on predefined security rules.
Hubs: Older devices that connect multiple network devices, but they broadcast data to all
connected devices, unlike switches.
Software Components
Protocols: Sets of rules that govern how data is formatted, transmitted, and received across a
network, ensuring devices can communicate effectively.
Network Operating System (NOS): Software that runs on servers and other network devices,
managing network resources and services.
Types of network devices
Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
Network devices are physical devices that allow hardware on a computer network to
communicate and interact with each other.
Network devices like hubs, repeaters, bridges, switches, routers, gateways, and brouters help
manage and direct data flow in a network.
They ensure efficient communication between connected devices by controlling data transfer,
boosting signals, and linking different networks.
Each device serves a specific role, from simple data forwarding to complex routing between
networks.
Types of Network Devices
Functions of Network Devices
Network devices help to send and receive data between different devices.
Network devices allow devices to connect to the network efficiently and securely.
Network devices Improve network speed and manage data flow better.
It protect the network by controlling access and preventing threats.
Expand the network range and solve signal problems.
Common Types of Networking Devices and Their Uses
Network devices work as a mediator between two devices for transmission of data, and thus play
a very important role in the functioning of a computer network. Below are some common
network devices used in modern networks:
Access Point
Modems
Firewalls
Repeater
Hub
Bridge
Switch
Routers
Gateway
Brouter
NIC
Access Point
An access point in networking is a device that allows wireless devices, like smartphones and
laptops, to connect to a wired network. It creates a Wi-Fi network that lets wireless devices
communicate with the internet or other devices on the network. Access points are used to extend
the range of a network or provide Wi-Fi in areas that do not have it. They are commonly found in
homes, offices, and public places to provide wireless internet access.
Modems
Modems is also known as modulator/demodulator is a network device that is used to
convert digital signal into analog signal of different frequencies and transmits these signal to a
modem at the receiving location. These converted signals can be transmitted over the cable
systems, telephone lines, and other communication mediums. A modem is also used to convert
analog signal back into digital signal. Modems are generally used to access internet by customers
of an Internet Service Provider (ISP).
Types of Modems
There are four main types of modems:
DSL Modem: Uses regular phone lines to connect to the internet but it is slower compared to
other types.
Cable Modem: Sends data through TV cables, providing faster internet than DSL.
Wireless Modem: Connects devices to the internet using Wi-Fi relying on nearby Wi-Fi
signals.
Cellular Modem: Connects to the internet using mobile data from a cellular network not Wi-
Fi or fixed cables.
Firewalls
A firewall is a network security device that monitors and controls the flow of data between your
computer or network and the internet. It acts as a barrier, blocking unauthorized access while
allowing trusted data to pass through. Firewalls help protect your network from hackers, viruses,
and other online threats by filtering traffic based on security rules. Firewalls can be physical
devices (hardware), programs (software), or even cloud-based services, which can be offered
as SaaS, through public clouds, or private virtual clouds.
Repeater
A repeater operates at the physical layer. Its main function is to amplify (i.e., regenerate) the
signal over the same network before the signal becomes too weak or corrupted to extend the
length to which the signal can be transmitted over the same network. When the signal becomes
weak, they copy it bit by bit and regenerate it at its star topology connectors connecting
following the original strength. It is a 2-port device.
Hub
A hub is a multiport repeater. A hub connects multiple wires coming from different branches, for
example, the connector in star topology which connects different stations. Hubs cannot filter
data, so data packets are sent to all connected devices. In other words, the collision domain of all
hosts connected through Hub remains one. Also, they do not have the intelligence to find out the
best path for data packets which leads to inefficiencies and wastage.
Types of Hub
Active Hub: These are the hubs that have their power supply and can clean, boost, and relay
the signal along with the network. It serves both as a repeater as well as a wiring center.
These are used to extend the maximum distance between nodes.
Passive Hub: These are the hubs that collect wiring from nodes and power supply from the
active hub. These hubs relay signals onto the network without cleaning and boosting them
and can’t be used to extend the distance between nodes.
Intelligent Hub: It works like an active hub and includes remote management capabilities.
They also provide flexible data rates to network devices. It also enables an administrator to
monitor the traffic passing through the hub and to configure each port in the hub.
Bridge
A bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of
filtering content by reading the MAC addresses of the source and destination. It is also used for
interconnecting two LANs working on the same protocol. It typically connects multiple network
segments and each port is connected to different segment. A bridge is not strictly limited to two
ports, it can have multiple ports to connect and manage multiple network segments. Modern
multi-port bridges are often called Layer 2 switches because they perform similar functions.
Types of Bridges
Transparent Bridges: These are the bridge in which the stations are completely unaware of
the bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e.
bridge forwarding and bridge learning.
Source Routing Bridges: In these bridges, routing operation is performed by the source
station and the frame specifies which route to follow. The host can discover the frame by
sending a special frame called the discovery frame, which spreads through the entire network
using all possible paths to the destination.
Switch
A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large
number of ports imply less traffic) and performance. A switch is a data link layer device. The
switch can perform error checking before forwarding data, which makes it very efficient as it
does not forward packets that have errors and forward good packets selectively to the correct
port only. In other words, the switch divides the collision domain of hosts, but the broadcast
domain remains the same.
Types of Switch
Unmanaged Switches: These switches have a simple plug-and-play design and do not offer
advanced configuration options. They are suitable for small networks or for use as an
expansion to a larger network.
Managed Switches: These switches offer advanced configuration options such
as VLANs, QoS, and link aggregation. They are suitable for larger, more complex networks
and allow for centralized management.
Smart Switches: These switches have features similar to managed switches but are typically
easier to set up and manage. They are suitable for small- to medium-sized networks.
Layer 2 Switches: These switches operate at the Data Link layer of the OSI model and are
responsible for forwarding data between devices on the same network segment.
Layer 3 switches: These switches operate at the Network layer of the OSI model and can
route data between different network segments. They are more advanced than Layer 2
switches and are often used in larger, more complex networks.
PoE Switches: These switches have Power over Ethernet capabilities, which allows them to
supply power to network devices over the same cable that carries data.
Gigabit switches: These switches support Gigabit Ethernet speeds, which are faster than
traditional Ethernet speeds.
Rack-Mounted Switches: These switches are designed to be mounted in a server rack and
are suitable for use in data centers or other large networks.
Desktop Switches: These switches are designed for use on a desktop or in a small office
environment and are typically smaller in size than rack-mounted switches.
Modular Switches: These switches have modular design, which allows for easy expansion
or customization. They are suitable for large networks and data centers.
Router
A router is a device like a switch that routes data packets based on their IP addresses. The router
is mainly a Network Layer device. Routers normally connect LANs and WANs and have a
dynamically updating routing table based on which they make decisions on routing the data
packets. The router divides the broadcast domains of hosts connected through it.
Gateway
A gateway, as the name suggests, is a passage to connect two networks that may work upon
different networking models. They work as messenger agents that take data from one system,
interpret it, and transfer it to another system. Gateways are also called protocol converters and
can operate at any network layer. Gateways are generally more complex than switches or routers.
Brouter
It is also known as the bridging router is a device that combines features of both bridge and
router. It can work either at the data link layer or a network layer. Working as a router, it is
capable of routing packets across networks and working as the bridge, it is capable of filtering
local area network traffic.
NIC
NIC or network interface card is a network adapter that is used to connect the computer to the
network. It is installed in the computer to establish a LAN. It has a unique id that is written on
the chip, and it has a connector to connect the cable to it. The cable acts as an interface between
the computer and the router or modem. NIC card is a layer 2 device which means that it works
on both the physical and data link layers of the network model.
Conclusion
In conclusion, different types of network devices play essential roles in keeping a network
running smoothly and securely. Devices like routers, switches, modems, and access points help
connect devices, manage data traffic, and ensure efficient communication. Firewalls add a layer
of security, while other tools extend the network’s reach or make it easier to manage. Each
device has a specific function, but together they create a reliable and secure network
environment for both personal and business use.