0% found this document useful (0 votes)
11 views7 pages

basics of networking

The document provides an overview of networking fundamentals, including types of networks (LAN, WAN, MAN), networking components (clients, servers, routers, switches, hubs), and networking media (copper cables, fiber-optic cables, wireless signals). It also discusses network topologies, IP addressing, network security measures, and management practices. Additionally, sample questions are included to test understanding of the material.

Uploaded by

romanojonga781
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views7 pages

basics of networking

The document provides an overview of networking fundamentals, including types of networks (LAN, WAN, MAN), networking components (clients, servers, routers, switches, hubs), and networking media (copper cables, fiber-optic cables, wireless signals). It also discusses network topologies, IP addressing, network security measures, and management practices. Additionally, sample questions are included to test understanding of the material.

Uploaded by

romanojonga781
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

LCS 1301 PRACTICAL SKILL DEVELOPMENT

Topic: Basics of networking


1. Introduction to Networking:
- Networking facilitates communication and resource sharing among devices, enabling tasks
like file sharing, printing, and collaborative work.
- It plays a crucial role in modern computing, allowing businesses to operate efficiently,
individuals to access information globally, and devices to communicate seamlessly.
2. Types of Networks:
- Local Area Network (LAN): Often found in homes, offices, and schools, LANs allow
devices within a limited area to share resources like files, printers, and internet access.
- Wide Area Network (WAN): WANs connect geographically dispersed LANs, enabling
communication over long distances. Examples include the internet and corporate networks
spanning multiple locations.
- Metropolitan Area Network (MAN): MANs cover larger areas like cities or towns,
providing connectivity to local businesses, universities, and government agencies.
3. Networking Components:
Nodes:
- Client Devices: These include computers, laptops, tablets, smartphones, and other devices
that users interact with to access network resources and services. Clients typically run
applications and rely on servers for data and services.
- Servers: Servers provide resources and services to client devices on the network. Examples
include file servers for storing and sharing files, web servers for hosting websites, email servers
for managing email communication, and database servers for storing and retrieving data.
- Networking Devices: These devices facilitate communication and data transfer within the
network. Common networking devices include routers, switches, hubs, and access points.
Networking Devices:
- Routers: Routers are networking devices that connect multiple different networks together
and route data packets between them. They use routing tables to determine the best path for
data transmission based on destination IP addresses. Routers operate at the network layer
(Layer 3) of the OSI model. Routers use routing tables to determine the best path for data
packets to reach their destination network. They consider factors like network topology, traffic
load, and link status when making routing decisions.

Prepared by: Businge Christian – 2024 Lira University


- Switches: Switches are devices that connect multiple devices within a single network and
forward data frames between them. Switches determine the destination of data frames, enabling
more efficient and secure data transmission. Switches operate at the data link layer (Layer 2)
of the OSI model. Switches forward data frames within a network based on MAC addresses.
They build and maintain MAC address tables to determine the appropriate port for forwarding
data.

- Hubs: Hubs are simple networking devices that connect multiple devices within a network,
allowing them to communicate with each other. However, hubs operate at the physical layer
(Layer 1) of the OSI model and broadcast data to all devices on the network, resulting in
collisions and inefficient use of bandwidth.

- Wireless access Points: Wireless access points (WAPs) are devices that enable wireless
devices to connect to a wired network. They serve as wireless bridges, allowing wireless clients
such as laptops, smartphones, and tablets to communicate with the wired network
infrastructure.

Prepared by: Businge Christian – 2024 Lira University


Networking Media:
- Copper Cables: Copper cables, such as twisted-pair cables (e.g., Cat5e, Cat6) for connecting
devices to a network using rj45 connector and coaxial cables mostly used in TV technology
and cctv cameras, are commonly used for wired network connections. They transmit electrical
signals carrying data between devices.
Twisted ethernet cable is in two categories shielded twisted pair cable (STP) mainly for outdoor
and unshielded twisted pair cable (UTP) mainly for indoor but all terminated in the same way
with RJ45.

Termination of twisted pair cable


Termination of the cable depends on the type of the cable needed to be used for a particular
task following T568A and T568B arrangements using RJ45.

Straight-through and crossover cables are two types of Ethernet cables used to connect devices
in a network, but they serve different purposes due to the way they are wired. Here's the
difference between them:

Straight-Through Cable:

• Purpose: A straight-through cable is used to connect devices that have different functions
in a network, such as connecting a computer to a switch or router.

Prepared by: Businge Christian – 2024 Lira University


• Wiring Configuration: In a straight-through cable, the wiring configuration at one end of
the cable is identical to the configuration at the other end. This means that the wire colours
match from pin to pin.
• Pin Configuration: Straight-through cables use the T568A or T568B wiring standard,
where the wire order is the same on both ends. For example, pin 1 on one end connects to
pin 1 on the other end, pin 2 to pin 2, and so on.
• Typical Use Cases: Straight-through cables are commonly used for connecting devices
with different roles in a network, such as connecting a computer to a switch, router, or
modem.

Colour codes for T568B for both ends on the RJ45.


1.white/orange, 2.orange, 3.white/green, 4.blue, 5.white/blue, 6.green, 7.white/brown, 8.brown

Or: T568A for both ends on the RJ45

Crossover Cable:

• Purpose: A crossover cable is used to connect devices of the same type directly to each
other, such as connecting two computers or two switches without an intermediary device
like a router.
• Wiring Configuration: In a crossover cable, the wiring configuration at one end of the
cable is reversed compared to the configuration at the other end. This means that the wire
colours do not match from pin to pin.
• Pin Configuration: Crossover cables use a combination of the T568A and T568B wiring
standards. For example, pin 1 on one end connects to pin 3 on the other end, pin 2 to pin
6, pin 3 to pin 1, and so on.
• Typical Use Cases: Crossover cables are commonly used for direct device-to-device
connections, such as connecting two computers for file sharing, connecting two switches
to expand network capacity, or connecting two routers for network redundancy.

Colour codes for T568A on one end of the RJ45.


1.white/green, 2.green, 3.white/orange, 4.blue, 5.white/blue, 6.orange, 7.white/brown, 8.brown

Colour codes for T568B on another end of the RJ45.


1.white/orange, 2.orange, 3.white/green, 4.blue, 5.white/blue, 6.green, 7.white/brown, 8.brown

Prepared by: Businge Christian – 2024 Lira University


- Fiber-Optic Cables: Fiber-optic cables use light signals to transmit data over long distances
at high speeds. They offer advantages such as greater bandwidth, immunity to electromagnetic
interference, and enhanced security. Uses optical joints for getting more connections.

- Wireless Signals: Wireless networking technologies, such as Wi-Fi, Bluetooth, and cellular
networks, use radio waves to transmit data between devices. Wireless signals enable mobility
and flexibility in network connectivity, allowing devices to connect without physical cables.
Networking Interfaces:
- Ethernet Ports: Ethernet ports are common networking interfaces found on computers,
routers, switches, and other networking devices. They use Ethernet cables terminated with
RJ45 connectors to connect devices within a wired network and adhere to Ethernet standards.
- Wireless Interfaces: Wireless interfaces, such as Wi-Fi adapters and antennas, enable
devices to connect to wireless networks. They use wireless protocols to communicate with
access points and other wireless devices.
Power over Ethernet (PoE):
- PoE Switches: PoE switches provide power and data connectivity to PoE-compatible
devices, such as IP phones, wireless access points, and IP cameras over a single Ethernet cable.
They eliminate the need for separate power adapters and simplify network deployments,
especially in areas where power outlets are scarce.
- PoE Injectors: PoE injectors are standalone devices that add PoE capability to non-PoE
networking devices. They inject power into Ethernet cables to power PoE-compatible devices
connected to them.

Prepared by: Businge Christian – 2024 Lira University


4. Network Topologies:
- Star Topology: Provides centralized control and easy troubleshooting but relies heavily on
the central node. Failure of the central node can disrupt the entire network but failure of one
node affects only that node and the rest of the nodes connected to the central node remain on
the network.
- Bus Topology: Simple and inexpensive but vulnerable to cable failure, which can
disconnect all devices on the network segment.
- Ring Topology: Ensures equal access to resources but can be difficult to troubleshoot, as a
break in the ring can disrupt the entire network.
- Mesh Topology: Offers redundancy and fault tolerance where all the nodes are
interconnected but requires extensive cabling and configuration.
5. IP Addressing:
- IPv4 vs. IPv6: IPv4 addresses are 32 bits long and represented in dotted-decimal notation
(e.g., 192.168.1.1), whereas IPv6 addresses are 128 bits long and expressed in hexadecimal
format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
- Subnetting: Allows organizations to divide a larger IP address space into smaller, more
manageable sub-networks, improving network efficiency and security. Subnet masks
determine the network and host portions of an IP address.
7. Network Security:
- Firewalls: Act as barriers between internal networks and external networks (e.g., the
internet), filtering incoming and outgoing traffic based on predefined rules. Firewalls can block
malicious traffic, prevent unauthorized access, and detect and mitigate security threats.
- Encryption: Converts data into an unreadable format using encryption algorithms and keys.
Encrypted data can only be decrypted by authorized parties with the correct decryption key,
ensuring confidentiality and integrity during transmission.
- Authentication: Verifies the identity of users or devices before granting access to network
resources. Authentication methods include passwords, biometric authentication (e.g.,
fingerprint scanning), and two-factor authentication (e.g., combining a password with a one-
time code).
9. Wireless Networking:
- Wi-Fi: Uses radio waves to provide wireless connectivity between devices within a limited
range, typically within buildings or outdoor areas. Wi-Fi networks require access points (APs)
to provide wireless coverage and support various standards (e.g., 802.11ac, 802.11ax).
- Bluetooth: Enables short-range communication (typically within a few meters) between
devices like smartphones, tablets, laptops, and peripherals (e.g., headphones, keyboards).
Bluetooth devices form ad-hoc networks known as piconets.

Prepared by: Businge Christian – 2024 Lira University


10. Network Management:
- Monitoring: Involves continuous observation of network performance, traffic patterns, and
device status using network management tools. Monitoring helps identify performance issues,
security threats, and network failures.
- Configuration: Includes initial setup and ongoing maintenance of network devices and
services. Configuration tasks may include assigning IP addresses, configuring routing
protocols, setting up firewalls, and optimizing network performance.
- Troubleshooting: Involves diagnosing and resolving network problems to ensure smooth
operation. Troubleshooting techniques include analysing network logs, conducting packet
captures, and using diagnostic tools like ipconfig, traceroute, ping etc. to identify and address
issues such as connectivity problems.

Sample questions

Here are some basic questions derived from the topic;

1. Networking Fundamentals:
What is a network, and why is it important in computing?
Differentiate between a Local Area Network (LAN) and a Wide Area Network
(WAN).
2. Networking Devices:
What is the role of a router in a network?
How does a switch differ from a hub in a network?
3. Network Topologies:
Describe the star network topology and provide an example of its use.
What are the advantages and disadvantages of a mesh network topology?
4. Networking Protocols:
Explain the purpose of the Domain Name System (DNS) in networking.
What is the purpose of an IP address in a network?
5. Ethernet and Wireless Networking:
What are the main components of an Ethernet network?
Describe the differences between wired and wireless networking technologies.
6. Network Security:
Why is network security important, and what are some common threats to network
security?
Explain the role of a firewall in protecting a network from unauthorized access.
7. Network Management:
What is network monitoring, and why is it essential for network management?
Outline the basic steps involved in troubleshooting network issues.
8. Cable termination:
What distinguishes a crossover cable from a straight-through cable in terms of wiring
configuration?
What are the things you need to have at hand to make one of the above cables?

Prepared by: Businge Christian – 2024 Lira University

You might also like