UNIT 3: INTRODUCTION TO COMPUTER NETWORK
Key Unit Competency:
To be able to explain principles, standards and purposes of computer networkRead the following scenario and answer to the asked questions.
In the school computer labs, choose a classmate and send him/her an email that
has “Computer Network “as the email subject and the email body contains names of
previous units already covered in senior 5 computer science. Ask him/her to reply
immediately to your email.After receiving the reply, answer the following questions:
1. List all possible elements that make this communication possible
2. What devices are used to facilitate sending email successfully?
3. Discuss what made possible the sending and receiving of emails
4. Do you like using email?
5. How do you value the factor of sending and receiving an email
6. Describe what you see in the photo below?
3.1. Fundamental of computer Networ
3.1.1. Computer Network Definition
ACTIVITY 3.1
Observe computers in the computer lab and answer the following question?
1. Describe what you see?
2. What are transmission media used to connect computers in the
computer labs?3. Are all devices connected?
A computer network is a system of interconnected computers for the purpose of
sharing data and resources.Computers on a network are called nodes. Nodes can include hosts such as personal
computers, phones, servers as well as networking hardware. Two devices are
networked together when one device is able to exchange information with the
other device. The computer can be connected to another in the two ways.Wired network: Computers are connected using cable media. Most commonly
Ethernet Cable, coaxial cable and optic fiber.Wireless network: Computers are connected using wireless media. Radio waves are
used in wireless mode.3.1.2 Properties of Computer Network
• Easy Sharing of Resources: Computers are able to share various resources
easily over a network. Shared resources can be Internet, files, printer, storage
and others.• Performance: It is achieved by measuring the speed of data transmission
with number of network users, connectivity used and the software used. The
commonly measured qualities in the network performance are Bandwidth
and Latency.• Reliability: It means that computer network provides assurance of the
delivery of data to the intended recipient.• Scalability: The possibility of adding new computer without affecting the
network performance.• Security: computer network must be secured for the benefit of the user and
data protection. The security is achieved by protecting data from unauthorized
access.• Quality of Service (QoS): Quality of Service refers to the mechanism that
manage congested network traffic.• Fault tolerant: A fault tolerant network limits the impact of hardware or
software failure and recovers quickly when a failure occursAPPLICATION ACTIVITY 3.2
1. Investigate what happen when a shared resource is disconnected from
the computer network?2. Imagine other areas where computer network is used?
3.1.3 Advantages and Disadvantage of Computer Networking
The common advantages of computer networkActivity 3.2
1. Discuss the disadvantages of using computer network within your school?
2. In class of senior 5 MPC, Computer Science Teacher decides to share notes
for students to use on our school network. The mathematics teacher decides
to print notes of 100 pages and distributes to each member of senior 5 MPC
class.i. Evaluate the cost impact for both teachers
ii. Both teachers, whom save money in giving notes.
The common advantages of computer network
1. Enhanced communication and availability of information: It allows access
to a vast amount of useful information.Example: Population data, newsletters, online businesses, contents,
Applications.2. Allow resource sharing: Fewer resources are needed when an organization
uses a computer network.
Example: only one printer is needed instead of buying a printer for each office.3. File sharing made easy: computer network allows people to share files, which
helps to save more time and effort.
Example: A teacher can share homework to all students through school
network4. Improve storage capacity: since you are going to share information, files and
resources to other people, you have to ensure that all data and content are
properly stored in the system.5. Cost efficiency: on computer network, you can share software license installed
on the server and can then be used by various workstations.6. Security of information and resources: users cannot see other users' files
unlike on stand-alone machines.7. Backup of data is easy as all the data is stored on the file server.
The common disadvantages of computer networking
1. Lack of independence: people rely on computer network and when the
system is down, people get stack. Most of organizations depend on the
computer networks.2. Security issues: huge number of people use a computer network to get and
share their files and resources, a certain user’s security would be always at
risk. Viruses can spread to other computers throughout a computer network.
There is a danger of hacking, particularly with wide area networks. Security
procedures are needed to prevent such abuse, Examples: The use of Antivirus
and firewall.3. Lack of robustness: computer network’s main server breaks down, the entire
system would become uselessAPPLICATION ACTIVITY 3.2
1. Investigate what happen when a shared resource is disconnected from
the computer network?2. Imagine other areas where computer network is used?
3.1.4 Types of computer networks
Activity 3.3
With two or more Bluetooth enabled devices available in the classroom:
1. Turn on the Bluetooth feature on both devices
2. Share and receive files such images and documents between the
devices3. Turn off Bluetooth feature in the two devices.
A computer network is classified basing on the size of the area covered, the number
of users connected and the number & types of services available.The followings are type of computer networks:
1. Personal Area Network (PAN)
A personal area network (PAN) is a network that connects devices, such as mice,
keyboards, printers, Smartphone, and tablets within the range of an individual
person. PAN has connectivity range up to 10 meters. PAN may include wireless
computer keyboard and mouse, Bluetooth enabled headphones, wireless printers
and TV remotes. All of these devices are dedicated to a single host and are most
often connected with Bluetooth technology.Bluetooth is a wireless technology that enables devices to communicate over short
distances. A Bluetooth device can connect up to seven other Bluetooth devices.2. Local Area Network (LAN)
Traditionally, a LAN is defined as a network that covers a small geographical area.
However, the distinguishing characteristic for LANs today is that they are typically
owned by an individual, such as in a home or small business, or wholly managed
by an IT department, such as in a school or corporation. This individual or group
enforces the security and access control policies of the network. LAN uses Ethernet
IEEE 802.3 as its standard.A Wireless LAN (WLAN) is a LAN that uses radio waves to transmit data between
wireless devices. In a traditional LAN, devices are connected together using copper
cabling. In some environments, installing copper cabling might not be practical,
desirable, or even possible. In these situations, wireless devices are used to transmit
and receive data using radio waves. As with LANs, on a WLAN, you can share resources,
such as files, printers, and Internet access. WLAN uses Ethernet IEEE 802.11 as its
standard.3. Metropolitan Area Network (MAN)
A metropolitan area network (MAN) is a network that spans across a large organization
like campus or a city. The network consists of various buildings interconnected
through wireless or fiber optic backbones.A backbone is the part of the computer network infrastructure that interconnects
different LAN networks and provides a path for exchange of data between these
different networksThe communication links and equipment are typically owned by a network service
provider who sells the service to the users. A MAN can acts as a high-speed network
to enable sharing of regional resources.4. Wide Area Network (WAN)
A WAN connects multiple networks that are in geographically separated locations.
The distinguishing characteristic of a WAN is that it is owned by a service provider.
Individuals and organizations contract for WAN services. WAN network provides
connectivity to MANs and LANs. The most common example of a WAN is the
Internetwork or Internet in short. The Internet is a large WAN that is composed of
millions of interconnected networks.Example: Kigali and Nairobi networks are connected through the Internet
APPLICATION ACTIVITY 3.3
1. Discuss the role ISP services for LANs?
2. Do an observation in the school computer lab and categorize the
computer network type available at your school? Justify your answer.3. Using clear examples, Distinguish Personal Area Network and Local Area
Network?4. Using an arrow match the following in Group A with their
corresponding in Group BGroup A Group B
a. Radio waves 1. Qualities of Computer network
Performanceb. Millions of interconnected network 2. Disadvantages of Computer network
c. Sharing resources 3. Wireless
d. Hacking attacks 4. WAN
e. Bandwidth and Latency 5. Advantages of Computer network
3.2 Computer Network Concept and Technology
ACTIVITY 3.4
You are browsing a website on the internet while the speed is okay and suddenly you
find that the page is loading slowly. Investigate the reason behind slowness?3.2.1 Network metrics
Network metrics are defined as standards of measurement by which efficiency,
performance, progress, or quality of a plan, process can be assessed. Network metric
are used by a router to make routing decisions.When data is sent over a computer network, it is broken up into small chunks called
packets. Each packet contains source and destination address information. Packets
are sent across a network one bit at a time.a. Bandwidth
Bandwidth is the amount of data that can be transmitted in a fixed amount of time.
Bandwidth is measured in the number of bits that can be sent every second.
The following are examples of bandwidth measurements:• b/s - bits per second
• kb/s - kilobits per second
• Mb/s - megabits per second
• Gb/s - gigabits per second
b. Latency
Latency is the time between requesting data and receiving data. More simply put,
the time it takes to establish a connection between your computer and the server
hosting the website you requested. The important thing to take away here is that
latency is not speed. Data is delayed by network devices and cable length. Network
devices add latency when processing and forwarding data.c. Throughput:
Throughput is the actual rate at which information is transferred. It measures the
amount of completed work against time consumed and may be used to measure
the performance of a processor, memory and/or network communications.d. Error rate:
Error rate is the number of corrupted bits expressed as percentage or fraction of the
total sent.
e. Jitter:
Jitter is variation in packet delay at the receiver of information. For measuring the
capacity of all of these metrics above, we focus on capacity of message and this one
change into different form depending on the network devices where this message
is located.3.2.2 Data Transmission model
The term transmission mode is used to define the direction of signal flow between
two linked devices. The data that is transmitted over the network can flow using one
of three modes: simplex, half-duplex and full-duplex.1. Simplex: it is a single one-way transmission. In a simplex transmission
mode, the communication between sender and receiver occurs only in one
direction. That means only the sender can transmit data, and receiver can
receive that data. The receiver cannot transmit any information back to the
sender.The keyboard to monitor transmission is an example of simplex transmission
mode. Other examples are communication between a computer and a
printer, listening to the radio and the signal that is sent from a TV station to
your home TV.2. Half-Duplex: data flows in one direction at a time. In half-duplex, the
channel of communications allows alternating transmission in two
directions, but not in both directions simultaneously. An Example of Halfduplex
is the Talkie- Walkie used by the police.3. Full-Duplex: data flows in both directions at the same time. In a full duplex
transmission mode, the communication between sender and receiver can
occur simultaneously. Sender and receiver both can transmit and receive
simultaneously at the same time.A telephone conversation is an example of full-duplex communication. Both people
can talk and be heard at the same time.APPLICATION ACTIVITY 3.4
1. Examine 2 reasons that cause latency in computer network.
2. What is your school download bandwidth and upload bandwidth?
3. Contrast upload bandwidth and download bandwidth?
4. Categorize following devices according to their transmission modes
a. TV
b. Radio
c. Walkie -Talkie
d. Phone
e. Computer
3.2.3. Internetwork (Internet, Intranet, Extranet)
ACTIVITY 3.5
Using computer network, an organization’s employees can access data when
they are inside the organization buildingand when they are physically outside.
Investigate technologies that can be used to allow employees inside and outside
to access organization’s data.A network of networks is called an internetwork, or simply the Internet. The Internet,
extranets, and intranets all rely on Transport Control Protocol / Internet Protocol
(TCP/IP). However, they are different in terms of the levels of access they allow to
various users inside and outside the organization and the size of the network.1. An Intranet is a private computer network that uses Internet Protocol to
securely share any part of an organization’s information or operational
systems within that organization. Only users inside the organization are
only allowed to access it.2. An Extranet is a private network that uses Internet protocols, network
connectivity. An extranet can be viewed as part of a company’s intranet
that is extended to users outside the company, the connectivity is made
possible by the Internet.3. The Internet is a global system of interconnected computer networks that
use the standard Internet Protocol suite (TCP/IP) to serve billions of users
worldwide.The difference between the Internet and Extranets is that while the extranet allows
limited access to non-members of an organization, the Internet generally allows
everyone to access all network resources.APPLICATION ACTIVITY 3.5
General supply Ltd. sell various services online and offline. It has various partners such
as suppliers, sellers, buyers and clients in different Districts of Rwanda. Each partner
wants to access the General supply data from its servers located at the main office in
Ruhango District.Examine in details the appropriate technology for each user to access the General
supply Ltd. data to avoid the user location problem3.3 Local Area Networks (LANs)
ACTIVITY 3.6
By definition, computer network is said to be a group of computers connected together
and share resources. Using your school environment, observe followings:1. The range covered by your school network?
2. The number of users on your school network?
3. Resources shared on your school network?
3.3.1 Definition
Local Area Networks (LANs) are networks usually confined to a geographic area, such
as a single building or a college campus. LANs can be small, linking as few as three
computers, but often link hundreds of computers used by thousands of people.3.3.2 LAN Categories
1. Peer-to-Peer Network
A peer-to-peer (P2P) network is created when two or more computers are connected
and share resources without going through a separate server computer. In a peerto-
peer network, there is no hierarchy among the computers, nor are there any
dedicated servers.Each device on the network, also called a client, has equivalent capabilities and
responsibilities. A user is responsible for its own resources and can decide which
data and devices to be shared with other computers. Because individual users are
responsible for the resources on their own computers, the network has no central
point of control and no central administration. Peer-to-peer networks work best in
environments with ten or fewer computers.Advantages of peer to peer network are as follows:
• The main advantage of peer to peer network is that it is easier to set up
• In peer-to-peer networks all nodes are act as server as well as client therefore
no need of dedicated server• The peer to peer network is less expensive
• Peer to peer network is easier to set up and use this means that you can spend
less time in the configuration and implementation of peer to peer network.Disadvantages of peer to peer network
• A computer can be accessed anytime
• Network security has to be applied to each computer separately
• Backup has to be performed on each computer separately
• No centralized server is available to manage and control the access of data.
2. Client-Server Network
In a client-server network, the client requests information or services from the server
and the server provides the requested information or service to the client. Servers
on a client-server network commonly perform some of the processing work for
client machines.In a client-server network, resources are controlled by a centralized network
administration. The network administrator implements data backups and security
measures. The network administrator also controls user access to the server
resources.Note: In a home or small business, a single server can run multiple types of server
software, it may be necessary for one computer to act as a file server, a web server,
and an email server. A client computer can also run multiple types of client software.
There must be client software for every service required. With multiple client software
installed, a client can connect to multiple servers at the same time.Advantages of Client-Server Network
• Centralization of control: Access, resources and integrity of the data are
controlled by the dedicated server so that a program or unauthorized client
cannot damage the system.• Scalability: You can increase the capacity of clients and servers separately.
Any element can be increased (or enhanced) at any time, you can add new
nodes to the network (clients or servers).• Easy maintenance: Distribute the roles and responsibilities to several
standalone computers, you can replace, repair, upgrade, or even move a server,
while customers will not be affected by that change (or minimally affect).Disadvantage of Client Server Networks
• There is a reliance on the central server, if it fails, no work can be done
• A network manager is required and this costs money
• The server costs money, as does the network operating system
• Servers are powerful, thus expensive
• Lots of network traffic.
Advantages of Client Server Networks over Peer to Peer Networks
• Centralization: Unlike Peer to Peer, where there is no central administration,
Client Server Networks have a centralized control.• Proper Management : All the files are stored at the same place. Therefore,
management of files becomes easy and it is easier to find files.• Back-up and Recovery possible: As all the data is stored on server it is easy to
make a back-up of it. Also, in case of some break-down if data is lost, it can be
recovered easily and efficiently. While in peer to peer network, we have to take
back-up at every workstation.• Upgrade and Scalability in Client-server set-up: Changes can be made
easily by just upgrading the server. Also new resources and systems can be
added by making necessary changes in server.• Accessibility: From various platforms in the network, server can be accessed
remotely.• Security: Rules defining security and access rights can be defined at the time of
set-up of server.Disadvantages of client server network over the Peer to peer network
• Congestion in Network: Too many requests from the clients may lead to
congestion, which rarely takes place in Peer to Peer network. Overload can
lead to breaking-down of servers. In peer-to-peer, the total bandwidth of the
network increases as the number of peers increase.• Client-Server network is not as robust as a Peer to Peer network and if the
server fails, the whole network goes down.• Cost: It is very expensive to install and manage client server network.
APPLICATION ACTIVITY 3.6
Respond the following questions by True or False and justify your answer
• Peer to Peer network is only implemented by computers which run same
operating system.• In Server-Client network, Server respond to service only requested by the
Client.• Limit number of hosts in the Peer to Peer network are 10 computers.
• Client requests only the service available on the server in Server-Client
network.• Peer to Peer network is more secure than Server-Client network.
• There is a dedicated computer in Peer to Peer network.
• In Client- Server network, both client and server must run the same Operating
System.3.4. Physical Components
ACTIVITY 3.7
In the computer lab observe devices that are directly participating in the
network. Examine the role of each device you have identified.3.4.1. Definition of network device
A network host or a node is a computer or any other device that is directly connected
to a computer network. A network host may offer information resources, services,
and applications to users.i. Network Interface Card (NIC)
Network Interface card is a component that allows the computer to communicate
across a network. This component is frequently built into the motherboard of today’s
computers, but it can also be a separate card for use in a PCI slot.Network Interface cards can be either wired or wireless. However, some cards do
support both wireless and wired networkingAPPLICATION ACTIVITIES 3.7
NIC Card installation in a desktop computer:
Step 1: Shut down your Computer and disconnect it from the power source
Step 2: Remove the case cover. Then remove the cover of the available slot.
Step 3: Install NIC in proper slot and secure it
Step4: Replace the case cover.
Note: A wireless NIC has an antenna connected to the back of the card or attached
with a cable so that it can be positioned for the best signal reception. You must
connect and position the antenna.ii. Media Access Control Address
Media Access Control Address (MAC address) of a device is a unique identifier
assigned to network interfaces for communications at the data link layer of a
network segment. MAC address is a physical address of Network Interface Card. In
other words MAC addresses are linked to the hardware of network adapters. A MAC
address is given to a network adapter when it is manufactured.
Example of a MAC address: 00:0a:95:9d:68:16.iii. Modem
A modem is a hardware device that enables a computer to send and receive data
over a telephone line or a cable or satellite connection. Modem is used to transmit
digital information via analog systems. The word “modem” is derived from the term
“Modulator - Demodulator.”The essential functions of a modem are:
• Modulate: an analog carrier signal to carry digital information, it means to
convert the analog signal to digital signal.• Demodulate: a similar signal so as to decode the digital information from
the analog carrier signal and it means to convert the same signal back to the
analog signal then transmitted through telephone line.They are two types of modems:
Internal modem which are circuit boards that plug into a computer’s motherboard and
external modems which are discrete units housed in a separate case. Typically, an external
modem is connected to the telephone line and the computer via cables or USB.APPLICATION ACTIVITY 3.8
Find the Mac address of your computer
Step1: Click the Run button in the windows 10 Start Menu
Step 2: Type cmd in the Open prompt of the Run menu and click OK to launch a
command prompt windowStep 3: Type ipconfig /all at the command prompt to check the network card
settings.Step4: MAC address is listed by ipconfig under Physical Address
iv. RJ 45 Connector and Port
A registered jack (RJ) is a standardized physical network interface for connecting
telecommunications or data equipment. The physical connectors that registered
jacks use are mainly of the modular connector and 50-pin miniature ribbon connectortypesThe RJ45 port is the network port on a computer. This socket has many names. It is
also known as the Ethernet port, the network adapter, the network jack or the RJ45jack.3.5. Network Devices
ACTIVITY 3.8
Observe the connection between network devices that make your school network.
Then answer following questions:1. Examine how computers are connected together in order to exchange
data?2. Investigate how data / message is forwarded from the Computer A (as
source) to Computer B (as destination)?3. The equipment used to connect devices within a LAN has evolved from
hub to bridge to switch. Contrast both devices?3.5.1 Hub
A hub is a network hardware device for connecting multiple devices together and
making them act as a single network segment.Definition:A network segment is a portion of a computer network that is separated from
the rest of the network by a network device.Hub receives message on one port and then send it out to all other ports, this means
that when hub receives message, the received message is regenerated or duplicated
and sent to all computers connected to the hub, each computer on the network
receives the message, if it is not the destination message is destroyed, if it is the
destination it reads the message.Note: Hubs are used less often today because of the effectiveness and low cost of
switch. Hub do not segment network traffic. When one device sends traffic, the hub
floods that traffic to all other devices connected to hub. The devices are sharing the
bandwidth.3.5.2 Switches
Switch filters and segments network traffic by sending messages only to the device to
which it is sent. This means that when a switch receives a message do not duplicated
it, it sends it directly to the destination computer. This provides higher dedicated
bandwidth to each device on the network.A switch maintains a switching table, the switching table contains a list of all MAC
addresses of computers on the network and a list of switch port which are used to
reach a computer with a given MAC address.
When message arrives that is destined for a particular MAC address, the switch uses
the switching table to determine which port to use to reach the MAC address. Then message is forwarded to the destination.3.5.3 Bridge
A network bridge is a computer networking device that creates a single aggregate
network from multiple communication networks or network segments. This function
is called network bridgingBridges keep a record of all the devices on each segment. A bridge can then filter
network traffic between LAN segments. This helps reduce the amount of traffic
between devices3.5.4 Access point
The Access Point is connected to a switch using UTP cable, therefore it can provide
access to the rest of the network. Instead of providing copper cabling to every
network host, only the wireless access point is connected to the network with
copper cabling and spread radio waves to the rest of network.
The range (radius of coverage) for Access Point indoors is 98.4 ft (30 m) and too
much greater distances outdoors depending on the technology used.APPLICATION ACTIVITY 3.9
1. Justify why outdoor range is better that indoor range?
2. Discuss how a switch perform micro-segmentation?
3. Analysis why Switch is much preferred than a HUB
4. Examine the difference between Access Point and Bridge?
5. Identify the purpose of switching table in the switch?
6. Using the internet search for the diagram representation of hubs,
switches and bridges in a network3.6 Network Transmission Medium
ACTIVITY 3.9
Draw a computer network of 10 computers
This is the physical mean of communication between network computers.
Data transmission media are the physical materials used to transmit data between
computers. Packet of data can be transmitted on network as electrical signals
in electric wire, light signal in fiber optic cables or as electromagnetic waves
through space.
There are two main types of data communication media used in network:1. Bounded or Guided media: which transmit signals by sending electricity
or light over a cable wire. Common examples of bounded media are
twisted cables, Coaxial cables and fiber optic cables.2. Unbounded media: which transmit data through the air, radio waves,
layer or infrared signal and satellite based microwaves, etc.3.6.1 Guided transmission media
A wide variety of networking cables are Coaxial, Fiber optic and twisted-pair
cables which use electrical signals over copper to transmit data while Fiber-optic
cables use light signals to transmit data. These cables differ in bandwidth, size, and
cost.It is used by both cable television companies and satellite communication systems
and it carries data in the form of electrical signals. There are several types of coaxial
cable:• Thicknet or 10BASE5 - used in networks and operated at 10 Mb/s with a
maximum length of 1640.4 ft. (500 m.)• Thinnet 10BASE2 - used in networks and operated at 10 Mb/s with a maximum
length of 607 ft. (185 m.)b. Twisted-pair copper cabling
Twisted-pair is a type of copper cabling used for telephone communications and
most Ethernet networks. The pair is twisted to provide protection against crosstalk,
which is the noise generated by adjacent pairs of wires in the cable.
The use of this cable is limited by two factors:a. Attenuation: the strength of signal reduces as the distance increases i.e the
cables loose signals strength when they exceed their maximum length stated
in network specification.b. Crosstalk: this refers to interference generated by cables when they are too
close to each other. Signals from one line get mixed with signals from another.3.6.2. Types of twisted pair cables
There are two types of twisted pair cables: unshielded and shielded cables
a. Unshielded twisted-pair (UTP)
Unshielded twisted-pair (UTP) cabling is the most common variety of twisted-pair
cabling.UTP cable consists of four pairs of color-coded wires that are twisted together and
then encased in a flexible plastic sheath that protects from minor physical damage.
The twisting of wires helps protect against crosstalk. However, UTP does not protect
against electromagnetic interference (EMI) or radio frequency interference (RFI).
EMI and RFI can be caused by a variety of sources including electric motors and
fluorescent lights.There are two different wiring schemes called T568A and T568B. Using the T568A
and T568B wiring schemes, two types of cables can be created: a straight-through
cable and a crossover cable.1. A straight-through cable is the most common cable type. It maps a wire
to the same pins on both ends of the cable. The order of connections (the
pin out) for each color is the exact same on both ends.Two devices directly connected and using different pins for Transmit and Receive
are known as unlike devices. They require a straight-through cable to exchange
data. For example, connecting a PC to a switch requires a straight-through cable.2. A crossover cable uses both wiring schemes. T568A on one end of the
cable and T568B on the other end of the same cable.
Devices that are directly connected and use the same pins for transmit and receive,
are known as like devices. They require the use of a crossover cable to exchange
data. For example, connecting a PC to another PC requires a crossover cable.Note: The most used cable standards are below:
• 100Base-TX: known as Fast Ethernet, it uses category 5, 5E, or 6 UTP cable and
it wires u to 100 meters long.• 1000Base-T means that the speed of the network is up to 1000
Mbps, baseband signaling is sed, T stands for twisted-pair as UTP cable usedb. Shielded twisted-pair (STP)
The STP type similar to UTP cable except that there is a metal foil or braided metal-
mesh cover that encases each pair of insulated wires. The extra covering in shielded
twisted pair wiring protect the transmission line from electromagnetic interference
( EMI) leaking into or out of cable. However this can make cables quite bulky
and harder to install.
The basic difference between UTP and STP is that UTP is a cable with wires that are twisted
together to reduce noise and crosstalk. On other hand, STP is a twisted pair cable confined
in foil or mesh shield that guards the cable against electromagnetic interference.APPLICATION ACTIVITY 3.10
Requirements:
1. Unshielded twisted pair (UTP) patch cable
2. Modular connector (8P8C plug, aka RJ45)
3. Crimping tool
4. Cable tester (optional, but recommended
Step 1: Strip the cable jacket about 1.5 inch down from the end.
Step 2: Spread the four pairs of twisted wire apart.
Step 3: Untwist the wire pairs and neatly align them in the T568B orientation.
Step 4: Cut the wires as straight as possible, about 0.5 inch above the end of the jacket.
Step 5: Carefully insert the wires all the way into the modular connector, making sure
that each wire passes through the appropriate guides inside the connector.Step 5: Carefully insert the wires all the way into the modular connector, making sure
that each wire passes through the appropriate guides inside the connector.Step 6: Push the connector inside the crimping tool and squeeze the crimper all the
way down.Step 7: Repeat steps 1-6 for the other end of the cable.
Step 8: To make sure you›ve successfully terminated each end of the cable, use a cable
tester to test each pin.APPLICATION ACTIVITY 3.11
Step 1: Open the Network and Sharing Center:
Step 2: Select the Control Panel from the Start menu.
Step 3: Select Open Network and Sharing Center and click Network and Sharing Center
3.6.3 Fiber optic cables
An optical fiber cable, also known as a fiber optic cable, is an assembly similar to an
electrical cable, but containing one or more optical fibers that are used to carry light
signalsAdvantages of fiber optic
a. Since they transmit light rather than electronic signal, the problem of electrical
interference is eliminated , therefore they are not affected by radio interference
or cross talkb. They have become the standard for connecting networks between buildings due
to their immunity the effects of moisture and lighting.c. Fiber optic can transmit signal over much longer distance than coaxial cable and
twisted cablesd. They can carry information at high rate speed between
e. The distance can be up to 2000 meters without repeater
f. Security: it is difficult to tap into optical fiber line. If this is happen it will be
noticed immediately.g. Low transmission loss
h. Data can be transmitted digitally
i. They are more resistant to adverse weather conditions.
3.6.4 Unguided transmission media
Unguided media transport electromagnetic waves without using a physical
conductor. This type of communication is often referred to as wireless communication.
The mediums used in wireless communications are air, vacuum and even water. Air
is the most commonly used medium.a. Wireless Transmission
Wireless transmission can be categorized into three broad groups namely radio
waves, microwaves, infrared1. Radio waves
Radio waves are normally omnidirectional. When an antenna transmits radio
waves, they are propagated in all directions. This means that the sending and
receiving antennas do not have to be aligned. The omnidirectional characteristics
of radio waves make them useful for multicasting, in which there is one sender but
many receivers. Our FM radio stations, cordless phones and televisions are examples
of multicasting.2. Infrared
Infrared is used in devices such as the mouse, wireless keyboard and printers. Some
manufacturers provide a special port called the IrDA port that allows a wireless
keyboard to communicate with a PC.Infrared signals have frequencies between 300 GHz to 400 THz. They are used for
short-range communication. Infrared signals have high frequencies and cannot
penetrate walls. Due to its short-range communication system, the use of an infrared
communication system in one room will not be affected by the use of another system
in the next room. This is why using an infrared TV remote control in our home will
not interfere with the use of our neighbor’s infrared TV remote control.The disadvantages of using infrared
• Infrared signals cannot be used for long distance communication.
• Infrared waves can not be used outside of a building because sun’s rays contain
infrared waves that can interfere with communication.3. Bluetooth
Bluetooth technology is designed to serve as a new way of connecting devices.
Bluetooth technology has an advantage of being low investment and low energy
consumption demanding.The difference between Bluetooth and infrared is that Bluetooth allows communication
when there is a barrier or a wall.4. Wi-Fi (Wireless Fidelity)
Wi-Fi (Wireless Fidelity) is a standard that certifies that wireless devices in Wireless
LAN to work together. It supports IEEE802.11b Ethernet standard.Wi-Fi uses radio signals to transmit high speed data over the wireless network, the
Access Point is used to connect devices and it acts as the central device for Wireless
LAN. Wireless devices can be: smartphones, PDAs, IPad, laptop and notebook.APPLICATION ACTIVITY 3.11
General steps to connect to a WI-FI network near you
The following steps run through the general steps that anyone needs to take to get
connected to the internet via WI-FI. (Do this exercise and discover the corresponding
windows for every step. What is the meaning of different icons forms that a wireless
network take?)Step 1: Locate yourself in a property or public space that has a wireless router.
Step 2: Make sure that the device you›re going to use is:
• Capable of connecting to the internet and
• Capable of connecting to WI-FI.
Step 3: Find out the name of the WI-FI network that the router in your location is
transmitting.Step 4: Once you know the name of the WI-FI network, use your chosen device to find
it.3.7. IP Address
3.7. IP Address
The fingerprint and addressed letters are ways of identifying and addressing a person.
A person's fingerprints usually do not change. They provide a way to physically identify
people. The mailing address of a person can change, as it relates to where the person
lives or picks up mail. Do network devices have addresses? Justify your answer.3.7.1 Understand IP Addresses
An IP address is an address used in order to uniquely identify a device on a computer
network.IP Versions
There are two versions of IP addressknown as IP version 4 and IP version 6
a. IP version 4
IP version 4 is the common used IP address,
a.1 Structure of IP address
• An IP address is simply a series of 32 binary bits. Because it is difficult for human
to read a binary IP address, the 32 bits are grouped into fout-8-bits bytes called
octets.• When a computer is configured with an IP address it is entered as doted decimal
number such as 192.168.1.5• When a host receives an IP address , it looks at all 32 bits as they are received by
the NIC• Each octet is made up with 8 bits an each bit has a value. The four groups of 8 bits
have same set of value.• Parts of the IP address
The logical 32 bits IP address is made up two parts which are network part or network
address and the second one is host address .a.2 Classes of IP version 4
There are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class
E, while only A, B, and C are commonly used classes D and E are reserved.
Here is a listing of these addresses:Class A
In class A the first bit of the first byte is always 0
0xxxxxxx where x stand for any value (either o or 1)
Minimum: 00000000
Maximum: 01111111The valid range in class A =
The range of IPs 127.x.x.x is reserved for the loopback or localhost, for example,
127.0.0.1 is the common loopback address. Range 255.255.255.255broadcasts toall hosts on the local network.
The first byte in class A represent Network address while the three remaining
represent the host address thus class A=Network. Host-Host-HostClass B
In class B the first bit of first byte is always 1 and the second bit of first byte is always
010xxxxxx
Minimum: 10000000=128
Maximum: 10111111=191Valid range[ 128-191]
The two first byte in class B represent Network address while the two remaining
represent the host address thus class B=Network-Network-Host-HostClass C
The first bit of first byte is always 1, the second bit of first byte is always 1 and the
third bit of first byte is always 0 i.e 1100000Minimum: 11000000= 192
Maximum: 11101111= 223
Valid range: 192-223
The three first bytes in class C represent Network address while the last byte remaining
represent the host address thus class C=Network. Network -Network -Hosta.3 Subnet Masks
A subnet mask help to know which portion of the address identifies the network
and which portion of the address identifies the host. Class A, B, and C networks have
default masks, also known as natural masks, as shown here:Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Devices that are attached to a network have two addresses that are similar to a
person’s fingerprints and a person’s mailing address. These two types of addresses
are the Media Access Control (MAC) address and the IP address. The MAC address is
hard coded onto the network interface card (NIC) by the manufacturer and it does
not change. The IP address is assigned to a host to the network and may change.b. Internet Protocol Version 6 (IPv6)
IPv6 (Internet Protocol Version 6) also called IPng (Internet Protocol next generation)
is the newest version of the Internet Protocol reviewed to replace the current version
of IPv4. IPv6 is designed to allow the Internet to grow steadily, both in terms of the
number of hosts connected and the total amount of data traffic transmitted.IPv6 shows a 128-bit address in eight 16-bitblocks separated by colons
Example: 3ffe:1900:4545:3:200:f8ff:fe21:67cf.
FE80:0000:0000:0000:0202:B3FF:FE1E:8329
b.1 Features of IPv6
• Supports source and destination addresses that are 128 bits (16 bytes) long.
• No more NAT (Network Address Translation)
• Auto-configuration
• No more private address collisions. Requires IPSec support to provide two
security headers which can be used separately• Those security headers are Authentication Headers(AH) and Encrypting
security payload(ESP)• Uses Flow Label field to identify packet flow for Quality of Service handling by
router.• Allows the host to send fragments packets but not routers.
• Does not require manual configuration or DHCP.
• Moves optional data to IPv6 extension headers.
• Uses Multicast Neighbor Solicitation messages to resolve IP addresses to linklayer
addresses.• Uses Multicast Listener Discovery (MLD) messages to manage membership in
local subnet groups.• Uses ICMPv6 Router Solicitation and Router Advertisement messages to
determine the IP address of the best default gatewayWhy there is no different classes in IP v6?
In IPv4 we have class A, B, C,D and E. In IPv6 we have only global prefix and interface
idIP v6 has three types of addresses, which can be categorized by type and scope:
Unicast addresses: a packet is delivered to one interface.
Multicast addresses: a packet is delivered to multiple interfaces.
Anycast addresses:a packet is delivered to the nearest of multiple interfaces (in
terms of routing distance).3.7.2. IP address assignment1. Static IP assignment
The manual configuration of a host in a network, allows to assign the static IP address
and the following information has to be specified:• IP address - identifies the computer on the network
• Subnet mask - is used to identify the network on which the computer is
connected• Default gateway - identifies the device that the computer uses to access the
Internet or another networkOptional values - such as the preferred Domain Name System (DNS) server
address and the alternate DNS server addressNote that host on the same network should have the same Network ID
APPLICATION ACTIVITY 3.12
Go through all these steps to assign to your computer a static IP address
STEP 1: Go to Network Connections.
STEP 2: Go to the network connection your computer is currently using, then
select Properties.STEP 3: Go to Internet Protocol Version 4 (IPv4) from the list and click the Properties
button
STEP 4: Choose Use the following IP address optionNOTE: When assigning a static IP address, make sure to set a value that will not
conflict with others on your network. You may refer to your router documentation
for the range of IP address that it assigns to its devices.STEP 5: Next to the IP address field, enter the IP address value you want to assign
to the computer.NOTE: If the DHCP range of your router is from say 192.168.1.100-200, you can use
any range from 192.168.1.2-99 for example.STEP 6: In the Subnet mask field, enter “255.255.255.0.”
STEP 7: In the Default gateway field, enter the IP address of your router or gateway
device.NOTE: Usually, the default gateway address for most routers is 192.168.1.1. Again,
you may refer to your device documentation to determine the correct IP address
of your router.STEP 8: For the Preferred DNS server and Alternate DNS server fields, you can take
a look for the exact DNS values that your router is getting from your ISP, which can
be usually found by accessing your router’s configuration page.STEP 9: Click OK on all windows to save your changes.
3. Dynamic IP configuration
A DHCP (Dynamic Host Configuration Protocol) server automatically assigns IP
address to host. It simplifies the addressing process. DHCP server can automatically
assign to a host an IP addres, Subnet mask, Default gateway and Optional values,
such as a DNS server addressAPPLICATION ACTIVITY 3.13
Go through all the steps to assign an IP address using DHCP
Step 1: Go to network connections
Step 2: Select “View network connections”.
Step 3: Locate the “Network connection” you want to view
Step 4: After locating connection, right –click on it and select “Properties”
Step 5: Double-click “Internet Protocol Version (TCP/IPv4)”
Step 6: Select the followings:
• Obtain an IP address automatically
• Obtain DNS server addresses automatically
• OKStep 7: Select “OK” and restart your computer.
3.7.3 Some common protocols
A protocol is defined a set of rules and procedures that control communication
between computers or other network devices on a network.a. Internet control message protocol (ICMP)
Internet Control Message Protocol (ICMP) is used by devices on a network to send
control and error messages to computers and servers. There are several different
uses for ICMP, such as announcing network errors, announcing network congestion,
and troubleshooting.b. HTTP (Hypertext Transfer Protocol)
e.g. http://www.reb.rw/
http:stands for hypertext transfer protocol used to connect computer to the server.
It provides a standard web browser to communicate with a server FTP (File Transfer
Protocol)This protocol allows you to transfer files between two computers on internet.
c. TCP and UDP
Transmission Control Protocol and User Datagram Protocolare most common
transport layer both protocols that manage the communication of multiple
applications. The difference between the two are the specification function that
each protocol implements.d. SMTP (Simple mail Transfer protocol)
The SMTP stands for Simple mail Transfer protocol is a TCP/IP used in sending and
receiving e-mails. However, since it is limited in its ability to queue message at the
receiving end, it is used with one of two other protocols POP or IMAP that let users to
save messages in server mailbox and download them from the server once needed.e. POP (Post Office Protocol)
Post Office Protocol is a protocol designed to allow single user computer to retrieve
electronic mail from a POP server via TCP/IP.3.7.4 Commands used to verify computer connection on a network
3.7.4.1 Ping
The command Ping is commonly used to test connections between computers.
Ping is a simple but highly useful command-line utility used to determine whether a
specific IP address is accessible.3.7.4.2 ipconfig
The ipconfig command is used to find out your current local IP address, default
gateway, TCP/IP settings and more.All Ipconfig commands explained:
i. ipconfig/all: it displays all current IP information for all adapters.
ii. ipconfig /release: Used to release current IP information and obtain a
new IP Address from the DHCP server.iii. ipconfig /renew: it is used to renew IP Address if you have it set to
obtain IP Address automatically.
3.8. Data and device sharing
ACTIVITY 3.10(b)
1. Share a folder with your classmate on your school computer network
2. Identify how resource are shared on computer network
3.8.1 Workgroup
A workgroup is a collection of computers and servers on a LAN that are designed
to communicate and exchange data with one another. Each individual workstation
controls its user accounts, security information, and access to data and resources.APPLICATION ACTIVITY 3.14
Go through the steps below in order to create a WorkGroup
Step 1: Open the Start menu, do a search for HomeGroup and press Enter.
Step 2: Click Create a HomeGroup.
Step 3: Click Next.
Step 4: Choose what to share on the network. By default Windows sets Pictures, Videos,
Music, and Printers & Devices as Shared. However, the Documents folder is marked as
not shared.Note: The sharing options you choose will only apply to devices connecting with
different accounts. If you sign-in with the same user account on another computer,
you will have access to all files regardless of what you chose to share.Step 5: Once you've decided what content to share, click Next.
Step 6: The wizard will complete the setup, and you'll be presented with a HomeGroup
password, which is needed to allow other computers to access files and printers. Write
down or click the link to print the password.APPLICATION ACTIVITY 3.15
Go through these steps to add computers to a HomeGroup
Step 1: Open the Start menu, do a search for HomeGroup and press Enter.
Step 2: Click the Join now button.
Note: If you don't see the Join now button, there is something wrong, make sure
you're connected to the network and restart your computer.Step 3: Click Next.
Step 4: Select the content you want to share on the network by using the drop
down menu for each folder and click Next.Step 5: Enter your HomeGroup password and click Next.
Note: If you're signed into another computer, but you're using your Microsoft
Account, then you won't be prompted to enter a password.Step 6: Click Finish to complete the task.
3.8.2 Network Resource Sharing
First determine which resources will be shared over the network and the type of
permissions users will have to the resources. Any device which is connected to a
host /node is called a Network Peripheral in other word network peripheral is any
device that is indirectly connected to the network. Examples of network peripheral
are: printer, scannerAPPLICATION ACTIVITY 3.16
Go through the steps below to add new folders to shared HomeGroup libraries
Step 1: Use the Windows key + E keyboard shortcut to open File Explorer.
Step 2: On the left pane, expand your computer’s libraries on HomeGroup.
Step 3: Right-click Documents.
Step 4: Click Properties.
Step 5: Click Add.
Step 6: Select the folder you want to share and click Include folder.
Step 7: Click Apply.
Step 8: Click OK.
Application activity 3.17
Go through these steps to add new folder via Windows network share to your
HomeGroupStep 1: Right-click the folder you want to share.
Step 2: Select Share with and click the Homegroup (view) option.
Users can access the newly shared folder by:Step 3: Using the Windows key + E keyboard shortcut to open File Explorer.
Step 4: Clicking Network on the left pane.
Step 5: Double-clicking the computer name with shared content, and browsing the
folder location.By default, every HomeGroup folder shared on the network are set with read only
permissions. It has to be this way to prevent accidental deletions and modification to
your files by other users.3.9. Network Topology
ACTIVITY 3.11
Draw a Peer-to-peer network and assign each host an IP address. Network must have 1
switch, 8 computers, one printer which has NIC card and a printer.The network topology describes the configuration of network, the physical and
logical arrangement of nodes that form a network. Network topologies are classified
as physical, logical and signals topologies.Physical topology describes the mapping of network nodes and physical connection
between them. Signal topology describes the paths which signals take while they
pass over network that mapping of the paths taken by data as they travel over
network. A logical topology is the way data signals pass from one device to another.There exist different types of network topologies which are Bus topology, Ring
topology, Star topology, Mesh topology, Tree topology and Hybrid topology,3.9.1 BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called Linear
Bus topology.It is the most used and employed in LAN architecture. All devices are connected to a
central cable, called the bus or backbone. This topology is relatively inexpensive and
easy to install for small networks.Features of Bus Topology
1. It transmits data only in one direction.
2. Every device is connected to a single cable
3.9.2 RING Topology
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbors
for each device. In a Ring topology each device is connected directly to two other
devices, one on either side of it, to form a closed loop. This topology is relatively
expensive and difficult to install, but it offers high bandwidth and can span large
distancesA ring topology is a computer network configuration in which computer connections
create a circular data path. Each networked computer is connected to two others
like points on a circle.In a ring network, data travel from one device to the next until they reach their
destination. Most ring topologies allow data to travel only in one direction called
a unidirectional ring network. Others permit data to move in both directions called bidirectional.3.9.3 STAR Topology
In this type of topology all the computers are connected to a single hub or a switch
through a cable. This hub or switch acts as the central device and all others nodes
are connected to the central device.So, in a Star topology all devices are connected directly to a central computer or
server. Such networks are relatively easy to install and manageFeatures of Star Topology
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair or coaxial cable.
3.9.4 MESH Topology
• It is a point-to-point connection to other nodes or devices. All the network
nodes are connected to each other. A Mesh topology can be either a full mesh
or a partial mesh. In the former, each computer is connected directly to each
of the others.Types of Mesh Topology
1. Partial Mesh Topology: In this topology some of the systems are connected
in the same fashion as mesh topology but some devices are only connected to
two or three devices.2. Full Mesh Topology: all devices are connected to each other which is very
expensive but provides the best redundancy as a failure of a single does not
affect the network connectivity.Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
3.9.5 Tree Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels of hierarchy.Features of Tree Topology
1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
3.9.6 Hybrid Topology
Hybrid, as the name suggests, is mixture of two different things. Similarly in this
type of topology that integrate two or more different topologies to form a resultant
topology which has good points (as well as weaknesses) of all the constituent
basic topologies rather than having characteristics of one specific topology. This
combination of topologies is done according to the requirements of the organization.For example, if there exists a ring topology in one office department while there is a bus
topology in another department, connecting these two will result in hybrid topology.
However, connecting two similar topologies cannot be termed as Hybrid topology.Notice that the cost of technology, network devices, and transmission mediums to
be used in the computer network has to be considered while choosing the network
topology to use.APPLICATION ACTIVITY 3.18
Using clear example, compare computer network devices, network peripherals
and computer peripherals?1. In an organization there are 20 computers distributed into different offices
and all offices share one printer .The managements wants to build a
computer network that connects all the computers and printer.i. Identify a topology to use in this situation
ii. Draw arrangement of computers using identified topology
2. Draw a hybrid topology
The test contains 15 questions and there is no time limit
At the end of the Test, your total score will be displayed and the Maximum score is 30 points.CLICK Here to start NETWORK EVALUATION QUIZ