Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

1​ | ​Page

Basic Networking

Understanding the Basics of Networking

This book contains: requirements for creating a network,


different types of network in computer system, two
categories of network, and network topology

JEMARK A. CENIZA\ S1-A4


9/24/2014
2​ | ​Page
3​ | ​Page
4​ | ​Page

Network
A network is a group of two or more ​computer systems​ linked together. There
are many types of ​computer​ ​networks​, including:
​local-area networks (LANs)​ ​:​ The computers are geographically close
together (that is, in the same building).

​ ide-area networks (WANs)​ ​:​ The computers are farther apart and are
w
connected by telephone lines or radio waves.

​ ampus-area networks (CANs)​:​ The computers are within a limited


c
geographic area, such as a campus or military base.

​metropolitan-area networks MANs)​:​ A data network designed for a town


or city.

​home-area networks (HANs)​:​ A network contained within a user's home


that connects a person's digital devices.

Why we use Networking? 


5​ | ​Page

Networking has a good benefits to all user’s, we use


networking ​for sharing files​, ​application or software sharing​,
hardware sharing,​ and very useful for ​user’s communications
and ​network gaming.

Requirements for creating a network 


Step 0: before you begin – ​Compared with a typical single
WordPress installation a network installation has additional
considerations. You must decide if you want to use subdomains or
subfolders and how you want to manage them. Installing themes and
plugins is different: for example, each individual site of a network can
activate both, but install neither.Compared with a typical single
WordPress installation a network installation has additional
considerations. You must decide if you want to use subdomains or
subfolders and how you want to manage them. Installing themes and
plugins is different: for example, each individual site of a network can
activate both, but install neither.
6​ | ​Page

Step 1: Prepare your Wordpress​ ​- ​Your existing WordPress


site will be updated when creating a network. Unless this is a fresh
install and you have nothing to lose, please ​backup your database and
files​.

Verify that ​Pretty Permalinks​ work on your single WP instance.

Also deactivate all active plugins. You can reactivate them again after
the network is created.

If you plan to ​run WordPress out of its own directory​, do


that ​before​ activating Multisite.

Your existing WordPress site will be updated when creating a network.


Unless this is a fresh install and you have nothing to lose,
please ​backup your database and files​.

Verify that ​Pretty Permalinks​ work on your single WP instance.


7​ | ​Page

Also deactivate all active plugins. You can reactivate them again after
the network is created.

If you plan ​to ​run WordPress out of its own directory​, do


that ​before​ activating Multisite.

Step 2: Allow Multisite​ - ​To enable the Network Setup menu


item, you must first define multisite in the ​wp-config.php​ file.
Open up ​wp-config.php​ and add this line ​above​ where it says ​/*
That's all, stop editing! Happy blogging. */​. If it doesn't say that
anywhere, then add the line somewhere above the first line that begins
​ equire​ or i
with r ​ nclude​:
/* Multisite */

define( 'WP_ALLOW_MULTISITE', true );

You will need to refresh your browser to continue.


.
8​ | ​Page

Step 3: Installing a Network​ ​- ​The previous step enables


the ​Network Setup​ item in your ​Tools menu​. Use that menu item to
go to the ​Create a Network of WordPress Sites​ screen.

Tools Network Screen

To see an example of the Create a Network of WordPress Sites


screen, look at ​Administration​> ​Tools​ > ​Network Setup​. The screen
does not look exactly the same in all circumstances. The example
​ ocalhost​, which restricts the options
shown is for an installation on l
available.
Addresses of Sites in your Network
9​ | ​Page

You are given the choice between sub-domains and sub-directories,


except when ​existing settings​ ​restrict your choice.

You must choose one or the other. You can reconfigure your network
to use the other choice after installation, despite the advice on the
screen, but reconfiguring it might not be easy.

You only need wildcard DNS for on-demand domain-based sites,


despite the advice that may be on the screen.

Once more: See ​Before You Create A Network​.

Sub-domains​ — a domain-based network in which



on-demand sites use subdomains
▪ Sub-directories​ — a path-based network in which
on-demand sites use paths
Network Details

These are filled in automatically, but you can make changes.

Server Address
10​ | ​Page

The domain of the URL you are using to access your


WordPress installation.

Network Title
The title of your network as a whole.

Admin E-mail Address


Your email address as super admin of the network as a whole.

Double-check the details and press the ​Install​ button.

Note:​ The installer may perform a check for wildcard subdomains


when you have not configured them yet, or when you do not need
them at all. Ignore the warning if it does not apply to your network. See
the ​Server Requirements​ section in ​Before You Create A Network​ for
information about wildcard subdomains.

Step 4: Enabling the Network ​- ​To enable your network, follow


the instructions on the Create a Network of WordPress Sites screen.
The instructions that you see are customized for your installation. They
might not be the same as the examples you see here.
11​ | ​Page

Back up your existing ​wp-config.php​ and . ​ htaccess​ files, unless this


is a fresh install and you have nothing to lose.
There are two steps:

1. Add the specified lines to your ​wp-config.php​ ​file

The extra lines go just after where you added the line in ​Step 1:
Prepare Your WordPress​.

2. Add the specified lines to your ​.htaccess​ file


If you do not have a ​.htaccess​ file, then create it in the same
directory as your ​wp-config.php​ file.

If you ​ALREADY​ have a ​.htaccess​ file, replace any existing


WP lines with these new ones.

In some cases you might also have to add Options


FollowSymlinks at the start of the file.

After completing these steps, log in again using the link provided. You
might have to clear your browser's cache and cookies in order to log
in.
12​ | ​Page

TOOLS NETWORK CREATED


13​ | ​Page

Step 5: Network Admin Setting –

At the left of your WordPress toolbar, ​My Sites​ is now the second
item. There, all your sites are listed, with handy fly-out menus, as well
as a ​Network Admin​ menu item. Under ​Network Admin​ you can use
the ​Dashboard​ item to go to the Network Dashboard screen.

Go to the ​Settings Screen​ to configure network options, and the ​Sites


Screen​ ​to manage your sites.
14​ | ​Page

For more information, see: ​Network Admin

​Upgraded and can't find the Network Admin menu?

Step 6: Adminitration - ​There are some additional things you


might need to know about advanced administration of the network,
due to the additional complexity of a Multisite. Even if you're familiar
with WordPress, the location and behavior of Multisite Network
Administration can be confusing.

 
 
Different Types of Network in 
Computer System 
15​ | ​Page

Topology​ ​:​ The geometric arrangement of a computer system. Common


topologies include a ​bus,​ ​star​, and ​ring. See the ​Network topology
diagrams​ in the ​Quick Reference​ section of Webopedia.
16​ | ​Page

Ring Topology

Bus Topology

Protocol: T​ he protocol defines a common set of rules and


signals that computers on the network use to communicate.
One of the most popular protocols for LANs is called ​Ethernet​.
Another popular LAN protocol for ​PCs​ is the ​IBM t​ oken-ring
network​ .​
17​ | ​Page

Architecture: ​Networks can be broadly classified as


using either a​ ​peer-to-peer​ or c​ lient/server architecture​.
18​ | ​Page

Two Categories of Network 


1. LAN​ ​Local Area Network
Local Area Networks (LAN)​ is widely used to share resources and
exchange information by connecting personal computers and
workstations in company office and factories. ​A LAN is a network that is
limited to an area such as a building or school.​ In a LAN, computers and
hardware such as printers can be connected by cable (​copper wiring​),
fiber optic cabling (​glass fibers​) or using a wireless (​radio waves​)
connection.
19​ | ​Page

Advantages of LANs:
20​ | ​Page

● Hardware​ such as printers can be ​shared​ so individual workstations


do not need their own printer. When they print, the data is stored in a
queue on a server. The data is then passed to the printer.
● All the users work can be ​stored in a central place​ (​the dedicated file
server)​ so a user can access their work through any computer on the
network.
● Software can be shared​; software packages are stored on the server
and downloaded to workstations as requested. Note that a license still
has to be bought for each copy of the software needed.
● Data can be shared​ because database files stored in the server are
available to users around the network; data from CD-ROMs can also
be shared across the network.
● Central back-up​ can take place automatically at regular intervals. A
user will usually be able to retrieve work that has been deleted by
mistake.
● Messages​ can be sent to people working at other computers on the
network which can save time and paper.
● It is possible to set up a local ​intranet​ such as that on the KLB school
network. The web pages of information can be accessed only over the
LAN. An ​intranet is free​ because it does not involve phone links.
● There is ​control over users’ access rights​ to programs and data.
21​ | ​Page

Disadvantages of LANs:
● Printing can be slow​. Where a lot of workstations are served by only
one or two printers, long print queues may develop.
● A virus can spread more easily​. If a virus gets into one computer, it is
likely to spread quickly across the network because it will get into the
central backing store.
● As data is shared there is a greater need for​ security​. Users of the
network have to have authentication techniques such as ​user
ids ​and ​passwords​. Unique​ user ID’s​ control access to the files and
settings on the network while ​passwords​ prevent unauthorized users
from logging onto the network. Data may also have to be
encrypted​ so that it is meaningless if intercepted.
● If the server fails, all the workstations are affected​. Work stored on
shared hard disk drives will not be accessible and it will not be
possible to use network printers either.
● The cost of installing the equipment is greater.​ Cabling can be expensive to
buy and to install.
22​ | ​Page

● Damage to cables can isolate computers.​ Some sections of the ​network ​can
become isolated and will not be able to communicate with the rest of the
network.

2. WAN​ ​Wide Area Network


A Wide Area Network (WAN) is not confined to one building. The
computers and terminals forming part of the network can be spread
around the world.​ External communication links such
as ​satellites​,​ microwaves​, ​and telecommunication links ​and​ optical
fiber ​will be used to connect the parts of a WAN. The connection must
normally be paid for because the links are external.
23​ | ​Page

Advantages of WANs:
▪ These are similar to those of LAN’s except the scale of sharing etc.
becomes far greater and can be world-wide.

Disadvantages of WANs:
▪ Again these are similar to those of LAN’s except that issues such as
security become even more important as potential hackers could
break into a computer system from anywhere in the world rather than
having to physically be in a building.
▪ Encryption of secure data such as financial transactions is necessary
because it is even easier to intercept data.

I. NETWORKING CABLES 
A. Twisted Pair Cables
24​ | ​Page

Twisted pair​ cabling is a form of wiring in which pairs of wires (the


forward and return conductors of a single ​circuit​) are twisted together for
the purposes of canceling out​electromagnetic interference​ (EMI) from
other wire pairs and from external sources. This type of cable is used for
home and corporate ​Ethernet​ networks.
There are two types of twisted pair cables: shielded, unshielded.

Shielded Twisted Pair


25​ | ​Page

Often abbreviated ​STP​, a type of copper telephone wiring in which each


of the two copper wires that are twisted together are coated with an
insulating coating that functions as a ground for the wires. The extra
covering in shielded twisted pair wiring protects the transmission line
from electromagnetic interference leaking into or out of the cable. STP
cabling often is used in Ethernet networks, especially fast data rate
Ethernets.

B. Coaxial
26​ | ​Page

Coaxial lines confine the electromagnetic wave to area inside the


cable, between the center conductor and the shield. The
transmission of energy in the line occurs totally through the
dielectric inside the cable between the conductors. Coaxial lines
can therefore be bent and twisted (subject to limits) without
negative effects, and they can be strapped to conductive supports
without inducing unwanted currents in them and though.
The most common use for coaxial cables is for television and other
signals with bandwidth of multiple megahertz. Although in most
homes coaxial cables have been installed for transmission
of ​TV​ signals, new technologies (such as the ​ITU-T​ ​G.hn​ standard)
27​ | ​Page

open the possibility of using home coaxial cable for


high-speed ​home networking​ applications (​Ethernet over coax​).
In the 20th century they carried ​long distance telephone
connections​.
C. Fiber Optic

An ​optical fiber cable consists of a center glass core surrounded by


several layers of protective material. The outer insulating jacket is
made of Teflon or PVC to prevent interference. It is expensive but
has higher bandwidth and can transmit data over longer
28​ | ​Page

distances.​science and engineering concerned with the design and


application of optical fibers is known as ​fiber optics​.

II. CONNECTORS (RJ’s) 

A. RJ45

RJ45​ ​is a standard type of connector for network cables. RJ45 connectors
are most commonly seen with Ethernet​ ​cables and networks. RJ45
connectors feature eight pins to which the wire strands of a cable
29​ | ​Page

interface electrically. Standard RJ-45​pinouts​ ​define the arrangement of


the individual wires needed when attaching connectors to a cable.
B. RJ11

All of these registered jacks are described as containing a number


of potential ​contact​ positions and the actual number of contacts
installed within these positions. RJ11, RJ14, and RJ25 all use the
same six-position ​modular connector​, thus are physically identical
except for the different number of contacts (two, four and six
respectively) allowing connections for 1, 2 or 3 phone lines
respectively.
RJ11 cables should then need to use only 6P2C connectors.
Nevertheless, often cables sold as RJ11 still use 6P4C (RJ14)
30​ | ​Page

connectors (six position, four conductor), with four wires running to


a central junction box. Two of the six possible contact positions
connect tip and ring, and the other two conductors are then unused.
6P2C and 6P6C can also be found in stores.
The conductors other than the two central tip and ring conductors
are in practice used for various things such as a second or third
phone line, a ​ground​ for ​selective ringers​, low voltage power for
a ​dial​ light, or for 'anti-tinkle' circuitry to prevent ​pulse
 
dialing​ phones from ringing the bell on other .

III.NETWORKING HARDWARE 
Networking hardware​ may also be known as ​network
equipment​ or ​computer networking devices​. Units which are the last
receiver or generate data are called hosts or data terminal equipment.

A. Switch
31​ | ​Page

s a ​computer networking device​ that is used to connect


devices together on a​computer network​, by using a form
of ​packet switching​ to forward data to the destination
device. A network switch is considered more advanced than
a ​hub​ because a switch will only forward a message to one
or multiple devices that need to receive it, rather than
broadcasting the same message out of each of its ports.

B. Hub
32​ | ​Page

An ​Ethernet hub​, ​active hub​, ​network hub​, repeater hub​, ​multiport


repeater​ or ​hub​ is a device for connecting multiple Ethernet devices
together and making them act as a single network segment. It has
multiple input/output (I/O) ports, in which a signal introduced at the
input of any ​port appears at the output of every port except the original
incoming.

C. Gateway
33​ | ​Page

Gateways, also called protocol converters, can operate at any network


layer. The activities of a gateway are more complex than that of
the router or switch as it communicates using more than one protocol.
Both the computers of Internet users and the computers that
serve pages to users are host nodes, while the nodes that connect the
networks in between are gateways. For example, the computers that
control traffic between company networks or the computers used
by internet service providers (ISPs) to connect users to the internet are
gateway nodes.

D. Router
34​ | ​Page

A ​router​ is a networking device, commonly specialized hardware that


forwards data packets between computer networks. This creates an
overlay internetwork, as a router is connected to two or more data lines
from different networks. When a data packet comes in one of the lines,
the router reads the address information in the packet to determine its
ultimate destination. Then, using information in its routing
table or routing policy, it directs the packet to the next network on its
journey. Routers perform the "traffic directing" functions on the Internet.
A data packet is typically forwarded from one router to another through
the networks that constitute the internetwork until it reaches its
destination node.
35​ | ​Page

IV. NETWORK TOPOLOGY 


A. Bus

A ​bus network​ is a network topology in which nodes are connected in


a daisy chain by a linear sequence of buses.

B. Star
36​ | ​Page

Star networks​ are one of the most common computer network


topologies​. In its simplest form, a star network consists of one
central switch, hub or computer, which acts as a conduit to transmit
messages. This consists of a central node, to which all other nodes are
connected; this central node provides a common connection point for all
nodes through a hub. In star topology, every node (computer workstation
or any other peripheral) is connected to a central node called a hub or
switch. The switch is the server and the peripherals are the clients. ​Thus,
the hub and leaf nodes, and the transmission lines between them, form a
graph with the topology of a star. If the central node is ​passive​, the
originating node must be able to tolerate the reception of an echo of its
own transmission, delayed by the two-way transmission time (i.e. to and
from the central node) plus any delay generated in the central node. An
active​ star network has an active central node that usually has the means
to prevent echo-related problems.
37​ | ​Page

C. Mesh

A mesh network can be designed using a ​flooding​ technique or


a ​routing​ technique. When using a routing technique, the message is
propagated along a path, by ​hopping​ from node to node until the
destination is reached. To ensure all its paths' availability, a routing
network must allow for continuous connections and reconfiguration
around broken or blocked paths, using ​self-healing​ algorithms.

D. Ring
38​ | ​Page

A ​ring network​ is a network topology in which each node connects to


exactly two other nodes, forming a single continuous pathway for signals
through each node - a ring. Data travel from node to node, with each
node along the way handling every packet. Because a ring topology
provides only one ​pathway between any two nodes, ring networks may be
disrupted by the failure of a single link.​[1]​ A node failure or cable break might
isolate every node attached to the ring.

What is NETWORK PROTOCOL


The protocol defines a common set of rules and signals that
computers on the network use to communicate. One of the
most popular protocols for LANs is called ​Ethernet​. Another
popular LAN protocol for ​PCs​ is the ​IBM ​token-ring network​ .​
39​ | ​Page

DIFFERENT TYPES OF NETWORK PROTOCOL


Ethernet
The ​Ethernet​ protocol is by far the most widely used one. Ethernet uses
an access method called CSMA/CD (Carrier Sense Multiple
Access/Collision Detection). This is a system where each computer listens
to the cable before sending anything through the network. If the network
is clear, the computer will transmit. If some other nodes have already
transmitted on the cable, the computer will wait and try again when the
line is clear. Sometimes, two computers attempt to transmit at the same
instant. A collision occurs when this happens. Each computer then backs
off and waits a random amount of time before attempting to retransmit.
With this access method, it is normal to have collisions. However, the
delay caused by collisions and retransmitting is very small and does not
normally effect the speed of transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data
can be transmitted over wireless access points, twisted pair, coaxial, or
fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.
Fast Ethernet
40​ | ​Page

To allow for an increased speed of transmission, the Ethernet protocol


has developed a new standard that supports 100 Mbps. This is commonly
called Fast Ethernet. Fast Ethernet requires the application of different,
more expensive network concentrators/hubs and network interface
cards. In addition, category 5 twisted pair or fiber optic cable is
necessary. Fast Ethernet is becoming common in schools that have been
recently wired.
Local Talk
Local Talk is a network protocol that was developed by Apple Computer,
Inc. for Macintosh computers. The method used by Local Talk is called
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is
similar to CSMA/CD except that a computer signals its intent to transmit
before it actually does so. Local Talk adapters and special twisted pair
cable can be used to connect a series of computers through the serial
port. The Macintosh operating system allows the establishment of a
peer-to-peer network without the need for additional software. With the
addition of the server version of AppleShare software, a client/server
network can be established.
The Local Talk protocol allows for linear bus, star, or tree topologies using
twisted pair cable. A primary disadvantage of Local Talk is low speed. Its
speed of transmission is only 230 Kbps.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing. In Token Ring, the
41​ | ​Page

computers are connected so that the signal travels around the network
from one computer to another in a logical ring. A single electronic token
moves around the ring from one computer to the next. If a computer
does not have information to transmit, it simply passes the token on to
the next workstation. If a computer wishes to transmit and receives an
empty token, it attaches data to the token. The token then proceeds
around the ring until it comes to the computer for which the data is
meant. At this point, the data is captured by the receiving computer. The
Token Ring protocol requires a star-wired ring using twisted pair or fiber
optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps.
Due to the increasing popularity of Ethernet, the use of Token Ring in
school environments has decreased.
FDDI
Fiber Distributed Data Interface (FDDI) is a network protocol that is used
primarily to interconnect two or more local area networks, often over
large distances. The access method used by FDDI involves token-passing.
FDDI uses a dual ring physical topology. Transmission normally occurs on
one of the rings; however, if a break occurs, the system keeps
information moving by automatically using portions of the second ring to
create a new complete ring. A major advantage of FDDI is high speed. It
operates over fiber optic cable at 100 Mbps.
ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits
data at a speed of 155 Mbps and higher. ATM works by transmitting all
42​ | ​Page

data in small packets of a fixed size; whereas, other protocols transfer


variable length packets. ATM supports a variety of media such as video,
CD-quality audio, and imaging. ATM employs a star topology, which can
work with fiber optic as well as twisted pair cable.
ATM is most often used to interconnect two or more local area networks.
It is also frequently used by Internet Service Providers to utilize
high-speed access to the Internet for their clients. As ATM technology
becomes more cost-effective, it will provide another solution for
constructing faster local area networks.
Gigabit Ethernet
The most latest development in the Ethernet standard is a protocol that
has a transmission speed of 1 Gbps. Gigabit Ethernet is primarily used for
backbones on a network at this time. In the future, it will probably also
be used for workstation and server connections. It can be used with both
fiber optic cabling and copper. The

INDEX
A. G. O.
ATM – 34 Gateway – 25 Optical fiber 20
B. H. OSI - 35
Hardware – 13 R.
Bits – 2 Hub – 24 Ring 30
Bus – 27 RJ11 22
43​ | ​Page

C. L. RJ45 21
CAN – 9 LAN – 5 -12 Router 3-26
Central back up – 13 Local talk – 32 Rules 4
Coaxial – 19 S.
Connectors – 21 M. SAN 10,11
D. MAN – 6 Services 4
Devices – 2 Medium – 3 Star 27,28
Mesh - 29 STP 17
E. Messages – 2, 13 Switch 27,28
Ethernet – 31 N. T.
F. Network – 1 Twisted p c 17
Fast Ethernet – 32 Networking cables - 17 TCP 4,35
FDDI – 34 Networking hardware – 23 Tokenring33
Network protocol - 31
Network topology - 27
U. W. WAN 7,15,16 X.
UTP 18 Wireless 3 XMPP 4
WLAN 8
 
 
 
 
 
REFERENCES 

● Book of: Introduction to PC Hardware and Troubleshooting


By Mike Meyer’s Computer Skills
44​ | ​Page

● CISCO Networking Academy, CCNA Exploration 1

● http://blog.router-switch.com/2012/02/two-types-of-networks-lans-
and-wans/

● http://networkwire.org/different-types-of-networks-in-computer-syst
em.html

● www.google.com.ph/images

You might also like