Professional Documents
Culture Documents
q2 Las 1 Ste Ict Edited
q2 Las 1 Ste Ict Edited
STE – ICT
(Computer Systems Servicing)
Activity Sheet – Quarter 2 – Week 1
Network Design, Addressing,
Subnetting and Topology
STE – ICT (Computer Systems Servicing)
Activity Sheet No. 1
First Edition, 2020
Published in the Philippines
By the Department of Education
Region 6 - Western Visayas
Republic Act 8293, section 176 states that: No copyright shall subsist in
any work of the Government of the Philippines. However, prior approval of
the government agency or office wherein the work is created shall be
necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
This Learning Activity Sheet is developed by DepEd Region 6 - Western
Visayas.
ALL RIGHTS RESERVED. No part of this learning resource may be
reproduced or transmitted in any form or by any means electronic or
mechanical without written permission from the DepEd Regional Office 6 –
Western Visayas.
2
Welcome to TLE/TVL – ICT (Computer Programming – Oracle
Database).
The Learning Activity Sheet is a product of the collaborative efforts
of the Schools Division of Capiz and DepEd Regional Office VI - Western
Visayas through the Curriculum and Learning Management Division
(CLMD). This is developed to guide the learning facilitators (teachers,
parents and responsible adults) in helping the learners meet the standards
set by the K to 12 Basic Education Curriculum.
The Learning Activity Sheet is self-directed instructional materials
aimed to guide the learners in accomplishing activities at their own pace and
time using the contextualized resources in the community. This will also
assist the learners in acquiring the lifelong learning skills, knowledge and
attitudes for productivity and employment.
For learning facilitator:
The TLE/TVL – ICT (Computer Programming – Oracle Database)
Activity Sheet will help you facilitate the teaching-learning activities
specified in each Most Essential Learning Competency (MELC) with minimal
3
or no face-to-face encounter between you and learner. This will be made
available to the learners with the references/links to ease the independent
learning.
For the learner:
The TLE/TVL – ICT (Computer Programming – Oracle Database)
Activity Sheet is developed to help you continue learning even if you are
not in school. This learning material provides you with meaningful and
engaging activities for independent learning. Being an active learner,
carefully read and understand the instructions then perform the activities
and answer the assessments. This will be returned to your facilitator on the
agreed schedule.
4
Network design is generally performed by the network designers,
engineers, IT administrators and other related staff. It is done before the
implementation of a network infrastructure.
Network design involves evaluating, understanding and scoping the
network to be implemented. The whole network design is usually
represented as a network diagram that serves as the blueprint for
implementing the network physically. Typically, network design includes the
following:
● Logical map of the network to be designed
● Cabling structure
● Quantity, type and location of the network devices (routers, switches,
servers)
● IP addressing structure
● Network security architecture and overall network security processes
NETWORK ADDRESS
Network Address
A network address is any logical or physical address that uniquely
distinguishes a network node or device over a computer or
telecommunication network. It is a numeric/symbolic number or address
that is assigned to any device that seeks access to or is part of a network.
A network address is key networking technology component that
facilitates identifying a network mode/device and reaching a device over a
network. It has several forms, including the Internet Protocol (IP) address,
media access control (MAC) address and host address.
Computers on a network use a network address to identify, locate and
address other computers. Besides, individual devices, a network address is
typically unique for each interface; for example, a computer’s Wi-Fi and local
area network (LAN) card has separate network addresses.
A network address is also known as the numerical network part of an
IP address. This is used to distinguish a network that has its won hosts and
addresses. For example, in the IP address 192.168.1.0, the network address
is 192.168.1.
What is an IP Address?
IP address stands for internet protocol address; it is an identifying
number that is associated with a specific computer or computer network.
When connected to the internet, the IP address allows the computers to
send and receive information.
● An internet protocol (IP) address allows computers to send and receive
information.
● There are 4 types of IP addresses: public, private, static and dynamic.
● An IP address allows information to be sent and received by the
correct parties, which means they can also be used to track down a
user’s physical location.
How an IP Address Works
2
An IP address allows computers to send and receive data over the
internet. Most IP addresses are purely numerical, but as internet usage
grows, letters have been added to some addresses.
There are 4 different types of IP addresses: public, private, static and
dynamic. While the public and private are indicative of the location of the
network – private being used inside a network while the public is used
outside of a network – static and dynamic indicate permanency.
A static IP address is one that was manually created, as opposed to
having been assigned. A static address also does not change, whereas a
dynamic IP address had been assigned by a Dynamic Host Configuration
Protocol (DHCP) server and is subject to change. Dynamic IP addresses are
the most common type of internet protocol addresses. Dynamic IP addresses
are only active for a certain amount of time, after which they expire. The
computer will either automatically request a new lease, or the computer may
receive a new IP address.
SUBNETTING
What is a subnet?
A subnet, or subnetwork is a network inside a network. Subnets make
networks more efficient. Through subnetting, network traffic can travel a
shorter distance without passing through unnecessary routers to reach its
destination.
Why is subnetting necessary?
Because an IP address is limited to indication the network and the
device address, IP addresses cannot be used to indicate which subnet an IP
packet should go to. Routers within a network use something called a
subnet mask to sort data into subnetworks.
What is a subnet mask?
A subnet mask is like an IP address, but for only internal usage within
a network. Routers use subnet masks to route data packets to the right
place. Subnet masks are not indicated within data packets traversing the
Internet – those packets only indicate the destination IP address, which a
router will match with a subnet.
TOPOLOGY
Network Topology
Network topology is the schematic description of the arrangement of
the physical and logical elements of a communication network.
Network topology refers to the manner in which the links and nodes of
a network are arranged to relate to each other. Topologies are categorized as
either physical network topology, which is the physical signal transmission
medium or logical network topology, which refers to the manner in which
data travels through the network between devices, independent of physical
connection of the devices. Logical network topology examples include twisted
pair Ethernet, which is categorized as a logical bus topology, and token ring,
3
which is categorized as logical ring topology. Physical network topology
examples include star, mesh, tree, ring, point-to-point, circular, hybrid, and
bus topology networks, each consisting of different configurations of nodes
and links.
Why is Network Topology Important?
The layout of your network is important for several reasons. Above all,
it plays an essential role in how and how well you network functions.
Choosing the right topology for your company’s operational model can
increase performance while making it easier to locate faults, troubleshoot
errors, and more effectively allocate resources across the network to ensure
optimal network health. A streamlined and properly managed network
topology can increase energy and data efficiency, which can in turn help to
reduce operational and maintenance costs.
The design and structure of a network are usually shown and
manipulated in a software-created network topology diagram. These
diagrams are essential for a few reasons, but especially for how they can
provide visual representations of both physical and logical layouts, allowing
administrators to see the connections between devices when
troubleshooting.
Effective network management and monitoring require a strong grasp
of both the physical and logical topology of a network to ensure your
network is efficient and healthy.
Types of Network Topology
BUS Topology
Bus topology is network type in which every computer and network
device is connected to a single cable. When it has exactly two endpoints,
then it is called Linear Bus Topology.
Features of Bus Topology
● It transmits data only in one direction.
● Every Device is connected to a single cable.
Advantages of Bus Topology
● Cost effective
● Cable required is least compared to another network topology
● Used in small networks
● Easy to understand
● Easy to expand joining two cables together
Disadvantages of Bus Topology
● Cables fails then whole network fails
● If network traffic is heavy or nodes are more the performance of the
network decreases
● Cable has a limited length
● Slower than the ring topology
4
RING Topology
It is called ring topology because it forms a ring as each computer is
connected to another computer, with the last one connected to the first.
Exactly two neighbors for each device.
Features of Ring Topology
● A number of repeaters are used for ring topology with large number of
nodes, because if someone wants to send some data to the last node
in the ring topology with 100 nodes, then the data will have to pass
through 99 nodes to reach the 100th node. Hence to prevent data loss,
repeaters are used in the network.
● The transmission is unidirectional, but it can be made bidirectional
having 2 connections between each network node, it is called dual
ring topology.
● In dual ring topology, two ring networks are formed, and data flow is
in opposite direction in them. Also, if one ring fails, the second ring
can act as a backup, to keep the network up.
● Data is transferred in a sequential manner that is bit by bit. Data
transmitted, has to pass through each node of the network, till the
destination node.
Advantages of Ring Topology
● Transmitting network is not affected by high traffic or by adding more
nodes, as only the nodes having tokens can transmit data.
● Cheap to install and expand.
Disadvantages of Ring Topology
● Troubleshooting is difficult in ring topology
● Adding or deleting the computers disturbs the network activity
● Failure of one computer disturbs the whole network
STAR Topology
In this type of topology, all the computers are connected to a single
hub through a cable. This hub is the central node and all others nodes are
connected to the central node.
Features of Star Topology
● Every node has its own dedicated connection to the hub.
● Hub acts as a repeater for data flow.
● Can be used with twisted pair, optical fiber or coaxial cable
Advantages of Star Topology
● Fast performance with few nodes and low network traffic
● Hub can be upgraded easily
● Easy to troubleshoot
● Easy to setup and modify
● Only that node is affected which has failed, rest of the nodes can work
smoothly.
Disadvantages of Star Topology
5
● Cost of installation is high
● Expensive to use
● If the hub fails then the whole network is stopped because all the
nodes depend on the hub
● Performance is based on the hub that is it depends on its capacity
MESH Topology
It is a point-to-point connection to other nodes or devices. All the
network nodes are connected to each other. Mesh has n(n-1)/2 physical
channels to link n devices.
There are two techniques to transmit data over the Mesh topology,
they are:
1. Routing
In routing, the nodes have a routing logic, as per the network
requirements. Like routing logic to direct the data to reach the destination
using the shortest distance. Or, routing logic which has information about
the broken links, and it avoids those nodes, etc. We can even have routing
logic, to re-configure the failed nodes.
2. Flooding
In flooding, the same data is transmitted to all the network nodes,
hence no routing logic is required. The network is robust, and it is very
unlikely to lose the data. But it leads to unwanted load over the network.
Types of Mesh Topology
1. Partial Mesh Topology – in this topology, some of the systems are
connected in the same fashion as mesh topology but some devices are
only connected to two or three devices.
2. Full Mesh Topology – each and every nodes or devices are connected
to each other.
Features of Mesh Topology
● Fully connected
● Robust
● Not flexible
Advantages of Mesh Topology
● Each connection can carry its own data load.
● It is robust
● Fault is diagnosed easily.
● Provides security and privacy
Disadvantages of Mesh Topology
● Installation and configuration are difficult
● Cabling cost is more
● Bulk wiring is required
TREE Topology
6
It has a root node and all other nodes are connected to it forming a
hierarchy. It is also called hierarchical topology. It should at least have three
levels to the hierarchy.
Features of Tree Topology
● Ideal if workstations are located in groups
● Used in wide area network
Advantages of Tree Topology
● Extension of bus and star topologies
● Expansion of nodes are possible and easy
● Easily managed and maintained
● Error detection is easily done
Disadvantages of Tree Topology
● Heavily cabled
● Costly
● If more nodes are added, maintenance is difficult
● Central hub fails, network fails
HYBRID Topology
It is two different types of topologies which is a mixture of two or more
topologies. For example, if in an office in one department, ring topology is
used and in another, star topology is used, connecting these topologies will
result in Hybrid Topology (ring topology and star topology).
Features of Hybrid Topology
● It is a combination of two topologies
● Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
● Reliable as error detecting and troubleshooting is easy
● Effective
● Scalable as size can be increased easily
● Flexible
Disadvantages of Hybrid Topology
● Complex in design
● Costly
III. Accompanying DepEd Textbook and Educational Sites
● Janssen, Dale, Techopedia, “Network Design”, (2015).
https://www.techopedia.com/definition/30186/network-design#:~:te
xt=Network%20design%20refers%20to%20the,administrators%20and
%20other%20related%20staff.
● Janssen, Dale, Techopedia, “Network Address”, (2015).
https://www.techopedia.com/definition/20969/network-address#:~:t
ext=A%20network%20address%20is%20also,the%20network%20addr
7
ess%20is%20192.168.
3.html#:~:text=An%20IP%20address%20is%20an,1%20octet%20%3D
%208%20bits).
● Investopedia, “IP Address”, (2015).
https://www.investopedia.com/terms/i/ip-address.asp#:~:text=There
%20are%20four%20different%20types,static%20and%20dynamic%20i
ndicate%20permanency. Refsnes Data, “w3schools.com: SQL Syntax”,
(2000). https://www.w3schools.com/sql/sql_syntax.asp
● CloudFlare, “What is a Subnet? | How subnet works?”.
https://www.cloudflare.com/learning/network-layer/what-is-a-subne
t/
● Omnisci, “Network Topology”.
https://www.omnisci.com/technical-glossary/network-topology
● Staff Contributor, DNS Stuff, “What is Network Topology? Best Guide
to Types and Diagrams”, (August 2019).
https://www.dnsstuff.com/what-is-network-topology
● Ahlawat, Abhishek, Studytonight Technologies, “Types of Network
Topology”.
https://www.studytonight.com/computer-networks/network-topology
-types
IV. Activity Proper
Activity 1. Directions: Based on the given definitions and features of the
topologies stated above, illustrate the structure/diagram of the topologies
given below.
Example:
Bus Topology
1. Tree Topology
8
2. Mesh Topology
3. Ring Topology
9
4. Hybrid Topology
5. Star Topology
Activity 2. Directions: Differentiate network addressing and subnetting
Network Addressing Subnetting
10
Rubric for Scoring
Criteria 3 2 1 Score
Cleanliness Readable, Mostly Not
/Neatness Understandable understandable understandable
and clean and clean and untidy
Accuracy/ Evident of own Evident of own Evident of
Clarity ideas and ideas most of confused ideas
imagination the time or imagination
Organizatio Evident of Evident of some Unorganized
n of Idea/ depth insight insight and understanding
understandi and understanding /idea. Needs
ng understanding improvement
Total:
Activity 3. Direction. Using a Venn Diagram, compare and contrast the
following topologies
1. Bus Topology and Ring Topology
12
2. What is the importance of subnetting?
___________________________________________________________________________
___________________________________________________________________________
3. If you were to ask, which type of topology is more efficient for you and
why?
___________________________________________________________________________
___________________________________________________________________________
VI. Answer Key
13