Sunteți pe pagina 1din 45

Basic Networking

Understanding the Basics of Networking

This book contains: requirements for creating a network, different


types of network in computer system, two categories of network, and
network topology

JEMARK A. CENIZA\ S1-A4


/2014
2|Page
Network
A network is a group of two or more computer systems linked together. There
are many types of computer networks, including:
 local-area networks (LANs) : The computers are geographically close
together (that is, in the same building).

 wide-area networks (WANs) : The computers are farther apart and are


connected by telephone lines or radio waves.

 campus-area networks (CANs): The computers are within a limited


geographic area, such as a campus or military base.

 metropolitan-area networks MANs): A data network designed for a town


or city.

 home-area networks (HANs): A network contained within a user's home


that connects a person's digital devices.

Why we use Networking?


Networking has a good benefits to all user’s, we use
networking for sharing files, application or software sharing,
hardware sharing, and very useful for user’s communications
and network gaming.

Requirements for creating a network


Step 0: before you begin – Compared with a typical single
WordPress installation a network installation has additional
considerations. You must decide if you want to use subdomains or
subfolders and how you want to manage them. Installing themes and
plugins is different: for example, each individual site of a network can
activate both, but install neither.Compared with a typical single
WordPress installation a network installation has additional
considerations. You must decide if you want to use subdomains or
subfolders and how you want to manage them. Installing themes and
plugins is different: for example, each individual site of a network can
activate both, but install neither.
Step 1: Prepare your Wordpress - Your existing WordPress
site will be updated when creating a network. Unless this is a fresh
install and you have nothing to lose, please backup your database and
files.

Verify that Pretty Permalinks work on your single WP instance.

Also deactivate all active plugins. You can reactivate them again after
the network is created.

If you plan to run WordPress out of its own directory, do


that before activating Multisite.

Your existing WordPress site will be updated when creating a network.


Unless this is a fresh install and you have nothing to lose,
please backup your database and files.
Verify that Pretty Permalinks work on your single WP instance.

Also deactivate all active plugins. You can reactivate them again after
the network is created.

If you plan to run WordPress out of its own directory, do


that before activating Multisite.

Step 2: Allow Multisite - To enable the Network Setup menu


item, you must first define multisite in the wp-config.php file.
Open up wp-config.php and add this line above where it says /*
That's all, stop editing! Happy blogging. */ . If it doesn't say that
anywhere, then add the line somewhere above the first line that begins
with require or include:

/* Multisite */

define( 'WP_ALLOW_MULTISITE', true );


You will need to refresh your browser to continue.
.

Step 3: Installing a Network - The previous step enables


the Network Setup item in your Tools menu. Use that menu item to
go to the Create a Network of WordPress Sites screen.

Tools Network Screen

To see an example of the Create a Network of WordPress Sites


screen, look at Administration> Tools > Network Setup. The screen
does not look exactly the same in all circumstances. The example
shown is for an installation on localhost, which restricts the options
available.
Addresses of Sites in your Network

You are given the choice between sub-domains and sub-directories,


except when existing settings restrict your choice.

You must choose one or the other. You can reconfigure your network
to use the other choice after installation, despite the advice on the
screen, but reconfiguring it might not be easy.

You only need wildcard DNS for on-demand domain-based sites,


despite the advice that may be on the screen.

Once more: See Before You Create A Network.

 Sub-domains — a domain-based network in which on-


demand sites use subdomains
 Sub-directories — a path-based network in which on-
demand sites use paths
Network Details

These are filled in automatically, but you can make changes.

Server Address

The domain of the URL you are using to access your


WordPress installation.

Network Title
The title of your network as a whole.

Admin E-mail Address


Your email address as super admin of the network as a whole.

Double-check the details and press the Install button.

Note: The installer may perform a check for wildcard subdomains


when you have not configured them yet, or when you do not need
them at all. Ignore the warning if it does not apply to your network. See
the Server Requirements section in Before You Create A Network for
information about wildcard subdomains.

Step 4: Enabling the Network - To enable your network, follow


the instructions on the Create a Network of WordPress Sites screen.
The instructions that you see are customized for your installation. They
might not be the same as the examples you see here.

Back up your existing wp-config.php and .htaccess files, unless this


is a fresh install and you have nothing to lose.
There are two steps:

1. Add the specified lines to your wp-config.php file

The extra lines go just after where you added the line in Step 1:
Prepare Your WordPress.

2. Add the specified lines to your .htaccess file


If you do not have a .htaccess file, then create it in the same
directory as your wp-config.php file.

If you ALREADY have a .htaccess file, replace any existing


WP lines with these new ones.

In some cases you might also have to add Options


FollowSymlinks at the start of the file.

After completing these steps, log in again using the link provided. You
might have to clear your browser's cache and cookies in order to log
in.

TOOLS NETWORK CREATED


Step 5: Network Admin Setting –
At the left of your WordPress toolbar, My Sites is now the second
item. There, all your sites are listed, with handy fly-out menus, as well
as a Network Admin menu item. Under Network Admin you can use
the Dashboard item to go to the Network Dashboard screen.

Go to the Settings Screen to configure network options, and the Sites


Screen to manage your sites.

For more information, see: Network Admin

 Upgraded and can't find the Network Admin menu?


Step 6: Adminitration - There are some additional things you
might need to know about advanced administration of the network,
due to the additional complexity of a Multisite. Even if you're familiar
with WordPress, the location and behavior of Multisite Network
Administration can be confusing.

Different Types of Network in


Computer System

Topology : The geometric arrangement of a computer system. Common


topologies include a bus, star, and ring. See the Network topology
diagrams in the Quick Reference section of Webopedia.
Ring Topology
Bus Topology

Protocol:  The protocol defines a common set of rules and


signals that computers on the network use to communicate.
One of the most popular protocols for LANs is called Ethernet.
Another popular LAN protocol for PCs is the IBM  token-ring
network  .
Architecture: Networks can be broadly classified as
using either a peer-to-peer or client/server architecture.
Two Categories of Network
1. LAN Local Area Network
Local Area Networks (LAN) is widely used to share resources and
exchange information by connecting personal computers and
workstations in company office and factories. A LAN is a network that is
limited to an area such as a building or school. In a LAN, computers and
hardware such as printers can be connected by cable (copper wiring),
fiber optic cabling (glass fibers) or using a wireless (radio waves)
connection.
Advantages of LANs:
 Hardware such as printers can be shared so individual
workstations do not need their own printer. When they print, the
data is stored in a queue on a server. The data is then passed to the
printer.
 All the users work can be stored in a central place (the dedicated
file server) so a user can access their work through any computer on
the network.
 Software can be shared; software packages are stored on the
server and downloaded to workstations as requested. Note that a
license still has to be bought for each copy of the software needed.
 Data can be shared because database files stored in the server are
available to users around the network; data from CD-ROMs can also
be shared across the network.
 Central back-up can take place automatically at regular intervals. A
user will usually be able to retrieve work that has been deleted by
mistake.
 Messages can be sent to people working at other computers on
the network which can save time and paper.
 It is possible to set up a local intranet such as that on the KLB
school network. The web pages of information can be accessed only
over the LAN.  An intranet is free because it does not involve phone
links.
 There is control over users’ access rights to programs and data.

Disadvantages of LANs:
 Printing can be slow. Where a lot of workstations are served by only
one or two printers, long print queues may develop.
 A virus can spread more easily. If a virus gets into one computer, it is
likely to spread quickly across the network because it will get into the
central backing store.
 As data is shared there is a greater need for security. Users of the
network have to have authentication techniques such as user
ids and passwords. Unique user ID’s control access to the files and
settings on the network while passwords prevent unauthorized users
from logging onto the network.  Data may also have to be
encrypted so that it is meaningless if intercepted.
 If the server fails, all the workstations are affected. Work stored on
shared hard disk drives will not be accessible and it will not be
possible to use network printers either.
 The cost of installing the equipment is greater. Cabling can be expensive to
buy and to install.
 Damage to cables can isolate computers. Some sections of the network can
become isolated and will not be able to communicate with the rest of the
network.

2. WAN Wide Area Network


A Wide Area Network (WAN) is not confined to one building. The
computers and terminals forming part of the network can be spread
around the world. External communication links such
as satellites, microwaves, and telecommunication links and optical
fiber will be used to connect the parts of a WAN. The connection must
normally be paid for because the links are external.

Advantages of WANs:
 These are similar to those of LAN’s except the scale of sharing etc.
becomes far greater and can be world-wide.

Disadvantages of WANs:
 Again these are similar to those of LAN’s except that issues such
as security become even more important as potential hackers could
break into a computer system from anywhere in the world rather
than having to physically be in a building.
 Encryption of secure data such as financial transactions is
necessary because it is even easier to intercept data.
 

I. NETWORKING CABLES
A. Twisted Pair Cables

Twisted pair cabling is a form of wiring in which pairs of wires (the


forward and return conductors of a single circuit) are twisted together for
the purposes of canceling outelectromagnetic interference (EMI) from
other wire pairs and from external sources. This type of cable is used for
home and corporate Ethernet networks.

There are two types of twisted pair cables: shielded, unshielded.


Shielded Twisted Pair

Often abbreviated STP, a type of copper telephone wiring in which each


of the two copper wires that are twisted together are coated with an
insulating coating that functions as a ground for the wires. The extra
covering in shielded twisted pair wiring protects the transmission line
from electromagnetic interference leaking into or out of the cable. STP
cabling often is used in Ethernet networks, especially fast data rate
Ethernets.

B. Coaxial

Coaxial lines confine the electromagnetic wave to area inside the


cable, between the center conductor and the shield. The
transmission of energy in the line occurs totally through the
dielectric inside the cable between the conductors. Coaxial lines
can therefore be bent and twisted (subject to limits) without
negative effects, and they can be strapped to conductive supports
without inducing unwanted currents in them and though.

The most common use for coaxial cables is for television and other
signals with bandwidth of multiple megahertz. Although in most
homes coaxial cables have been installed for transmission
of TV signals, new technologies (such as the ITU-T G.hn standard)
open the possibility of using home coaxial cable for high-
speed home networking applications (Ethernet over coax).

In the 20th century they carried long distance telephone


connections.

C. Fiber Optic
An optical fiber cable consists of a center glass core surrounded by
several layers of protective material. The outer insulating jacket is
made of Teflon or PVC to prevent interference. It is expensive but
has higher bandwidth and can transmit data over longer
distances.science and engineering concerned with the design and
application of optical fibers is known as fiber optics.

II. CONNECTORS (RJ’s)


A. RJ45

RJ45 is a standard type of connector for network cables. RJ45 connectors


are most commonly seen with Ethernet cables and networks. RJ45
connectors feature eight pins to which the wire strands of a cable
interface electrically. Standard RJ-45pinouts define the arrangement of
the individual wires needed when attaching connectors to a cable.

B. RJ11
All of these registered jacks are described as containing a number
of potential contact positions and the actual number of contacts
installed within these positions. RJ11, RJ14, and RJ25 all use the
same six-position modular connector, thus are physically identical
except for the different number of contacts (two, four and six
respectively) allowing connections for 1, 2 or 3 phone lines
respectively.

RJ11 cables should then need to use only 6P2C connectors.


Nevertheless, often cables sold as RJ11 still use 6P4C (RJ14)
connectors (six position, four conductor), with four wires running to
a central junction box. Two of the six possible contact positions
connect tip and ring, and the other two conductors are then unused.
6P2C and 6P6C can also be found in stores.

The conductors other than the two central tip and ring conductors
are in practice used for various things such as a second or third
phone line, a ground for selective ringers, low voltage power for
a dial light, or for 'anti-tinkle' circuitry to prevent pulse
dialing phones from ringing the bell on other .

III.NETWORKING HARDWARE
Networking hardware may also be known as network
equipment or computer networking devices. Units which are the last
receiver or generate data are called hosts or data terminal equipment.

A. Switch
s a computer networking device that is used to connect
devices together on acomputer network, by using a form
of packet switching to forward data to the destination
device. A network switch is considered more advanced than
a hub because a switch will only forward a message to one
or multiple devices that need to receive it, rather than
broadcasting the same message out of each of its ports.

B. Hub
An Ethernet hub, active hub, network hub, repeater hub, multiport
repeater or hub is a device for connecting multiple Ethernet devices
together and making them act as a single network segment. It has
multiple input/output (I/O) ports, in which a signal introduced at the
input of any port appears at the output of every port except the original
incoming.

C. Gateway
Gateways, also called protocol converters, can operate at any network
layer. The activities of a gateway are more complex than that of
the router or switch as it communicates using more than one protocol.
Both the computers of Internet users and the computers that
serve pages to users are host nodes, while the nodes that connect the
networks in between are gateways. For example, the computers that
control traffic between company networks or the computers used
by internet service providers (ISPs) to connect users to the internet are
gateway nodes.

D. Router
A router is a networking device, commonly specialized hardware that
forwards data packets between computer networks. This creates an
overlay internetwork, as a router is connected to two or more data lines
from different networks. When a data packet comes in one of the lines,
the router reads the address information in the packet to determine its
ultimate destination. Then, using information in its routing
table or routing policy, it directs the packet to the next network on its
journey. Routers perform the "traffic directing" functions on the Internet.
A data packet is typically forwarded from one router to another through
the networks that constitute the internetwork until it reaches its
destination node.
IV. NETWORK TOPOLOGY
A. Bus

A bus network is a network topology in which nodes are connected in


a daisy chain by a linear sequence of buses.

B. Star
Star networks are one of the most common computer network
topologies. In its simplest form, a star network consists of one
central switch, hub or computer, which acts as a conduit to transmit
messages. This consists of a central node, to which all other nodes are
connected; this central node provides a common connection point for all
nodes through a hub. In star topology, every node (computer workstation
or any other peripheral) is connected to a central node called a hub or
switch. The switch is the server and the peripherals are the clients. Thus,
the hub and leaf nodes, and the transmission lines between them, form a
graph with the topology of a star. If the central node is passive, the
originating node must be able to tolerate the reception of an echo of its
own transmission, delayed by the two-way transmission time (i.e. to and
from the central node) plus any delay generated in the central node. An
active star network has an active central node that usually has the means
to prevent echo-related problems.

C. Mesh
A mesh network can be designed using a flooding technique or
a routing technique. When using a routing technique, the message is
propagated along a path, by hopping from node to node until the
destination is reached. To ensure all its paths' availability, a routing
network must allow for continuous connections and reconfiguration
around broken or blocked paths, using self-healing algorithms.

D. Ring
A ring network is a network topology in which each node connects to
exactly two other nodes, forming a single continuous pathway for signals
through each node - a ring. Data travel from node to node, with each
node along the way handling every packet. Because a ring topology
provides only one pathway between any two nodes, ring networks may be
disrupted by the failure of a single link. [1] A node failure or cable break might
isolate every node attached to the ring.

What is NETWORK PROTOCOL


The protocol defines a common set of rules and signals that
computers on the network use to communicate. One of the
most popular protocols for LANs is called Ethernet. Another
popular LAN protocol for PCs is the IBM  token-ring network  .
DIFFERENT TYPES OF NETWORK PROTOCOL
Ethernet
The Ethernet protocol is by far the most widely used one. Ethernet uses
an access method called CSMA/CD (Carrier Sense Multiple
Access/Collision Detection). This is a system where each computer listens
to the cable before sending anything through the network. If the network
is clear, the computer will transmit. If some other nodes have already
transmitted on the cable, the computer will wait and try again when the
line is clear. Sometimes, two computers attempt to transmit at the same
instant. A collision occurs when this happens. Each computer then backs
off and waits a random amount of time before attempting to retransmit.
With this access method, it is normal to have collisions. However, the
delay caused by collisions and retransmitting is very small and does not
normally effect the speed of transmission on the network.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data
can be transmitted over wireless access points, twisted pair, coaxial, or
fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.
Fast Ethernet
To allow for an increased speed of transmission, the Ethernet protocol
has developed a new standard that supports 100 Mbps. This is commonly
called Fast Ethernet. Fast Ethernet requires the application of different,
more expensive network concentrators/hubs and network interface
cards. In addition, category 5 twisted pair or fiber optic cable is
necessary. Fast Ethernet is becoming common in schools that have been
recently wired.
Local Talk
Local Talk is a network protocol that was developed by Apple Computer,
Inc. for Macintosh computers. The method used by Local Talk is called
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is
similar to CSMA/CD except that a computer signals its intent to transmit
before it actually does so. Local Talk adapters and special twisted pair
cable can be used to connect a series of computers through the serial
port. The Macintosh operating system allows the establishment of a
peer-to-peer network without the need for additional software. With the
addition of the server version of AppleShare software, a client/server
network can be established.
The Local Talk protocol allows for linear bus, star, or tree topologies using
twisted pair cable. A primary disadvantage of Local Talk is low speed. Its
speed of transmission is only 230 Kbps.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing. In Token Ring, the
computers are connected so that the signal travels around the network
from one computer to another in a logical ring. A single electronic token
moves around the ring from one computer to the next. If a computer
does not have information to transmit, it simply passes the token on to
the next workstation. If a computer wishes to transmit and receives an
empty token, it attaches data to the token. The token then proceeds
around the ring until it comes to the computer for which the data is
meant. At this point, the data is captured by the receiving computer. The
Token Ring protocol requires a star-wired ring using twisted pair or fiber
optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps.
Due to the increasing popularity of Ethernet, the use of Token Ring in
school environments has decreased.
FDDI
Fiber Distributed Data Interface (FDDI) is a network protocol that is used
primarily to interconnect two or more local area networks, often over
large distances. The access method used by FDDI involves token-passing.
FDDI uses a dual ring physical topology. Transmission normally occurs on
one of the rings; however, if a break occurs, the system keeps
information moving by automatically using portions of the second ring to
create a new complete ring. A major advantage of FDDI is high speed. It
operates over fiber optic cable at 100 Mbps.
ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits
data at a speed of 155 Mbps and higher. ATM works by transmitting all
data in small packets of a fixed size; whereas, other protocols transfer
variable length packets. ATM supports a variety of media such as video,
CD-quality audio, and imaging. ATM employs a star topology, which can
work with fiber optic as well as twisted pair cable.
ATM is most often used to interconnect two or more local area networks.
It is also frequently used by Internet Service Providers to utilize high-
speed access to the Internet for their clients. As ATM technology
becomes more cost-effective, it will provide another solution for
constructing faster local area networks.
Gigabit Ethernet
The most latest development in the Ethernet standard is a protocol that
has a transmission speed of 1 Gbps. Gigabit Ethernet is primarily used for
backbones on a network at this time. In the future, it will probably also
be used for workstation and server connections. It can be used with both
fiber optic cabling and copper. The

INDEX
A. G. O.
ATM – 34 Gateway – 25 Optical fiber 20
B. H. OSI - 35
Hardware – 13 R.
Bits – 2 Hub – 24 Ring 30
Bus – 27 RJ11 22
C. L. RJ45 21
CAN – 9 LAN – 5 -12 Router 3-26
Central back up – 13 Local talk – 32 Rules 4
Coaxial – 19 S.
Connectors – 21 M. SAN 10,11
D. MAN – 6 Services 4
Devices – 2 Medium – 3 Star 27,28
Mesh - 29 STP 17
E. Messages – 2, 13 Switch 27,28
Ethernet – 31 N. T.
F. Network – 1 Twisted p c 17
Fast Ethernet – 32 Networking cables - 17 TCP 4,35
FDDI – 34 Networking hardware – 23 Tokenring33
Network protocol - 31
Network topology - 27
U. W. WAN 7,15,16 X.
UTP 18 Wireless 3 XMPP 4
WLAN 8

REFERENCES

 Book of: Introduction to PC Hardware and Troubleshooting


By Mike Meyer’s Computer Skills

 CISCO Networking Academy, CCNA Exploration 1

 http://blog.router-switch.com/2012/02/two-types-of-networks-lans-
and-wans/
 http://networkwire.org/different-types-of-networks-in-computer-
system.html

 www.google.com.ph/images

S-ar putea să vă placă și