M02-Administering Network Hardware.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

WEB DEVELOPMENT AND DATABASE ADMINISTRATION Level-II Based on March 2022, Curriculum Version 1 Module Title: - Administering Network Hardware and Peripheral Module code: EIS WDDBA2 M02 0322 Nominal duration: 60 Hour Prepared b...

WEB DEVELOPMENT AND DATABASE ADMINISTRATION Level-II Based on March 2022, Curriculum Version 1 Module Title: - Administering Network Hardware and Peripheral Module code: EIS WDDBA2 M02 0322 Nominal duration: 60 Hour Prepared by: Ministry of Labor and Skill September, 2022 Addis Ababa, Ethiopia Table of Content Acronym………………………………………………………..................................................... 5 Acknowledgment………………………………………………................................................... 6 Introduction to the Module…………………………………...................................................... 7 Unit One: Confirm requirements of client……………............................................................ 9 1.1 Identifying and conforming Client peripheral with organizational standard.................. 10 1.2 Documenting client requirements and peripherals.......................................................... 11 1.3 Reporting findings to appropriate person........................................................................ 11 1.4 Verifying client requirements and reporting procedures................................................. 11 1.5 Cover action taken to ensure client support expectation by vendor warranty................. 12 Self check-1........................................................................................................................... 13 Operation Sheet 1:1 Prepare requirement speciation List..................................................... 15 Lap Test 1.............................................................................................................................. 17 Unit Two: Obtain required peripherals…………………....................................................... 18 2.1 Obtain Peripherals under instruction/specification......................................................... 19 2.2 Entering peripherals into equipment inventory............................................................... 22 2.3Validating delivered component and physical content that match packaging list........... 23 2.4 Storing peripherals using vendor/manual guidelines...................................................... 24 Self check-2........................................................................................................................... 26 Operation sheet 2.1: Search suppliers using search Engine.................................................. 27 Lap Test 2.............................................................................................................................. 30 Unit Three: Connect Hardware Peripherals…………............................................................ 31 3.1 Verifying installation schedule........................................................................................ 32 3.2 Removing old peripherals with environmental consideration and OHS standards......... 32 3.3 Connecting new peripherals by taking into account operating system procedures......... 34 3.4 Configuring computer to accept new peripherals............................................................ 35 Self check-3........................................................................................................................... 38 Operation Sheet 3.1: Graphics card compatibility Test........................................................ 39 Lap Test 3............................................................................................................................. 40 Unit Four: Install peripherals to a network…………........................................................... 41 4.1 Planning location of peripherals to provide service to users based on OHS standard.... 42 Page 2 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 4.2 Connecting peripherals to the network............................................................................ 51 4.3 Connecting peripherals to computers using parallel, serial and other direct connection methods................................................................................................................................. 52 4.4 Testing Peripherals based on client‘s specifications....................................................... 52 Self check-4........................................................................................................................... 54 Operation sheet-4.1: Crimp Ethernet Cable using RJ-45 connecter..................................... 55 Lap Test-4.............................................................................................................................. 58 Unit Five: Configure peripheral services………………........................................................ 59 5.1 Install required software to Configure/manage local area network................................ 60 5.2 Using meaningful name for peripherals and control queues........................................... 61 5.3 Configuring security and access to make use of peripherals........................................... 62 5.4 Configuring workstation to allow applications work with peripherals........................... 63 Self check-5........................................................................................................................... 65 Operation sheet-5.1: Setup a peer-to-peer network in windows 10...................................... 66 Operation title: Peer-To-Peer Networking in Windows 10................................................ 66 Operation sheet 5.2: Procedure for set up Workstation devices............................................ 70 Operation Sheet-5.3: Setting a Static IP Address on Windows 10....................................... 72 Operation sheet 5.4: View the Connected Computers on Windows 10................................ 76 Operation Sheet-5.7: Share Files to the Other PC on Windows 10...................................... 78 Operation Sheet-5.8: Access Files from OtherPC on Windows 10...................................... 80 Operation Sheet-5.9: Adding a Printer Manually on Windows............................................ 81 Operation Sheet-5.10: Sharing Network Printeron Windows 10.......................................... 86 Lap Test-5.............................................................................................................................. 88 Unit Six: Administer and support peripheral services.......................................................... 89 6.1 Assigning Priority to control queues............................................................................... 90 6.2 Configuring settings on network..................................................................................... 90 Self Check-6.......................................................................................................................... 92 Unit Seven: Maintain peripherals and fix common problems.............................................. 93 7.1 Establishing and following regular maintenance schedule............................................. 94 7.2 Replacing consumables components............................................................................... 94 7.3 Fixing peripherals mishaps (unfortunate accident) and malfunction.............................. 95 7.4 Monitoring peripheral usage and traffic.......................................................................... 98 7.4 Recommending additional needed peripherals................................................................ 98 7.5 Determining and rectifying failure of peripherals........................................................... 98 Self check-7........................................................................................................................... 99 Operation Sheet-7.1: Fixing common computer network Problems................................... 100 Lap Test-7............................................................................................................................ 102 Unit Eight: Use and maximize operating system................................................................. 103 Page 3 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 8.1 Configuring an Operating System................................................................................. 104 8.3 Using graphical user interface and command line interface......................................... 105 8.4 Utilizing operating system and third-party utilities....................................................... 105 8.5.Customizable graphical user interface.......................................................................... 106 Self check-8......................................................................................................................... 107 Operation Sheet-8.1: How to Customize the Windows 10 Desktop Icons.......................... 108 Lap Test-8............................................................................................................................ 109 Unit Nine: Support input and output devices...................................................................... 110 9.1 Setting up and checking functionality of Input and output devices.............................. 111 9.2 Installing appropriate drivers......................................................................................... 111 9.3 Ensuring drivers are working properly.......................................................................... 111 Self check-9......................................................................................................................... 112 Operation Sheet 9:1 Check Input /Output device drivers Functionality............................. 113 Lap Test 9............................................................................................................................ 116 Reference............................................................................................................................. 117 Page 4 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Acronym GUI Graphic User Interface DOS Disk Operating system MLE Ministry of Labor and Skills OHS Occupational Health and Safety HCLA hardware compatibility list () MAN Metropolitan area network TTLM Teaching, Training and Learning Materials LAN Local Area Network WAN Wide Area Network VPNA virtual private network HDD Hard Disk Drive CDROM Compact Disk Read Only Memory DVDROM Digital Versatile Memory USB Universal Serial Bus Page 5 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Acknowledgment Ministry of Labor and Skills wish to extend thanks and appreciation to the many representatives of TVET instructors and respective industry experts who donated their time and expertise to the development of this Teaching, Training and Learning Materials (TTLM). Page 6 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Introduction to the Module Networking is the technology of interconnecting computing devices of all types so information can flow between them. This includes activities as simple as topology design to those as complex as the configuration of services and protocols to enable an entire intranet and the support of that environment. Network administrators are generally mid-level support staff within an organization and do not Typically get involved directly with users. Network administrators focus upon network components within a company's LAN/WAN infrastructure ensuring integrity. Depending on the company and its size, the network administrator may also design and deploy networks. This module is designed to meet the industry requirement under the Web Development and Database Administration occupational standard, particularly for the unit of competency Administering Network Hardware and Peripheral. This module covers the units:. Peripheral Requirements,. Obtain peripherals. Connect hardware peripherals. Configure and Install peripherals to a network services. Administer peripheral services. Maintain peripherals and Fix common Problems. Use and maximize Operating system. Support input and Output device Learning Objective of the Module. Confirm Client Requirements. Obtain required peripherals. Connect hardware peripherals. Install peripherals to a network. Configure peripheral services. Administer and support peripheral services. Maintain peripherals and Fix common Problems. Use and maximize Operating system. Support input and Output device Page 7 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Module Instruction For effective use this modules trainees are expected to follow the following module instruction: 1. Read the information written in each unit 2. Accomplish the Self-checks at the end of each unit 3. Perform Operation Sheets which were provided at the end of units 4. Do the ―LAP test‖ giver at the end of each unit and 5. Read the identified reference book for Examples and exercise Page 8 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Unit One: Confirm requirements of client This unit is developed to provide you the necessary information regarding the following content coverage and topics:. Identify and confirm client peripherals.. Document client requirements and peripherals.. Verify client requirements.. Ensure warranty and support services. This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon completion of this learning guide, you will be able to:. Identify and confirm client peripherals in accordance with organizational standards.. Document the client requirements and peripherals in line with organizational standards and findings are reported to the appropriate person.. Verify the client requirements with appropriate person in line with organizational standards and reporting procedures. Ensure client support expectations are covered by vendor and support services. Page 9 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 1.1 Identifying and conforming Client peripheral with organizational standard Computers are used to accomplish many tasks. A basic desktop computer desktop includes the computing unit plus a monitor, keyboard, and mouse. Add even more peripherals to the computer, and the computer will be able to do that many more tasks. People try to differentiate between computer peripherals and computer accessories but they are one and the same thing. The word peripheral means electronic equipment or precisely a computer device connected with the help of a cable to the CPU of the computer or commonly called the cabinet. Main Categories of Computer Peripherals are: A. Input devices B. Output devices C. Input/output and storage devices A. Input peripherals Input devices are those devices with the help of which you can feed data into a computer. In other words, they are a means to provide instructions or feed data into the computer for working according to your requirement. Various input devices are: Keyboard, Mouse, Scanner, Webcam, Barcode reader, Microphone and other pointing devices like trackball, joystick, Touch screen, etc. B. Output peripherals Output devices are those devices with which a computer presents the data or output to the user. Output can be in the form of formatted data or the results of a process, whether the process failed or executed successfully. Various output devices are: Monitor, Printers, plotters (not used now), Speakers, Sound Card, Network card, Graphics card, etc C. Secondary Storage devices A secondary storage device refers to any non-volatile storage device that is internal or external to the computer. It can be any storage device beyond the primary storage that enables permanent data storage. Storage devices include Hard Disk, Compact Disk read only Memory, etc. All these devices are categorized according to their storage capacity. HDDs are considered to be safer for storing data but you can never fully rely on an electronic device. Page 10 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 1.2 Documenting client requirements and peripherals Client requirements and peripherals needed are documented in line with organizational standards and report findings to the appropriate person.Before finalising the purchase of the peripheral, you should fully document the client's requirements and pass on a copy to the relevant parties. This document summarises what you have done and justifies your final recommendations and it gives you:. A history of the tasks undertaken. A guide to the research methods used. Detail all options considered, used and rejected. Support for payment for work undertaken. Will aid in supporting any legal arguments arising from a conflict with the client. 1.3 Reporting findings to appropriate person Client reporting is a crucial part of the agency-client relationship. But what is it exactly, why is it so important, and how can you save time all the while improving your client reporting? There are six reasons why Client Reporting is so important: 1. Client reporting enables you to regularly interact with your client 2. Client reports help you educate your client on what you do 3. Regular reporting keeps both you and your client accountable 4. Transparency is a lot easier through your client reports 5. Client reporting gives credit where credit is due. 6. Your work is all about results, and reports are your way of showing need to be pick up. 1.4 Verifying client requirements and reporting procedures. Identifying the client means obtaining certain basic information about your client and any third party directing, instructing or who has the authority to direct or instruct your client such as a name and address. You must obtain this information whenever you are retained to provide legal services to a client unless an exemption applies. Verifying the identity of a client means actually looking at an original identifying document from an independent source to ensure that your clients and any third parties are who they say they are. You are only required to verify the identity of your client and such third parties if you are involved in a funds transfer activity, that is, you engage in or instruct with respect to the Page 11 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 payment, receipt or transfer of funds. You are not required to identify and/or verify the identity of your client for third parties in all situations. 1.4.1 Methods of verification Verification techniques can be classified into formal or informal, and static or dynamic. Four main verification methods are inspection, demonstration, testing, and analysis. Some of the popular verification techniques include desk checking, inspections, walkthroughs, and reviews. 1.5 Cover action taken to ensure client support expectation by vendor warranty Action taken to ensure client support expectations are covered by vendor warranty and support services. Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties, service and support, prospective suppliers will provide. 1.5.1 Warranty A warranty is a statement provided by the seller or manufacturer of a product that it will work in the manner specified. Warranty means guarantee means promising or agreement to repair or replace it if necessary.Generally, For Example most computers have a 1 or 3 year warranty. This warranty may or may not cover the service, repair and replacement of computer parts. But these warranties apply to certain types of services. 1.5.2 Support services Support service is activity or function required for successful completion of a process, program, or project. The Support Services team provides telephone, fax and email support. Page 12 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Self check-1 Part I: Write TRUE If the Statement is Correct, FALSE If It Is Incorrect. / 1 pts/ 1. Requirements specification may not be file according to organizational guidelines. 2. Reporting is not one of checking requirement analysis. 3. Each client needs their specification in an organization. 4. Interview is one method of collecting information from clients. Part II: Choose the best answer for the following question./ 2 pts/ 1.______ is a combination of a typewriter and numeric keypad? A. Printer C. Webcam B. Keyboard D. Mouse 2. An example of Output device _____________. A. Printer C. Microphone B. Light pen D. Digital camera 3. Verifying client support is____________. A. Obtaining certain basic information about your client B. Any third party directing, instructing C. Who has the authority to direct or instruct your client such as a name and address D. All 4. Which of the following is NOT a computer peripheral? A. Central processing unit C. Scanner B. PrinterD. None 5. What are the three general types of peripheral devices? A. Input, output and storage B. Mouse, keyboard and monitor C. Audio, video and print output D. Internal, wired external and wireless external Page 13 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Part III: Answer all the questions listed below. 1. What is the purpose of peripheral devices? /2 pts/ 2. Why standard is important in verifying client requirements?/3 pts/ 3. What is the purpose of peripheral devices? /2 pts/ 4. What are the types of peripheral devices? Give five (5) examples for each type./2 pts/ Page 14 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Operation Sheet 1:1 Prepare requirement speciation List Operation title: Preparing requirement speciation List Purpose: To prepare requirement Speciation List Instruction: Use the given information below to prepare a check list for laptop.. Tools and requirement: 1. Computers 2. Paper 3. Software 4. Printer 5. Drivers. Steps in doing the task 1. Open Microsoft Office Word 2010. 2. Click on Insert ,then on Click on Table, 3. Click on Table Insert Table, the enter the No column 3 and row 19, you want. 4. Design the as shown below, Finally, Enter the detain information given below. Page 15 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Manufacturer Cabinet type: Dell, Compaq, HP or other good brands Processor Operating system: Windows 10, 11 Manufacturer: Intel Type: Intel Core i7 Processor Speed: 4.7GHZ Peripheral Connectors VGA, HDMI ports, S-Video, RJ- 11, RJ-45 ports, headphone/speaker out, mic Communication and Wired Network: 10/100/1000Gigabit Ethernet connectivity network interface adaptor Wireless Network: Wi-Fi 6E, Bluetooth 5.2 or more wireless Storage Drives Hard Drive Capacity: 500GB Hard Drive Interface: SATA or SSD Memory Type: DDR5 SDRAM Upgradable up to 32GB 4800MHZ Speed Memory Installed memory: 16GB Upgradable: Up to 32GB DVD Drives Optical Drive Type: DVD-RW CD Monitor (Display) Screen type: 17.3‖ 2560 x 1440 pixels display Diagonal size: 17" or more Type: NIVIDIA GeForce RTX 3080 Ti, Video Card GDDR6 memory type Video card memory: 16GB or more Power adapter/Battery AC Adapter and Battery: 99.9 Wh AC Adapter 6-cell or more Table 1: Sample Lap Top specification  Quality Criteria:  The Brand should be Dell and  It should support to additional features of good customer support.. Precautions:. Install application should be compatibility to old programs. Page 16 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Lap Test 1 1. Prepare Desktop computer sample specification by considering the above parameter. Page 17 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Unit Two: Obtain required peripherals This unit to provide you the necessary information regarding the following content coverage and topics:. Obtaining a peripheral. Hardware inventories. Checking contents. Storing peripherals This guide will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon completion of this learning guide, you will be able to:. Obtain under instruction from appropriate person.. Peripherals are entered into equipment inventory according to organizational standards.. Contents of delivered components and physical contents that match the packing list are validated and resolved discrepancies if necessary.. Peripherals are stored according to vendor/manual guidelines. Page 18 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 2.1 Obtain Peripherals under instruction/specification The first step in obtaining a peripheral device is to locate suppliers of that device. Then, there are factors you need to consider about the supplier and the devices on offer, such as support provide purchase price. This will help you to compare and choose the most appropriate supplier and the exact model of the device according to client requirements. Finally, you are ready to place an order for your organisation or client to purchase the device. Some of the methods obtaining peripherals are locating a supplier. There are many ways to find a supplier of peripheral equipment. Some ways include: A. Searching the Internet The Internet provides different methods for searching for suppliers. Using search engines such as Google or Yahoo can help you find a hardware supplier anywhere in the world. Suppliers will often have their own websites that can provide you with catalogues of available equipment. Fig 2.1: Google search B. PC magazines Computing magazines often contain a large section devoted to advertising current hardware suppliers. C. Newspapers Major newspapers have computer/IT sections or classified advertisements which can be a source for finding suppliers. Page 19 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 D. Brochures/advertising material Many larger hardware suppliers use television, radio or leaflet deliveries to inform potential customers of their latest hardware. E. Telephone directory A telephone directory is useful if you need to find a supplier located within your local area. Contacting the manufacturer directly using manufacturer website to find out names of local suppliers. 2.1.2 Choosing a supplier With so many choices of suppliers available, how do you find the right one? There are a few factors to consider:  How long has the supplier been operating? It is a good idea to find a supplier who will still be around for the lifetime of the hardware.  Does the supplier offer suitable support and training? If the client will be requiring a lot of additional assistance, training could be a major contributing factor for choosing a particular supplier.  Does the supplier offer competitive pricing? Considering the support and stability, it is also important to weigh up these factors in relation to price. For a client with a strict budget, price may be a big issue when determining where to purchase hardware.  Is the supplier a preferred supplier for your organisation? Some organisations have arrangements that equipment must be purchased from suppliers who are considered to be the preferred provider for the organisation. Organisations create these agreements because customer loyalty offers substantial discounts, extended warranties and additional support. Fig. 2.2 Choosing Suppliers Page 20 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Fig 2.3: Choosing Suppliers 2.1.3Selecting a peripheral Once you have selected suitable suppliers you need to contact each supplier. Information you should find out from the supplier includes:. Model and manufacturer names of peripherals (including system specifications, physical dimensions, support). Price of each model.. Availability of each model. You may find it helpful to keep a record of any details that you collect so you refer to this information quickly and easily. 2.1.4 Placing an order Depending on the type of organisation you work for, placing an order for a hardware peripheral device could be done in a variety of ways. In a small organisation you may be responsible for ordering the device yourself. However, in a larger organisation there may be employees who are responsible for purchasing new equipment. You may need to fill out an order form that can be given to the purchasing department. Before an order is submitted, it could also be necessary to obtain final approval from senior staff. A purchasing department might require written quotes from three suppliers, a recommendation and justification for the chosen supplier. Make sure that you find out from your supervisor or manager what procedures you need to follow when placing an order within your organisation. Page 21 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Sample order form From ____________________________ Date ____________________________ Code Quantity Description Price Supplier: name and telephone COST GST TOTAL Delivery point ________________________________________________ Budget holder‘s signature _____________________ Table 2. 1Sample Order Form 2.2 Entering peripherals into equipment inventory Inventory database is a centralized repository for all inventory data in an organization. Database for inventory management software allows balancing inventory costs and risks against the desired inventory performance metrics. Most organizations keep some form of record of equipment they own this is called an inventory. Inventories may be paper based, or electronic, in the form of a spread sheet or database. The benefits of keeping an inventory of computer hardware tell you if you already own the required peripheral or not. If it is not being used, you can save purchasing a new peripheral. Besides an inventories can tell you whether the organization has any peripherals of the type you are considering purchasing. When peripherals and other hardware are entered into an inventory, the peripheral itself is often marked with a plant number or bar code. This ensures that the peripheral can be accurately matched with an entry in the inventory. Page 22 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 For Example: Fig 2.4: Equipment inventory Database 2.3Validating delivered component and physical content that match packaging list Contents of delivered components and physical contents that match the packing list are validated and resolved discrepancies if necessary. When unpacking any peripheral device, an organised and methodical approach needs to be taken. Randomly ripping open boxes and packaging without carefully identifying each component can potentially cause many problems later on. Prepare a suitable work area before you begin unpacking. This should include a large sturdy flat area with no carpet so that small components will not be lost. Before commencing to open any packaging, find the manual for the device. Check instructions for any precautions or specific unpacking procedures. Most manuals will also contain a section that tells you a list of included components. It is useful to create a checklist based on the component list. You will then be able to use the checklist to mark off the components when they have been identified. For Example: A typical inkjet printer should include: printer, cartridge, power cable, USB cable, sample paper, feeding device, CD driver, etc Page 23 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 2.4 Storing peripherals using vendor/manual guidelines. 2.4.1 Storing Peripherals Peripheral devices need to be located in a suitable environment — otherwise there may be potential problems. It is a good idea to refer to the manufacturer‘s manual to determine what guidelines should be followed. A. When storing peripherals it is important to:. Keeping equipment in ideal working conditions:-Each manufacturer will have their own recommendations on how to store their peripheral equipment. In order to guarantee that a peripheral will function correctly throughout its life it is important to follow guidelines that have been recommended by the manufacturer. Some common recommendations may include:. Keep equipment in the correct position:-After unpacking, most devices will usually have a proper resting position. If a device is not kept in its natural position, there could be problems when trying to operate the device later on. For example, when a printer is stored in a vertical position, components such as the ink cartridges could leak or be dislodged.. Keep equipment away from weather, dust and other harmful material: -When finding a storage location, consider what kind of elements the device may be subjected to. If, for example, you store a USB drive in a cabinet next to chalk, dust from the chalk could potentially damage the storage device‘s USB connection.. Do not expose equipment to extreme temperatures and high humidity: - Sudden changes in temperature can cause condensation in many peripheral devices. For instance, if a video camera is taken from a cold place to a warm place, condensation may form on the lens and internal parts.. Avoid storing the device in direct sunlight: - Exposure to direct sunlight could damage many of the external components of a device as well as subject the device to high temperatures.. Do not expose equipment to water or moisture: - If water gets inside many peripheral devices there is a risk of electric shock.. OHS guidelines:-When positioning peripherals in their permanent locations it is important to take into account many OHS considerations. Page 24 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Fig 2.5: Storage Room Computer peripheral Page 25 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Self check-2 Part I: Choose the best answer for the following question./ 2 pts/ 1. The first step in obtaining a peripheral device is? A.Locate suppliers B. Placing an ordered C. Selecting D. All 2. Which of the following is not used for locating of supplier? A. Searching in internet B. News paper C. Contacting the manufacturing directly D. None 4. Which factor are not consider in consider choosing a supplier? A. the beauty of product B. Does the supplier offer suitable support and training C. Contacting the manufacturing directly D. None 5. Information you should find out from the supplier is for _____________. A. Selecting a peripheral B. Written quotes from three suppliers C. Model and manufacturer names of peripherals that will satisfy the majority of your clients requirements D. All Part II: Write TRUE If the Statement is correct, FALSE If It Is Incorrect./ 1pts/ __________1. Packaging without carefully may not affect device functionality. __________ 2. Prepare a suitable work area before you begin unpacking. __________ 3. To open a new packing device doesn‘t need any manuals. __________ 4. A power cable is one sample cheek of a printer device. Page 26 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Operation sheet 2.1: Search suppliers using search Engine Operation title: Searching Suppliers using search Engine Purpose: To Search Suppliers using search Engine Instruction: Use the given steps below, search suppliers using search Engine.. Tools and requirement: 1. Computers 2. Internet Service 3. Software 4. Printer. Steps in doing the task 1. Open www.google.com using browser. Fig 2.6: Google Interface 5. Write the information you want to search in the Google Search Box.Example:Peripheral suppliers in Ethiopia. Page 27 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Fig 2.7: Google Search Result 6. Select one of the link you choose and click on it, then the page will be display. Page 28 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Fig 2.8: Submit Data for a Suppliers 7. Enter Full Name, Phone No, and Fill the Necessary information, then click on submit. 8. Finally Contact the Company, Process the order and obtain the peripheral device.. Quality Criteria: You must Enter appropriate search key word.. Precautions:. The internet must be Functional and set up must be prepared.. Keep your work area clean and well lit Page 29 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Lap Test 2 Instruction: Do Lap Test below. 1. Using any search Engine Find best Computers sellers Companies in Addis Ababa, Ethiopia. Page 30 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Unit Three: Connect Hardware Peripherals This unit is developed to provide you the necessary information regarding the following content coverage and topics:. Verifying installation time frame. Removing old Peripherals. Connecting new peripherals by taking into account operating systems. Configuring computers to accept new peripherals based on business requirement. Testing and confirming compatibility issues and hardware peripherals to meet client satisfaction This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon completion of this learning guide, you will be able to:. Timeframe for installation schedule based on the client requirement.. Remove Old peripherals with minimal disruption to clients, taking into account environmental considerations and OHS standards.. Connect new peripherals with minimum disruption to clients, taking into account operating system procedures.. Configure the computer to accept the new peripherals based on business requirement. Taste Hardware peripherals and confirmed to client satisfaction, pay particular attention to possible impact on other systems and make adjustments as required. Page 31 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 3.1 Verifying installation schedule Timeframe for installation schedule is verified with the client requirement. When you install peripherals for clients it is important to ensure that it is done in a structured manner. Good planning will go a long way to ensure that the installation goes as smoothly as possible and minimize disruption to the client. 3.1.1 Pre installation Prior to installation you should do the following:. Contact the client to arrange a suitable time for the installation and ensure that they make a backup of any critical data before your arrival.. Give the client an approximate assessment as to how long the installation will take. Preparing the site before commencing work is critical not only to the installation process but above all else for safety reasons.. On arrival ensure that the installation can go ahead and will not disrupt the clients work.. Clear your work area and ensure that you have adequate space and light to work with.. Explain to the client the process so they understand what is going to take place this will help them understand the procedure. 3.2 Removing old peripherals with environmental consideration and OHS standards Old peripherals are removed and new peripherals are connected with minimum disruption to clients, taking into account operating system procedures, environmental considerations and OHS standards. The computer configured to accept the new peripherals based on business requirement. If you remove a current hardware device or upgrade drivers, it may be necessary to remove an old version of a driver. 3.2.1 Removing old Peripherals by Environmental consideration The components that go into computers are exceptionally valuable to recycle, and are extremely toxic or dangerous to the environment if released or disposed of incorrectly. Heavy metals used in batteries or circuits pollute groundwater and kill animals. Batteries are also readily flammable and are unsafe to go into mixed garbage. There is a large quantity of plastic used in most electronics, which will take decades to break down, and often this plastic is ABS. ABS is based on polystyrene, and as such it will break down into toxic particulate as it degrades. Page 32 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Some of them are: A. Disposal of packaging To make sure you dispose of old computers and hardware safely follows these steps. 1. Backup your data. Before you do anything, backup your hard drive so you don't lose any data. 2. Wipe your hard drive. Clearing data off our computer is no easy process. 3. Donate, resell, or recycle. You can't just throw your computer away. B. Disposal of redundant hardware Used computer disposal means that there will be a need for the disposal of computer parts when equipment cannot be re-used. When disposing of an old PC, there is really only one way to securely erase the information on the hard drive: You must destroy the magnetic platter inside. Use a T7 screwdriver to remove as many screws as you can access. You'll probably be able to remove the main circuit board from the enclosure. 3.2.3 Removing old Peripherals using OHS The Occupational Safety and Health Standards were formulated in 1978 in compliance with the constitutional mandate to safeguard the worker's social and economic well-being as well as his physical safety and health. Environmental and safety requirements is vital to meet relevant safety standards workers safety environment. By implementing OHS during removing old Hardware peripherals ,it is possible to minimize hazard. Some of them are: A. Physical hazards A physical hazard is defined as "A factor within the environment that can harm the body without necessarily touching it. Vibration and noise are examples of physical hazards". Physical hazards include but aren't limited to electricity, radiation, pressure, noise, heights and vibration amongst many others. B. Chemical hazards A chemical hazard is simply the risks involved with using a chemical. So in the workplace chemical hazards can be; Health hazards- where workers and other personnel are exposed to hazardous chemicals through inhalation, absorption through the skin, or ingestion and swallowing. C. Ergonomics Page 33 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Ergonomics (from the Greek word ergon meaning work, and nomoi meaning natural laws), is the science of refining the design of products to optimize them for human use. Computers and related Ergonomic hazards refer to unsafe workplace conditions that pose (cause) the risk of injury to the musculoskeletal system of the worker. The type of things that cause to ergonomic hazards includes:. Repetitive and forceful the same movements.. poor lighting. improperly adjusted workstations and chairs. improper work methods. Use of too much force, especially if you have to do it frequently. D. Fire Fire is the product from a chemical reaction between oxygen in the atmosphere and some sort of fuel (wood or gasoline, for example). "Thecombustion or burning, in which substances combine chemically with oxygen from the air and typically give out bright light, heat, and smoke." 3.3 Connecting new peripherals by taking into account operating system procedures. 3.2.1 Install and configure computer peripheral devices The peripheral devices are those devices which are connected to the computer and it helps the computer function. These devices contain both the input devices, which are used to give command to the computer and the output devices, which help computer showing the result to the user. The computer works with many peripheral devices so it's important to know that how much these devices can be installed in the computer and how can configure them. Following are the devices which are used by the computer and the ways they can be configured: A. Hardware Minimum Requirements Hardware requirements must meet the functionality why it is purchased and confirm that your device meets these requirements. For example if your laptop does not meet the minimum requirements, among other issues, you will not have access. Most critically, your laptop runs the risk of not supporting software that is required for your procedures. Page 34 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 B. How to Check Computer Configuration For the best performance, business owners should keep up-to-date with their computer equipment; to determine whether or not you should upgrade a workstation, review the PC's configuration in Windows. In communications or computer systems, a configuration of a system refers to the arrangement of each of its functional units, according to their nature, number and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, and documentation. 3.4 Configuring computer to accept new peripherals. 3.4.1 Adding new peripherals A. Hardware compatibility List The Hardware Compatibility List is a list of products maintained by Microsoft that note devices that have been tested for compatibility with Windows OS. It will also note those products that have been tested to pass Microsoft standards of compatibility, reliability and security and will work with all PCs running Windows operating system. A hardware compatibility list (HCL) is a list of computer hardware (typically including many types of peripheral devices) that is compatible with a particular operating system or device management software. In today's world, there is a vast amount of computer hardware in circulation and many operating systems too. A hardware compatibility list is a database of hardware models and their compatibility with a certain operating system. B. Operating system compatibility Compatibility modecreates the environment of an earlier operating system for applications that are not compatible with the current operating system. Compatibility mode allows an older program written for an earlier version of Windows to possibly run in new Operating System. C. Install device drivers A driver is software that allows your computer to communicate with a particular type of hardware device that is attached to your computer. Windows can automatically check if there are drivers available for new devices that you connect to your computer. Page 35 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 You can have Windows automatically download recommended drivers and detailed information for your hardware and devices. This is a good way to make sure all your hardware and devices work properly. A device driver essentially converts the more general input/output instructions of the operating system to messages that the device type can understand. Example: device drivers for: - displays (graphic cards) - NIC/modem - printers - sound Note: When you buy an operating system, many device drivers are built into the product. D. Testing hardware peripherals Hardware peripherals are tested and confirmed to client satisfaction, pay particular attention to possible impact on other systems and make adjustments as required. Confirming tested results to client satisfaction, possible impact on other systems and making adjustments. Compatibility testing is a type of software testing used to ensure compatibility of the system/application/website built with various other objects such as other web browsers, hardware platforms, users (in case if it's very specific type of requirement, such as a user who speaks and can read only a particular language). Let's look into compatibility testing types:  Hardware: It checks software to be compatible with different hardware configurations.  Operating Systems: It checks your software to be compatible with different Operating Systems like Windows, UNIX, etc.  Software: It checks your developed software to be compatible with other software. For example, MS Word application should be compatible with other software like MS Outlook, MS Excel,etc.  Network: Evaluation of performance of a system in a network with varying parameters such as Bandwidth, Operating speed, Capacity. It also checks application in different networks with all parameters mentioned earlier. Page 36 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022  Browser: It checks the compatibility of your website with different browsers like Firefox, Google Chrome, and Internet Explorer etc.  Devices: It checks compatibility of your software with different devices like USB port Devices, Printers and Scanners, Other media devices and Blue tooth.  Mobile: Checking your software is compatible with mobile platforms like android, iOS etc.  Versions of the software: It is verifying your software application to be compatible with different versions of the software. For instance checking your Microsoft Word to be compatible with Windows 7, Windows 7 SP1, Windows 7 SP2, Windows 7 SP3. Page 37 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 3 Self check-3 Part I: Give Short Answer. 1. Define compatibility? / 2 pts/ 2. List the conditions to be considered in pre installation of peripheral device activity?/5 pts/ 3. Why do you mean by Ergonomic and its impact? / 3 pts/ Page 38 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Operation Sheet 3.1: Graphics card compatibility Test Operation title: Checking the Graphics card functionality Purpose: To checkthe Graphics cardis compatible the operating system. Instruction:Follow the following instruction to check the compatibility of Graphics card.. Steps in doing the task Step 1: Open the Run box by hitting Win + R keys. Step 2: Input dxdiag and click OK. Step 3: Go to the Display tab and you can see much information about your graphics card. Fig 3.1: Submit Data for a Suppliers Step 4: Go to the Internet and check if the specifications of your graphics card support DirectX9 or later.. Quality Criteria: The brand and version should be updated.. Precautions:. The Computer must be Functional and set up should be prepared. Page 39 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022. Keep your work area clean and well lit Lap Test 3 Instruction: Do the Lap Test below accordingly. 1. Check the following drivers compatibility?. Audio drivers. Network drivers. USB drivers Page 40 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Unit Four: Install peripherals to a network This unit is developed to provide you the necessary information regarding the following content coverage and topics:. Planning location of peripherals to provide service to users. Connecting peripherals to the network. Connecting peripherals to computers using parallel, serial and other direct connection. Testing Peripherals This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon completion of this learning guide, you will be able to:. Locate peripherals to provide appropriate services to users. Connect Peripherals to computers in the network. Use parallel, serial or other direct connection methods appropriate for the job order.. Test Peripherals for correct operation based on client‘s specifications. Page 41 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 4.1 Planning location of peripherals to provide service to users based on OHS standard. Peripherals are devices physically connected to a computer or network that require ‗driver‘ software to run them and to be configured to meet requirements of operating systems and network protocols. Location of peripherals are planned to provide appropriate services to users and to take into consideration OHS standards. What are the 5 occupational health and safety procedures?. Be Aware.. Maintain Correct Posture.. Take Breaks Regularly.. Use Equipment Properly.. Locate Emergency Exits.. Report Safety Concerns.. Practice Effective Housekeeping.. Make Use of Mechanical Aids. 4.1.1 Computer Network A computer network is a connection of two or more computers and other peripheral devices to share resources each other. A system in which a number of independent computers are linked together to share resources and peripherals, such as hard disks and printers. A. Advantages of Networks. Sharing information/data. Ex: Email, documents, audio/video. Sharing peripherals. Ex: printers, modems,. Sharing software. Ex: word-processors, spreadsheets. Centralizing administration/support. B. Disadvantages of Networks. Costly, in terms of extra equipments and technical skills. Data security problems.. Data could be at risk to unauthorized access or hackers.. Spread of computer viruses due to sharing of some files or programs. Page 42 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 4.1.2 Types of Network The type of network can be classified in to three based on geographical limitation: A. LAN. A local area network is a network built over a small area.. Has geographical limitation/restriction.. A LAN can range from simple to complex. A. MAN. A metropolitan area network (MAN) is a computer network that usually spans a city or a large campus.. It is larger than local area network B. WAN. WAN is made up of a number of interconnected LANs.. Wide area network has no geographical limit.. The largest WAN is the Internet. 4.1.3 The type of network can be classified into two based on connection type: The connection can be done as peer-to-peer or client/server. A. Peer to peer Connection type A peer-to-peer network is a type of network in which every computer has equal importance on the network. Some of characteristics are:. There is no centralized control over resources such as files or printers.. It is a good networking solution when there are 10 or fewer users.. Allows simple sharing of data and hardware, such as printers.. Has Poor security for data and other resources.. It is easy to install/set up. B. Server-Based Networks (client/server) Page 43 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022. This type of network is designed to support a large number of users.. In a server based network Figure 4. 1 Server Based Network environment the server(s) perform several key operations such as :  Has good security for data and other resources  Data can be backed up centrally  Can support large number of users.  Requires high level of technical skill to setup and support  Costly, in terms of equipments and IT professionals  Requires at least one knowledgeable administrator But the type of network you choose to implement will depend on the following factors:. Size of the organization. Level of security required. Type of business. Level of administrative support available. Amount of network traffic. Needs of the networks users. Network budget 4.1.4 Types of Network topology Network Topology refers to physical or logical layout (arrangement or shape) of the computers (devices) in the network. It is the locations of the computers and how the cable is run between them. Network topologies are categorized into the following basic types: A. Bus B. Ring C. Star D. Mesh More complex networks topologies can be built as hybrids of two or more of the above basic topologies. A. Bus Topology Page 44 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Bus topology is a type of network which uses a common channel (a single communication line) to connect all devices together to share information and resources. In a bus topology:. Each computer (node) connects to a single segment trunk (a communication line), called backbone or main highway, which is referred to as the 'bus'.. The signal travels from one end of the bus to the other.. Terminator is required at the end of the backbone to absorb the bouncing signal.. A media access method called CSMA/MA is used to handle the collision that occurs when two signals placed on the wire at the same time. Fig 4.2 Bus Topology Advantages of bus network:. Failure of one of the station does not affect others.. Easy to implement and extend.. doesn't require much cabling. work best with a limited number of computers Disadvantages of bus network:. Limits on cable length and number of computers.. Difficult to find network faults.. A cable (a backbone cable) brake/failure can disable the entire network.. As the number of computers increase, the speed of the network slows down. Terminator is required A. Ring Topology Ring topology is a type of network in which every computer connected to a single cable.  In ring topology: Page 45 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Fig 4.3 : Ring Topology. All messages travel through a ring in the same direction (either "clockwise" or "counter clockwise").  Each node handles its own applications and also shares resources Fig 4.1.2 1 Ring Topology over the entire network.. Each computer on the ring has equal access, but only one computer can send message at a time.. The token travels along the ring until it reaches the destination address. Advantages of ring topology:. All nodes on the network have equal chanceof transmitting data.. Use of cable is economical.. Data can be sent over large distances (each computer can act as repeater)  Disadvantages:. If one of the nodes/cable fails, the whole networks will fail.. Difficult to add and delete nodes to /from the ring. B. Star Topology A star topology is a type of network which uses a central point to share data files, programs and resources between clients.  In star network:. The central point is called switch or hub.. Signals are transmitted from the sending computer through the hub/switch to all computers on the network. Fig 4.4: Star Topology Advantage of star topology:. Easy to add new workstations. Has centralized control. Failure of a single computer does not affect the whole network. Fault of a single workstation can be identify easily Page 46 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Disadvantage of star topology:. If the central point fails, the whole network will stop.. Use of cable is not economical. C. Mesh topology Mesh topology is a type of network in which every node has a connection to every other node in the network. Fig 4.5: Mesh Topology 4.1.5 Network Transmission Media Transmission Media is the physical path between the transmitter and the receiver in a data communication system. There are 2 basic categories of Transmission Media: A. Wire/Guided B. Wireless/Unguided. A. Wire/Guided Transmission Media: uses a "cabling" system that guides the data signals along a specific path. The data signals are bound by the "cabling" system. Guided Media is also known as Bound Media. B. Wireless/Unguided Transmission Media: consists of a means for the data signals to travel but nothing to guide them along a specific path. The data signals are not bound to a cabling media and as such are often called Unbound Media. Commonly there are three types of guided transmission cable:- 1. Twisted Pair Cable 2. Coaxial Cable 3. Optical fiber cable 1. Twisted pair cable Twisted-pair cable consists of two insulated strands of copper wire twisted around each other. The oldest, least expensive and most commonly used transmission media. Two types of twisted-pair cable:- I. Unshielded twisted-pair (UTP) Page 47 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 II. Shielded twisted-pair (STP) cable. I. Unshielded Twisted Pair (UTP):- is the most popular and is generally the best option for school networks. The quality of UTP may vary from telephone-grade wire to high-speed cable. The cable has four pairs of wire inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices.. It is the most commonly used cable types in LANs.. It is made up of four twisted pairs enclosed in a plastic jacket.. Depending on the bandwidth offered there are seven types of UTP cables such as Cat- 1,Cat-2,cat-3,cat-4,cat-5,cat-6 and cat-7. The Most commonly used UTP cables are category-5 cables and its bandwidth is 1000Mbps. Fig 4.6: Unshielded Twisted Pair II. Shielded Twisted Pair (STP) cable. Uses a woven copper braid jacket and higher quality protective jacket. Also uses foil wrap b/n and around the wire pairs. Much less susceptible to interference and supports higher transmission rates than UTP. shielding makes it somewhat harder to install. same 100 meters limit as UTP Fig 4.7: Shielded Twisted Pair (STP) cable 2. Coaxial Cable Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other conductor woven around it providing a shield. An insulating protective coating called a jacket covers the outer conductor. Page 48 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 The outer shield protects the inner conductor from outside electrical signals. The distance between the outer conductor (shield) and inner conductor plus the type of material used for insulating the inner conductor determine the cable properties or impedance. Typical impedances for coaxial cables are 75 ohms for Cable TV, 50 ohms for Ethernet Thinnet and Thicknet. The excellent control of the impedance characteristics of the cable allow higher data rates to be transferred than Twisted Pair cable. 3.Optical Fiber An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic. Plastic is easier to install, but cannot carry the light pulses for as long a distance as glass. Fig 4.8: Optical Fiber 4.1.6 LAN cables and connectors An Ethernet cable is a network cable used for high-speed wired network connections between two devices. This network cable is made of four-pair cable, which is consists of twisted pair conductors. It is used for data transmission at both ends of the cable, which is called RJ45 connector. The Ethernet cables are categorized as Cat 5, Cat 5e, Cat 6, and UTP cable. Cat 5 cable can support a 10/100 Mbps Ethernet network while Cat 5e and Cat 6 cable to support Ethernet network running at 10/100/1000 Mbps. There are three types of Ethernet cables are available:  Straight-through cable  Crossover cable  Rolled cable A. What is straight Through Cable? Straight-through cable is a type of CAT5 with RJ-45 connectors at each end, and each has the same pin out. It is in accordance with either the T568A or T568B standards. It uses the same color code throughout the LAN for consistency. This type of twisted-pair cable is used in LAN to connect a computer or a network hub Page 49 of 118 Ministry of Labor and Skills Administering Network Hardware and Fig 4.8: Straight through Cable Version -1 Author/Copyright Peripheral September, 2022 such as a router. It is one of the most common types of network cable. B. What Is Crossover Cable? A Crossover cable is a type of CAT 5 where one end isT568A configuration and the other end as T568BConfiguration. In this type of cable connection, Pin 1 is crossed with Pin 3, and Pin 2 is crossed with Pin 6. Crossover cable is used to connect two or more computing devices. It is widely used to connect two devices of the same type: e.g., two computers or two switches to each other. Fig 4.9: Crossover Cable C. Making Ethernet 10Base-T cables: o Straight-thru cable: PC-to-HUB. o Crossover cable: PC-to-PC. D. Making console cables: Rollover cable: Serial port-to-console port of Cisco equipment‘s 10Base-T: T568-B 10Base-T: T568-A Fig 4.12 10Base-T: T568-B Page 50 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Fig 4.11: 10Base-T: T568-A 4.2 Connecting peripherals to the network Peripherals are devices physically connected to a computer or network that require ‗driver‘ software to run them and to be configured to meet requirements of operating systems and network protocols. Single user peripherals can include: printers, scanners, speakers, external DVDs, CDs, game pads and joysticks, graphics tablets and pens, modems, UPS (uninterrupted power supply), removable hard disks and webcams, while printers, network attached storage devices, and LCD projectors are often accessed over networks. 4.2.1 Large and small LANs, WANs and VPNs A virtual private network (VPN) is programming that creates a safe and encrypted connection over a less secure network, such as the public internet. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols. A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings; however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. Many WANs are built for one particular organization and are private. Others, built by Internet service providers, provide connections from an organization's LAN to the Internet. WANs are often built using leased lines. 4.2.2 The internet A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. The information used to get packets to their destinations is contained in routing tables kept by each router connected to the Internet. Routers are packet switches. A router is usually connected between networks to route packets between them. Each router knows about its sub-networks and which IP addresses they use. The Internet is a global wide area network that connects computer systems across the world. It includes several high-bandwidth data lines that comprise the Internet "backbone." When you connect to the Internet using a public Wi-Fi signal, the Wi-Fi router is still connected to an ISP that provides Internet access. Page 51 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 4.3 Connecting peripherals to computers using parallel, serial and other direct connection methods Peripheral devices can be connected to your computer via USB port, serial port, parallel port, specialized network card, or Ethernet network Peripherals are connected to computers in the network using parallel, serial or other direct connection methods appropriate for the job order. 4.3.1 Parallel Parallel and serial networking connections are alternative methods of moving data between computers, or from a computer to a peripheral device. Parallel connections are still used for large computer installations and specialized tasks.It is more like a superhighway, where there may be eight or more path in each direction moving traffic. 4.3.2 Serial Connection A serial connection is a single-lane road, with all data moving back and forth along a single channel for each direction Parallel Advantages of Serial. Serial connections are easier for computers to maintain and simpler to work with, as a single serial connection will contain data for only one networking or peripheral purpose. 4.3.3 Direct connection From simple direct connections between computers to complete home and even IT networks, you will learn how to select equipment and configure the systems. 4.4 Testing Peripherals based on client’s specifications. 4.4.1 Definition of Peripheral Testing Software testing company provides a range of different types of product testing services. Peripheral testing does not involve the presence of the specified algorithm of performance or some specific methodologies and techniques. Software testing has a number of peculiarities and tricks. Equipment for testing computer peripherals is disclosed having a computer, with keyboard and display, for coupling to such peripherals by way of a peripheral connector, the computer being provided with software defining test and exercising routines for operating a peripheral device in a controlled and monitorable manner. Page 52 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Peripherals are tested for correct operation based on client‘s specifications i.e. testing Your Computer Network:. Check the physical connections. Check that the Link light — the little red or green light next to the RJ-45 port — is lit on every computer.. Verify that you can log on.. Check the network configuration.. This command will spit out numerous lines of information.. Verify that the computers can ping each other. Page 53 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Self check-4 Part I : Choose the best answer for the following question./ 2 pts/ 1. The core elements of a computer are _______________. A. Central processing unit C. Motherboard B. Power supply D. All 2.Which is more secured? A. Sever based C. All B. peers to peer D. None 3. Which one is the fastest medium? A. Fiber C. Coaxial B. UTP D. All 4. __________is an example of peripheral device. A. Input C. Process B. Output D. All 5. _______ is the best type of topology. A. Star C. Ring B. Star Bus D. Mesh Part II: Write True If the Statement is correct, False If It Is Incorrect./ 1pts/ 1. I/O ports are design for connecting external device to internal computer. 2. Some of your peripherals will need special software. 3. Parallel port uses a 27-pin connector. 4.Aperipheral device connects to a computer system to add functionality. Page 54 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Operation sheet-4.1: Crimp Ethernet Cable using RJ-45 connecter Operation title: Crimping Ethernet Cable using RJ-45 connecter Purpose: To create a network cable in order to connect two or more computers. Instruction: Using instruction below and prepare straight through cable using a RJ-45 connecter.. Tools and requirement: 1. Computers 2. Maintenance Tool kit 3. Network toolkit 4. Software 5. Printer 6. RJ-45 connecter. Steps in doing the task Step 1: Prepare, a Cat5e or Cat 6 cable i.e. Unshielded Twisted Pair (UTP.). Step 2: Putting the Wires in the Connectors i.e. next, this will need at least 2 RJ45 wire connectors, one for each side of the cable. Note: After the wires have been spread apart organizes them into the correct color order of the desired cable. Use T-568B standard for a straight-through, which means that the color order for the wires is going to be the exact same on both sides. After the colors have been organized, if they don‘t all reach the same length, use wire cutters directly on the end, to make each wire the same length. Page 55 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 10Base-T: Straight-Through cable Step 4: Crimping the Connector Fig 4.12:Crimp with RJ 45 Step 5: Testing the Cable. Fig 4.13:Testing Cable Step 7.Connect each of the other computers to the router using an RJ-45 cable for each connection: Page 56 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022. Quality Criteria: The Straight through cable must be functional in networked computers.. Precautions:. The LAN set up must be available.. Keep your work area clean and well lit. Apply OHS Page 57 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Lap Test-4 Instruction: Do the given Lap Test below. 1. Prepare : A. Straight through cable using RJ-45 connecter. B. Cross over cable using a RJ-45 connecter. 2. Test both cable using Network cable Tester. Page 58 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Unit Five: Configure peripheral services This unit is developed to provide you the necessary information regarding the following content coverage and topics:. Manage local area network-connected peripherals. Meaningful name for peripherals and control queues. Configure Security and access to use of peripherals. Configure Workstation to allow applications This unit will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon completion of this learning guide, you will be able to:. Install the required software to manage local and network.. Set Requirement for software peripherals according to business requirement.. Use Meaningful names for peripherals and control queues.. Set Security and Control access to allow appropriate users to make use of peripherals.. Configure Workstation to allow applications to work with peripherals. Page 59 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 5.1 Install required software to Configure/manage local area network 5.1.1Network Peripherals A network peripheral refers to equipment which typically enables computers to communicate each others. A local peripherals is a peripheral that can be connected to the stand alone (a single) computer. Examples of Network peripherals include: - routers, Switches, Access points, Network interface cards and other hardware devices. B. Hub Hubs are simple network devices, and they are simply low cost. Most hubs are referred to as either active or passive. C. Switch On the surface, a switch looks much like a hub. Despite their similar appearance, switches are far more efficient than hubs and are far more desirable for today's network environments. D. Repeater A repeater amplifies the signal it receives on one port before it transmits it on other ports. Because the repeater does not check on the contents of the data it receives or retransmits, frames that are corrupted by noise and other factors can also be repeated. The development of the hub replaced the repeater for all practical purposes, because it performs the same functions, and can include additional features. E. Routers A router is a special computer which has the ability to perform such tasks as routing and forwarding information with use of software and hardware. A router is used to provide connectivity across wide area network (WAN) links and route information between two LAN segments. F. Gateways The term gateway is applied to any device, system, or software application that can perform the function of translating data from one format to another. Actually, the term gateway refers more to a network role than a network device. F. Modems Modems perform a simple function: They translate digital signals from a computer into analog signals that can travel across conventional phone lines.It is a contraction of the terms modulator and demodulator. Page 60 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 G. Network Interface Cards (NICs) NICs are the mechanisms by which computers connect to a network. NICs come in all shapes and sizes, and they come in prices to suit all budgets.  Known as network card, network adapter, and LAN adapter, etc. H. Transceivers The term transceiver does not necessarily describe a separate network device but rather an integrated technology embedded in devices. I.e. transceiver = transmitter and a receiver device that receives data, converts it, and then sends it to another location. I. Firewall A hardware or software system that is used to separate one computer or network from another one. The most common type is used to protect a computer or an entire network from unauthorized access from the Internet. 5.2 Using meaningful name for peripherals and control queues A peripheral device is typically a device that is external to a computer and connected either wirelessly or via a cable, although some are internal to the digital system. A way of introducing students to peripheral devices is to start with a desktop computer with no other devices connected. Progressively add devices as the different user needs are introduced. As you install and configure a printer you should keep to the network standards of the organisation, which should include naming conventions for peripherals and other devices. Each organisation will have its own standards, but it is important that users can identify peripherals easily. There have been cases of users waiting by one printer for their report while it is being printed three floors away. Naming conventions usually reflect the function of a peripheral, and in the case of a large office or global enterprise, the location. For example, the following may be used for a peripheral name of 15 characters: Characters 1–4 5–7 8–10 11–15 Attributes City or Type of Workplace Uniqueness of device, usually reflected town peripheral location number sequence Table 5.1 Peripheral Naming Concept Page 61 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 5.3 Configuring security and access to make use of peripherals. 5.3.1 Basics of Peer to peer Network In a peer-to-peer network, computers on the network are equal, with each workstation providing access to resources and data. This is a simple type of network where computers are able to communicate with one another and share what is on or attached to their computer with other users. The Windows networking functions allow you to implement networking capabilities in your application without making allowances for a particular network provider or physical network implementation. This is because the Windows networking functions are network independent. 5.3.2 Configuring peripherals to access and use security A. User Privileges Windows 10 allows providing security to files and folders; this feature is available because of the NTFS (New Technology File System). There are different levels of security, such as read, modify, full control etc. Full control permissions include:  Read  Write  execute  delete  change permissions Page 62 of 118 Ministry of Labor and Skills Administering Network Hardware and Version -1 Author/Copyright Peripheral September, 2022 Where as modify includes 4 permissions that is, read, write, execute and delete. B. Sharing Network resources Sharing allows an object to be accessed from network. By default in windows 10, there are some hidden shares, these shares end with a $ symbol. To view these default shares open computer management (right click on my computer and choose manage) and select shared folders and then shares. Most devices support access control lists. Example: printers, sharing data using folders, and manage devices, etc 5.4 Configuring workstation to allow applications work with peripherals. 5.4.1 Configuring workstation  Perform appropriate steps to set up a basic workstation includes:. Plug in cables. Power on computer. Follow initial operating system setup wizard. Install security software,. Configure peripherals (if applicable). Install and Uninstall unneeded software (if applicable). Configure and verify Internet connection. Run software and security updates. Other user accounts (if applicable). Basic cable management. Software version identification and compatibility. Configure keyboard, mouse, display, sound, etc. 5.4.2 IP Networking Basics IP Addresses Each device on an IP network requires 3 different pieces of information in order to correctly communicate with other devices on the network: an IP address, a subnet mask, and a broadcast address. You will usually see each of these numbers written as four "octets" (e.g. 198.41.12.151, 255.255.255.0, and 198.41.12.255). Every IP address is really made up of two pieces: a "network" portion, which tells routers what group of devices a packet should go to (e.g., any, a campus, etc.) and a "host" portion which tells routers what specific device among that group the packet should go to. By examining the destination address in an IP packet that must be forwarded, and by using information that has either been statically configured or dynamically gathered from other routers, any router can determine the optimal path for forwarding packets from one group to another. Each group of devices on an IP internet needs to have a unique network portion, and each device within that group also needs a unique host portion. In the case of the Internet, this uniqueness is made possible by indirectly getting all network portion assignments through a central clearinghouse called the Network Information Center or "NIC." The NIC assigns blocks of addresses to Internet Service Providers (ISPs), who then assign these addresses to their customers. If your network is, or will be, connected to the Internet, you will need to get a unique network address from your ISP or network administrator. How much of any given address is the network part and how much is the host part is determined by the "class" of the network. In each case, the part of the address not used for the network portion is left as the host portion. Class Network Portion Hosts Allowed A from 1.0 to 127.0 approx. 16 million B from 128.0 to 191.255 65,536 C from 192.0 to 223.255.255 255 Table 5.1: IP Address Classes You can always tell what class an address is by looking at the first octet and comparing it to the chart above. For instance, the address at the top of this appendix has 198 as the first octet, so it is Class C. Subnet Masks A subnet mask tells a router how much of an address it should treat as the network portion. The masks for traditional Class A, B and C networks. Subnet Mask Class A 255.0.0.0 B 255.255.0.0 Page 64 of 118 Ministry of Labor and Skills Administrate Network and Curriculum Version - I Author/Copyright Hardware Peripherals Sep,2022 C 255.255.255.0 Table 5.2: Standard IP Subnets Self check-5 1. List some of the Networking device and define them?/ at least 4/ /5 pts/ 2. List the privileges when configuring Folders network security? / 5 pts/ Page 65 of 118 Ministry of Labor and Skills Administrate Network and Curriculum Version - I Author/Copyright Hardware Peripherals Sep,2022 Operation sheet-5.1: Setup a peer-to-peer network in windows 10 Operation title: Peer-To-Peer Networking in Windows 10 Purpose: To Connect two or more computers in local area network. Instruction: Using the information given below and equipments configure Local area Network.. Tools and requirement: 1. Computers 2. Maintenance Tool kit 3. Network toolkit 4. Software 5. Printer. Steps in doing the task 1. On your desktop, right-click on the This PC to reveal the context menu and select Properties. This should open a control panel window. 2. Locate and click on Advance Change Settings in the window that opens. This will open a System Properties 3. Under the Computer Name tab, click on the Change button. Page 66 of 118 Ministry of Labor and Skills Administrate Network and Curriculum Version - I Author/Copyright Hardware Peripherals Sep,2022 Fig.5.2: Computer Name 4. Click on the radio button next to how you wish to connect to the P2P network. If the network you wish to connect to has a domain, enter the name next to the Domain radio button. If you wish to connect through a local Workgroup, enter the name of the Workgroup after selecting the radio button for the same. Page 67 of 118 Ministry of Labor and Skills Administrate Network and Curriculum Version - I Author/Copyright Hardware Peripherals Sep,2022

Use Quizgecko on...
Browser
Browser