Question

In: Computer Science

Summarize the equipment needed, and explain in detail the procedure for setting up a home network,...

Summarize the equipment needed, and explain in detail the procedure for setting up a home network, and connecting to the internet.

Solutions

Expert Solution

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

A domestic data network is a digital communications gadget linking all your devices to the internet and each other. A domestic data community can utilize each stressed and wi-fi technology, connecting all gadgets to a central factor known as a hub or a transfer.

In this manner, the devices can talk with every different. As an example, computers can access files and printers on different computer systems, televisions can play movies or other media saved in your computer systems, and internet-enabled gadgets can connect with applications and services outdoor of your own home.

essential Networking components of a home community
1. net Modem
Whether or not you have net carrier from your cable corporation or DSL service out of your cellphone corporation, the net Modem converts their raw signal into one which you can use all through your property.
Similar to your fuse field connects your home's electrical system to the grid, your internet modem will join your home network to the rest of the sector. With carrier out of your cable business enterprise, their coaxial cable connects for your cable modem. Within the case of DSL service, their internet modem connects for your cellphone line.
Keep in mind that you do now not should rent your net Modem out of your provider. You're free to shop for one of your very own. Net modems may be purchased online for $20-$50 and are designed to be user-hooked up with aid from your internet provider company. For instance, pictured proper is the Motorola Surfboard SB5101, a popular cable modem that sells for around $50 and is utilized by many cable carriers.
2. Ethernet Hub or switch
The Ethernet hub or switch is the coronary heart of a network with several Ethernet ports so that stressed components could benefit get right of entry to to the internet via the hub or switch. Think of this tool like the power strip you operate to attach all of your electrical devices; you'll need one port for each device you wish to connect.
Once you have obtained a hub or a switch, you merely want to plug it into the electrical socket and join the Ethernet cables from the gadgets on the network. Each pc bought in the beyond ten years comes geared up with an Ethernet connection, and the wires are so ubiquitous that you may even buy them at the home Depot.
What's the distinction among a hub and a switch? A switch, now and then known as a "switched hub" has a much higher green design than a conventional hub as it only routes the necessary facts to the tool that requests it. I'd fantastically propose a transfer as standard hubs are now out of date with little or no difference in price. While purchasing a transfer for domestic use, look for an unmanaged switch. It's inexpensive and easy to put in, unlike a managed transfer. I've visible five-port, unmanaged switches selling for much less than $20, so we are not speaking about significant funding here (e.g., TRENDnet five-Port GREENnet switch).
At the same time as lots of your network components might be able to join wirelessly, there are still a few that require the conventional Ethernet connection in your hub or transfer. As an example, maximum cable and DSL modems, voice-over IP (VoIP) devices, and computer computers do now not have wireless competencies constructed into them.
Three. wi-fi router
Not like your plumbing and electrical systems, a home data community may be prolonged to locations without a physical connection. To attach your network to devices without walking cables, a wi-fi router is an excellent addition to any domestic system. In reality, a wi-fi router may additionally have a couple of Ethernet ports as nicely, combining the capability with that of an Ethernet hub or transfer.
After you plug the wireless router into an electrical socket, you have to configure it through your computer then. The configuration is a simple venture where you provide the router a call and allow password authentication.
Wi-Fi connections do have some negative aspects. A wireless signal might not penetrate all of the areas of your property, and you consequently may need to deal with vulnerable indicators in specific parts of the residence. Additionally, older wireless structures will now not have the potential to transmit significant streams of information consisting of excessive-definition tv. in the end, wi-fi networks want to be secured, which calls for some extra setup.
Wireless routers start at around $20 with Linksys being one of the satisfactory brands (Cisco-Linksys E3000 high-performance wi-fi-N Router proven beneath). While evaluating routers, the wireless signal can be shown as 802.eleven observed utilizing a letter. The higher the message, the higher the bandwidth (e.g., 802.11n is higher than 802.11b).

Kindly revert for any queries

Thanks.


Related Solutions

Describe, in detail, the procedure for generating a degree preserving network. Provide an example of a...
Describe, in detail, the procedure for generating a degree preserving network. Provide an example of a small network ( n = 5) and generate a new network that preserves the degree (this can be done by hand, in matlab, in excel, etc.). Show that you have preserved the original network’s degree distribution.
A security analyst is interested in setting up an IDS to monitor the company network. The...
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation? A. Network tap B. Honeypot C. Aggregation D. Port mirror
Consider a small sized company that is interested in setting up a network for their business....
Consider a small sized company that is interested in setting up a network for their business. The company has a total of 350 employees: 250 employees are located on five floors of the HQ building based in Chicago, and the other 100 employees are located on two floors in a building in Seattle. The two sites are connected using a WAN link. Each employee has a desktop and an IP phone on their desk. In each office (building), there are...
There are a lot of strategies for setting up network defense systems. Physical restrictions can be...
There are a lot of strategies for setting up network defense systems. Physical restrictions can be put in place, such as separating hardware, or using switches and cabling to do so. One can also use virtualized segmentation in the form of VLANs, and virtual networks (including switches). What strategy do you feel is best suited to defend against modern cybersecurity threats? State your opinion concerning which technologies you would deploy if you were positioned to protect a university campus from...
Explain in detail, the procedure to identify the anode and cathode of an unmarked diode using...
Explain in detail, the procedure to identify the anode and cathode of an unmarked diode using an ohmmeter.
Define Business and explain in detail the resources needed to start and operate a business. Explain...
Define Business and explain in detail the resources needed to start and operate a business. Explain how a fashion business functions in order to understand and satisfy consumer wants and needs.
automated DNA extraction technique/equipment explain it in detail.
automated DNA extraction technique/equipment explain it in detail.
INSTRUCTIONS: Only the answer is needed. No supporting sources required. Q4. Explain the procedure followed by...
INSTRUCTIONS: Only the answer is needed. No supporting sources required. Q4. Explain the procedure followed by a property insurance agent for claims after theft of jewelry from a house. Q5. Explain two (2) main shortcomings that property managers can expect because of Electronic Information Systems.
Network Security: Explain in detail how a hash function could be used for each of the...
Network Security: Explain in detail how a hash function could be used for each of the following applications. Indicate which property or properties of the hash function are being used (one-way property, fixed length output, collision resistance, etc...). 1. to detect unauthorized modification of software program code 2. to identify the same files with different names on a peer-to-peer sharing network
Do you have a wireless network at home? What kind of wireless equipment do you have?...
Do you have a wireless network at home? What kind of wireless equipment do you have? Is your wireless network encrypted? If so, what level of encryption and other security options are you utilizing? If not, how can you take care of protecting your network?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT