Need Assistance? 01384 442752 (UK)

COMPUTER NETWORKING FOUNDATIONS BIT103

Duration (approx) 100 hours
Qualification
Statement of Attainment

Why Study Computer Networking Foundations?

A network is a system of interconnected computers (and devices) that operate interactively.

Any number of computers may be connected into a network, from two to dozens, hundreds, thousands... or even millions.

Networks typically include other devices such as printers, external hard drives, modems and routers, etc. Nearly everyone involved with computers at any level requires knowledge and skills with networked computer systems.

This course will help you to develop IT skills to overcome problems in organisations and at home.

Who Is This Course Suitable For?

This course is suitable for different people including:

  • Computer technicians
  • IT workers
  • Business managers
  • Business owners
  • Admin staff
  • Remote workers
  • School leavers
  • People with home offices

Really, anyone who is interested in setting up and maintaining computer networks.

This course assumes that the student has no knowledge of computer networks. However, students must have access to a computer which is connected to the Internet.

What do our students think of the course?

"Yes it is very much [a valuable learning experience] because I am learning something new that is in line with the work that I do up here, it has the most up to date basic information in technology. Thanks to ACS for giving me this opportunity. 

To do the online course which otherwise will be impossible to do at the same time working, especially for me who grew up in the analogue age, this gives me great confidence with my job as a radio communication technician and really looking forward to completed this networking foundation course, thank you."
 Willem Ainui, PNG, Networking Foundations course.

What Will You Learn In This Course?

During the course, you will learn about –

  • Computer networking.
  • Topology
  • Architecture
  • Transmission media
  • Components
  • Hardware
  • Design and planning
  • Upgrading, basic TCP/IP services and applications
  • Managing computer networks.
  • Understand computer networks, how they work and what they can do.
  • Manage and plan your computer networks more efficiently.

This course is suitable for professional/career development, CPD or personal interest.

It's easy to enrol...

1
Select a learning location:
2
Select a payment plan:

3
Select a learning method

4

Lesson Structure

There are 10 lessons in this course:

  1. Networking Terms, Concepts and Standards
    • What is a network
    • History of networks
    • Network hosts and backbones
    • Access vs core networks
    • Internet backbone
    • What is a host
    • Types of computer networks
    • Local area network (LAN)
    • Wide area network (WAN)
    • Home networking and Wireless local area networks
    • Types of LANs
    • LAN topology
    • Wireless networking (Wi Fi)
    • Hardware for a basic network
    • Network cards
    • Network cable
    • Hubs and switches
    • Routers
    • Network standards
    • ISO
  2. Network Topology, Architecture and Transmission Media
    • Physical vs. local topology
    • Design considerations
    • Physical topologies: star, bus, ring, tree, mesh
    • Logical topologies
    • Architecture of a network
    • Transmission media
    • Cost of a network
    • Band width
    • Band use
    • Multiplexing
    • Attenuation
    • Electromagnetic interference
  3. Network Components and Hardware
    • Repeater
    • Switch
    • Hub
    • Bridge
    • Router
    • Server
    • Modem
    • Short haul modems
    • Firewall hardware
  4. Network Design and Planning
    • Evaluating needs of an organisation
    • Applications
    • Users
    • Network services
    • Security of the network
    • Growth planning
    • Designing a logical network
    • Communicating effectively with clients
  5. Network Upgrading and Project Management
    • Why upgrade a network
    • Is it time to upgrade
    • What are the new requirements
    • Planning an upgrade: prioritise, budget, evaluate
  6. Network Protection and Maintenance
    • Information security
    • Network attacks
    • Man in the middle attack
    • Replay attack
    • Denial of service attack
    • Distributed denial of service attack
    • Attackers
    • Internal security
    • Password security
    • File and directory permissions
    • Educating users
    • External security
    • Firewalls
    • Intrusion detection systems
    • Security zones
    • Virtual LAN's
  7. Understanding Network Connecting Options
    • Dial up connections
    • DSL connections
    • ADSL connections
    • ADSL+2 connections
    • Cable connections
    • Leased line connections
    • Satellite
  8. Installation and Configuration of Network
    • Network installation process
    • Cabling the network
    • Router configuration
    • Server configuration
    • Multiple equipment configuration
    • Testing the configuration
  9. Basic TCP/IP Services and Applications
    • TCP/IP suite
    • HTTP
    • SMTP/POP3
    • Telnet
    • FTP
    • DNS
    • NNTP
  10. Troubleshooting Tools for TCP/IP Networks
    • Troubleshooting techniques
    • Troubleshooting tools
    • Ping
    • Traceroute
    • NSlookup
    • Hostname

Each lesson culminates in an assignment which is submitted to the school, marked by the school's tutors and returned to you with any relevant suggestions, comments, and if necessary, extra reading.

Aims

  • Discuss the history and key developments in networking.
  • Describe the main networking models, terminology and standards.
  • Explain the different topologies, architectures and transmission media in computer networks.
  • Explain the physical components within a network and how individual components connect to each other.
  • Evaluate the needs of the organisation and design a logical network.
  • Discuss reasons for network upgrade and techniques for managing a network upgrade.
  • Explain the importance of network protection to prevent downtime and preserve valuable data.
  • Identify and compare various connection options like dial-up connections and dedicated connections.
  • Describe the installation process and configurations for networking.
  • Describe the TCP/IP suites of utilities generally used by end users.

During the course, you will learn more about setting up computer networks - BIG DECISIONS FIRST

Setting up any computer network, should start with careful planning, and that involves a systematic consideration of all of your options. 

Start by understanding very clearly what you want the network to do. You will need to decide early ion, what topography and architecture you want to use. You need to make decisions about the hardware you will need; and be able to find a good and reliable place to buy that hardware.

What is Topography?

Network topology refers to the configuration, or conceptual shape, of the communication network. 

Physical vs. Logical Topology

The topology describes two aspects of the network:

  • Physical – the connections of the devices in the network; and
  • Logical – the methods and protocols for transmitting (or passing) data between the devices.

The terms physical and logical are used frequently when discussing networking. When referring to the physical topology of a network, we are talking about the actual configuration (or shape) of the cabling between the network devices.

The logical topology of a network refers to the way the network works, or the way in which the data is moved through the physical network topology. The two topologies are not interdependent, i.e. a network wired physically as a star may have data moved in a logical ring topology.

Three common types are: star, bus and ring. There are, however, many more options, and deciding which should be used is determined by a mix of factors, for example:

  • the purpose of the network,
  • the needs and skills of the users,
  • the cost of implementing and maintaining the network,
  • the level of security required,
  • the expandability of the network, and
  • the availability of technical support etc.

Design Considerations

Each topology will have different hardware and cabling requirements, and this will affect the cost of both implementing and maintaining the network. A budget should be established first, and with a clear understanding of the purpose of the network, it will be possible to begin to assess the suitability of the various network options.

Also of importance is the type of cable media that should be used. This will be determined by the standards and protocols that are chosen to enable the topology you require. The length of cable required is critical, and will affect not only the cost of the network, but the performance of it as well. Consider the distances between the systems and devices; are they in the same room, on the same floor, in the same building?

Another issue is the expected duration of the network. Is it intended that the network will be permanent, and grow over time as the business or organization grows, or is it a temporary solution? The ability for a network to grow, while maintaining fast data exchange and maximum functionality for users, is a key issue when designing a new network.

Physical Topographies

Star
The computers in a star topology network are connected to a centralised hub or switch, and communications between the computers flows through the hub or switch. Different types of cables can be used in this topology, for example, coaxial, fibre optic or twisted pair cables.

Bus
The client computers in a bus network are connected by a shared line, called a bus. This conceptual architecture is also used on motherboards of computers, and in some versions of Ethernet networks.

Ring
One of the most common, though now largely superseded, ring topologies is the Token Ring architecture developed by IBM. It is architecturally similar to the star topology, except that it is wired such that data transfer between computers occurs in a ring (or circle).

Passing of data packets involves the use of token passing, which is a small piece of data that is used to determine the availability of communications to other devices in the network. The token moves around the network in a circular fashion and may be either a free or busy state. For a computer or device to send data it waits until it receives a free token, in which case it marks the token as busy and then sends its data. If a device receives data intended for it, it marks the token as free and passes it to the next device in the ring.

Tree
A tree topology consists of groups of star topology connected workstations, often by means of a linear bus. This network topology is one of the easiest to expand, by simply adding more star clusters to the backbone.

Mesh
A fully or completely connected network is a mesh topology. In this type of configuration, every workstation or device on the network is connected to all others in the network. Mesh topologies are very expensive to implement, as there are large overhead costs with an excessive need for cabling. Also, these networks are difficult to maintain and expand.

Logical Topologies

These are methods and protocols used to move data between different devices.
 
Examples of such topologies include:

  • Public Switched Telephone Network (PSTN) –This is a domestic telecommunications network used for telephones, fax, private branch exchange trunks, etc
  • Internet Protocol Suite  -This is commonly called a TCP/IP protocol suite. It’s a system that allows two or more computers to connect and transfer data between each other.

Different types of architecture….

  • Dumb Networks –these have a core network, and then intelligent peripheral devices. The core network doesn’t control the application. An example might be the internet where the core supplies information, but it isn’t controlling who accesses it –each end user is in control of their own use of the internet.
  • Intelligent computer networks –In these there is a control by the network over the peripherals (eg. Phone system)
  • Context aware networks –These are networks which combine features of an intelligent network and a dumb network.

What Are the Advantages of Studying With ACS Distance Education?

  • You can start at any time to suit you.
  • The courses are self-paced.
  • You can study when and where suits you. They are flexible to fit in around you and your lifestyle.
  • Keep up to date on your learning.
  • Update your CV.
  • It is not just a course, it is a package of learning that includes – course notes, tutor feedback, self-assessment tests, research tasks and assignments.
  • Our tutors are all experts in their field, with years of experience in their field.
  • They are also keen and enthusiastic about their subject and enjoy working with students to improve their knowledge and skills.
  • Courses are also updated regularly to meet the demands of the changing needs for knowledge and to keep our courses up to date.

What Next?

A computer network, commonly just called a network, is a system of interconnected computers (and devices) that operate interactively. Any number of computers may be connected into a network, from two to dozens, hundreds, thousands or even millions. Networks typically include other devices such as printers, external hard drives, modems and routers, etc.

If you would like more about setting up computer networks, right from the basics, then this is the course for you.

You can enrol today by clicking the “Enrol Now” button above.

Or

Click here to ask a Question

Or Request a Prospectus Here.

Courses can be started anytime from anywhere in the world!

Meet some of our academics

John MasonMr Mason has worked 45+ years in Writing, Education, Horticulture and Recreation. His experience in both public & private sectors is extensive; particularly across Australia and England.
David CrothersChartered Accountant with 20 years experience in corporate and financial roles. David has a FCA, GAICD, B.Sc.Econ (Hons), Cert IV TAA. Extensive international experience in business and finance.
Josiane JoubranCSC consultant with IBM, Software QA Engineer, Course Writer and Tutor. Josiane is an I.T professional with extensive experience with computer hardware and engineering in Lebanon and Australia. Josiane has a B.Eng., Grad.Dip.I.T., Master Info.Tech., MCP, MCSE.
Jade SciasciaBiologist, Business Coordinator, Government Environmental Dept, Secondary School teacher (Biology); Recruitment Consultant, Senior Supervisor in Youth Welfare, Horse Riding Instructor (part-completed) and Boarding Kennel Manager. Jade has a B.Sc.Biol, Dip.Professional Education, Cert IV TESOL, Cert Food Hygiene.


Check out our eBooks

Saving Your BusinessMost businesses fail; but failure is more often than not avoidable. This book shows you how to quickly get a handle on what is wrong, take action, and give a shaky business the best chance of resurgence.
Technical WritingThe Technical Writing ebook has been written for anybody who would like to become a technical writer, add technical writing to their repertoire of skills, or improve their technical writing skills. Technical Writing is not just limited to scientific or technical documents, is necessary for writing manuals, reports or promotional materials. To be a technical writer you must have a broad range of skills in order to secure employment or ongoing projects, if you are working as a freelance technical writer. To work successfully in this field you will need: - Excellent communication skills - Logic and precision - Excellent word processing skills - To be able to manage projects - To work efficiently and independently - A solid, broad education - Improving your skills and knowledge - Great networking skills
Starting a BusinessBusinesses don't need to fail! This is concise, easy to read, and alerts you to all of the things that commonly make a difference to business success or failure. Seven chapters are: “A Reality Check”, “The Product or service”, “Managing a Business”, “How to Find Customers”, “How to Make a Sale”, “Delivering the Product or Service”, “Pitfalls to Avoid”.
Using Artificial IntelligenceLearn more about the scope and nature of AI. The benefits of AI use and the controversy.