D Chs LM Module3 q1 q2 Dec
D Chs LM Module3 q1 q2 Dec
D Chs LM Module3 q1 q2 Dec
Content Standard
Performance Standard
36
There are three learning objectives (LO) in this module: (1) plan and
prepare for configuration; (2) configure computer systems and networks; and
(3) inspect and test configured computer systems and networks. These three
learning objectives (LO) contain sub-topics that discuss the details on
configuring computer systems and networks. This module has four essential
parts, namely: what to KNOW, what to PROCESS, what to REFLECT and
UNDERSTAND and finally, what to TRANSFER.
The competencies for this module are the following:
LO 1. Plan and Prepare for Configuration of Computer Systems and
Networks
Follow Occupational Health and Safety (OHS) procedures in planning
and preparing for configuration of computer systems and networks;
Prepare computer systems tools, devices, equipment and materials;
Check computer systems and networks configuration against specified
requirements; and
Identify the procedures in using the tools and equipment.
LO 2. Configure Computer Systems and Networks
Follow OHS procedures in configuring computer systems and
networks;
Inspect networking devices, media and connectors;
Create cross-over and straight-through cables;
Assign IP address to clients and servers;
Configure the assigned IP address to clients and servers;
Enable network security to the computer systems; and
Configure file and printer sharing.
LO 3. Inspect and Test Configured Computer Systems and Networks
Follow OHS procedures in testing systems and networks;
Test computer systems and networks in accordance with the job
requirements; and
Accomplish technical reports on the tests conducted.
37
Pre Assessment
Before you proceed to the core of this module, challenge yourself first
and dig deep into your mind in order to answer the pre assessment exercises
prepared for you. Take time to answer it!
A. Paper and Pencil Test
General Directions: Read the items very carefully. Write your answer in a
clean sheet of paper.
Test I. True or False
Directions: Write TRUE if the statement is correct and FALSE if otherwise.
_______1. A safe workplace is clean, organized and well-lit.
_______2. One must unplug the power from the source before opening a
case and performing services.
_______3. It is a best practice that a fire extinguisher and first aid kit be
available in the workplace.
_______4. You are allowed to open the power supply or a monitor.
_______5. You can bring food and drinks inside the laboratory.
_______6.The key to a well-tuned computer system is the proper
configuration.
_______7. Boot log stores all information from the boot process.
_______8. Registry is a collection of database of configuration of database of
configuration in Windows Operating System.
_______9. The shortcut of Microsoft Configuration is Ipconfig.
_______10. Configuration is the way a system is set up.
38
a. Default gateway
c. IP address
b. DNS Server
d. Subnet mask
12. In which of the following IP address classes does 192.168.1.105
belong to?
a. Class A
c. Class C
e. Class E
b. Class B
d. Class D
13. What command is used to test the ability of the source computer to
reach a specified destination computer?
a. Ipconfig
c. Ping
b. Msconfig
d. Regedit
14. What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data?
a. Client server
c. Peer to client
b. Peer to peer
d. None of the options
15. Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0
c. 255.255.255.0
b. 255.255.0.0
d. 255.255.255.255
40
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
l.
Crimping tool
Cross-over
Fiber-optic
Ipconfig
Multi-mode
Ping
Protocol
RJ45
Single-mode
Straight-through
Subnet mask
Twisted pair
Competencies
I can do it
confidently
3
I can do it
confidently
but with
assistance
2
I am not
confident
1
configure IP address.
6. I can execute the
IPconfig command
properly.
7. I can manage to create a
peer-to-peer networking.
8. I can configure Network
Interface Card using
DHCP.
9. I can enable a firewall.
10. I can configure file and
printer sharing.
TOTAL
GRAND TOTAL
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the table below to
determine your initial competency on configuration of computer systems and
networks.
Numerical and Verbal interpretation
Numerical Value
2.51 3.00
1.76- 2.50
1.00 1.75
Verbal Interpretation
Confident
Confident but needs assistance
Not yet Confident
Dont feel bad if you got a not yet confident in all of the
competencies. Bear in mind that this is just a pre assessment of
the knowledge and skills on the lessons to be presented. Also, it
will guide and inspire you to study harder as you go along with the
lessons.
42
Safety Procedures
It is essential to maintain safe working conditions to prevent accidents
and injury to any person or damage to any object in a work area. New staff
and visitors must be informed of the appropriate safety procedures. Any
transgression of the procedures must be reported.
As an aspiring computer technician, you should be aware of all
possible dangers in the workplace. It is a must to follow proper procedures for
handling computer equipment. Failure to follow the prescribed safety
procedures could result in fines, criminal convictions, and damage to
equipment, claims for damage from the owner of the property and data, injury,
or death.
43
44
Peer-to-Peer Activity
General Directions: Get a partner to perform the next activity. Identify
whether each statement is true or false. Gather picture evidences that make it
true or false. On the third column, show the effects of not following the safety
precautions through a picture presentation.
Example:
Turn off the power and unplug equipment before opening the case and
performing service.
Answer
Picture Presentation
Evidence
Effect
True
TRUE OR
FALSE
EVIDENCE
1. A safe workplace is
clean, organized
and well-lit.
2. Before opening the
case and performing
services, one must
unplug the power
from the source.
3. It is a best practice
that a fire
extinguisher and first
aid kit be available
in the workplace.
4. You are allowed to
open the power
supply or a monitor.
5. You can eat inside
the laboratory.
45
Effect
Quality of Video
(30%)
Clarity and
cohesiveness of
the video
Organization and
coherence of
ideas
Interview on
practitioner (20%)
Congruency of
questions to the
topic
Clarity of
questions
Poor (70-75)
Good (76-85)
It lacks clarity
and/or does not
present ideas in
a coherent way.
Questions were
not congruent
with the topic
and were not
delivered
clearly.
Most of the
questions were
congruent with
the topic and
delivered
clearly.
All of the
questions were
congruent with
the topic and
delivered
clearly.
46
Excellent
4
Good
3
Content (40%)
-Conveys full
understanding of
the content
Enthusiasm (10%)
-Facial expression
and body language
generates strong
enthusiasm
Interest and
Purpose (10%)
-Displays
interesting purpose
Speak Clearly
(10%)
-Group members
speaks clearly at all
times
Volume (10%)
-Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
47
Fair
2
Weak
1
To assist in this, several software tools have been created. These are
typically called diagnostic utilities or programs. Some of them are built-in to
your operating system and others are available either for free download or
commercial purchase.
Some of the built-in tools used in Microsoft system configuration
involves Microsoft System Configuration, Register Edit, Direct X and Control
Panel Applets.
1. Microsoft System Configuration: This boot configuration utility allows you
to set the programs that will run at startup and to edit configuration files. It
also offers simplified control over Windows Services.
System Configuration Utility consists of five functional tabs such as
General, Boot, Services, StartUp and Tools. The succeeding table
describes the use and functionality of each tab:
General
Boot
Services
Startup
52
54
6.
7.
8.
9.
No GUI Boot
OS Boot information
Hide All Microsoft Services
Convenient List of
Diagnostic Tools
10. Base Video
56
57
Poor (70-74)
Followed
poorly the
requirements
Presentation of the related to
text
format and
Structuring of text
layout.
Requirements of
length, font and
style followed
Content/Information The research
(50%)
was not
objective and
All elements of the poorly
topics are
addresses
addressed
the issues
The information is
referred in
technically sound
the proposed
Information based
topic.
on careful
research
The provided
Coherence of
information
information
was not
necessary or
not sufficient
to discuss
these issues.
Good (75-79)
Some format
and layout
related
requirements
were met.
The research
was objective
and for some
part
addresses an
in-depth
analysis
The provided
information
was, for some
part,
necessary
and sufficient
to discuss
these issues.
58
Very Good
(80-89)
Most format
and layout
related
requirements
were met.
Excellent
(90-100)
All the
requirements
related to
format and
layout were
strictly
followed.
The research
was objective
and for the
most part
addresses an
in-depth
analysis of
most issues
referred in
the proposed
topic.
The provided
information
was, for the
most part,
necessary
and sufficient
The research
was objective
and
addresses
with an indepth
analysis all
the issues
referred in
the proposed
topic.
The provided
information
was
necessary
and sufficient
to discuss
Quality of Writing
(25%)
Clarity and
cohesiveness of
sentences and
paragraphs
No errors in
spelling, grammar
and use of English
Organization and
coherence of
ideas
References (10%)
Soundness of
references
The essay
was not well
written, and
contains
many spelling
errors, and/or
grammar
errors and/or
use of
English
errors.
It lacks clarity
and/or does
not present
ideas in a
coherent
way.
References
were not
appropriately
used and
cited.
The essay
was well
written for
some part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for some part
well
organized,
clear and
presents
ideas in a
coherent
way.
Some of the
references
were
appropriately
used and
cited.
59
to discuss
these issues.
these issues.
The essay
was well
written for the
most part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for the most
part well
organized,
clear and
presents
ideas in a
coherent
way.
Most of the
references
were
appropriately
used and
cited.
The essay
was well
written from
start to finish,
without
spelling,
grammar or
use of
English
errors.
The essay
was well
organized,
clear and
presents
ideas in a
coherent
way.
All of the
references
were
appropriately
used and
cited.
Oral Presentation
Directions: After the thorough research and exploration, you have to present
your work individually in an oral presentation. Your performance will be rated
based on the rubrics provided in this section.
CRITERIA
B
(70- 74)
D
(75-79)
AP
(80-84)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information in
a logical manner
4. Used complete sentence
5. Offered a concluding
statement
6. Spoke clearly, correctly,
distinctly, and confidently
7. Maintained eye contact
8. Maintained good and
proper posture
9. Utilized audio-visual
materials
10. Answered questions
sufficiently and received
comments openly
Total
Grand Total
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
60
P
(85-89)
A
(90-100)
61
62
Lastly, you can delete a key or value by clicking on it, and pressing
Delete on the keyboard, or by right-clicking on it, and choosing Delete.
Caution: Using regedt32.exe or regedit.exe incorrectly might cause
configuration problems that may require you to reinstall the operating
system.
63
64
65
66
67
68
69
Step 5
Click Next.
The Backup Type, Destination, and Name window appears.
70
If you are asked to insert a disk into the floppy disk drive, click
Cancel.
The Save As dialog box appears.
71
72
Step 12
Click Replace the existing backups, and then click Next.
The When to Back Up window appears.
73
74
75
Step 16
Click Start >Run.
Type regedit in the open field. The Registry Editor window
appears.
Step 17
Step 18
Click the Restore files and settings radio button and then click
Next.
The What to Restore window appears.
77
78
79
Step 24
Click Next.
The Advanced Restore Options window appears
Be sure that all three check boxes are selected, and then click
Next.
Click Finish.
The system recovery begins by copying the files back to the
computer.
When prompted to restart the computer, click Yes. The computer
will restart.
Step 25
Finish
Performance Rubrics for
Windows Registry Backup and Recovery
CRITERIA
Excellent
4
Good
3
Safety Procedures
(15%)
-Applied / manifested
safety precautions while
working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Utilized organized
materials and tools
while accomplishing the
task and exhibited time
management
Quality of work (40%)
-the windows registry
was fully backed up
81
Fair
2
Poor
1
83
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain
hazards:
Dangerous chemicals
Tools with sharp edges
Light which you cannot see that can burn your eyes
Glass shards produced by cutting fiber-optic cable that can cause
bodily harm
Specific types of tools and chemicals are used when working with
fiber-optic cable. These materials must be handled with care.
Chemicals
The solvents and glues used with fiber optics are dangerous. You
should handle them with extreme care. Read the instructions on the label,
and follow them carefully. Also, read the material safety data sheet (MSDS)
that accompanies the chemicals to know how to treat someone in case of
emergency.
Tools
When working with any tool, safety should always be your first priority.
Any compromise in safety could result in serious injury or even death. The
tools used for working with fiber optics have sharp cutting surfaces that are
used to scribe glass. Other tools pinch cables with high pressure to fasten
connectors to them. These tools can produce shards of glass that can splinter
and fly into the air. You must avoid getting them on your skin and in your
mouth or eyes.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass or plastic that can penetrate your eyes or
skin and cause severe irritation. The fibers can be extremely difficult to see on
your skin because they are clear and small. When you work with fiber-optic
cabling, the working surface should be a dark mat so that you can see the tiny
glass or plastic fragments. The mat should also be resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiberoptic fragments with your fingers. Use tape to pick up small fragments, and
dispose them off properly. Use a disposable container, such as a plastic
bottle with a screw-on lid, to store fiber fragments. Close the lid tightly before
disposing the container.
84
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic
strands. The light is a color that humans cannot see. It can damage your eyes
before you can feel it. When you use a magnifier to inspect fiber-optic cable
and connectors, the light emitted from the fiber could be directed into your
eyes. When working with fiber, be sure to disconnect the light source. Use
special detectors to help you tell if a fiber is energized.
Caution:
Obtain proper training before you attempt to cut, strip, or splice
fiber-optic cable. An experienced technician should supervise you until
you become adequately skilled.
85
Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a circuit
that transmits data. The pair is twisted to provide protection against crosstalk,
the noise generated by adjacent pairs of wires in the cable. Pairs of copper
wires are encased in color-coded plastic insulation and are twisted together.
An outer jacket protects the bundles of twisted pairs.
Source: www.lanshack.com
Figure 39. UTP and STP Cable
When electricity flows through a copper wire, a magnetic field is
created around the wire. A circuit has two wires, and in a circuit, the two wires
have oppositely-charged magnetic fields. When the two wires of the circuit
are next to each other, the magnetic fields cancel each other out. This is
called the cancellation effect. Without the cancellation effect, your network
communications become slow because of the interference caused by the
magnetic fields.
The two basic types of twisted-pair cables are as follows:
Unshielded twisted pair (UTP) is the cable that has two or four pairs
of wires. This type of cable relies solely on the cancellation effect
produced by the twisted-wire pairs that limits signal degradation
caused by electromagnetic interface (EMI) and radio frequency
interference (RFI). UTP is the most commonly used cabling in
networks. UTP cables have a range of 328 feet (100 m).
With shielded twisted pair (STP), each pair of wire is wrapped in
metallic foil to better shield the wires from noise. Four pairs of wires
are then wrapped in an overall metallic braid or foil. STP reduces
electrical noise from within the cable. It also reduces EMI and RFI from
86
Source: www.phoneam.com
Figure 40. Coaxial Cable
87
Coaxial cable uses British Naval Connectors (BNC) or Bayonet NeillConcelman connectors, at the ends of the cables to make the connection.
Several types of coaxial cable exist:
Thicknet (10BASE5) is a coaxial cable used in networks operating at
10 Mbps, with a maximum length of 500 meters.
Thinnet (10BASE2) is a coaxial cable used in networks operating at
10 Mbps, with a maximum length of 185 meters.
RG-59 is most commonly used for cable television in the U.S.
RG-6 is higher-quality cable than RG-59, with more bandwidth and
less susceptibility to interference.
Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits
information using light. Fiber optic cable has one or more optical fibers
enclosed in a sheath or jacket. Because it is made of glass, fiber-optic cable
is not affected by EMI or RFI. All signals are converted to light pulses to enter
the cable and are converted back into electrical signals when they leave it.
This means that fiber-optic cable can deliver signals that are clearer, and can
go farther, without compromising the clarity of signals.
Source: www.picstopin.com
Figure 41. Fiber Optic Cable
Fiber-optic cable can reach distances of several miles or kilometers
before the signal needs to be regenerated. Fiber-optic cable usually is more
expensive to use than copper cable, and the connectors are more costly and
harder to assemble. Common connectors for fiber-optic networks are SC, ST,
and LC. These three types of fiber-optic connectors are half-duplex, which
allows data to flow in only one direction. Therefore, two cables are needed.
88
Cross-Over
Straight-Through
3. Pinch the wires between your fingers and straighten them out as
shown. The color order is important to do this correctly.
7. Crimping the Cable carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing
tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end
is ready to use.
92
Criss-Cross Puzzle
Directions: Complete the criss-cross puzzle and familiarize yourself of the
cables being described. Write your answer in a clean sheet of paper.
CABLES
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
93
Now that you are equipped with the knowledge on the different cables
used in networking, you also need to know that fiber technologies and
connectors have changed through the years. In these videos, you will learn
about the different fiber connectors, copper connectors and their
characteristics. To watch the video presentations just type in the following
URL:
1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
94
95
96
8. For a standard straight-through cable, repeat all steps and wire color
order on the other end of cable. For a cross-over cable, the other end
will have a different color order as shown in the cross-over picture on
page 89.
9. Make sure to test the cables before installing them. An inexpensive
Ethernet cable tester does this quite well.
Performance Rubrics for
Creating a Cross-Over and Straight-Through Ethernet Cables
CRITERIA
Excellent
4
Good
3
Safety Procedures
(15%)
-Applied / manifested
safety precautions while
working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Organized materials
and tools while
accomplishing the task
and has time
management
Quality of Product
(40%)
-Produced a fully
functional Ethernet
Cable
97
Fair
2
Poor
1
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also
uses protocols. Part of the protocol specifies where on the envelope the
delivery address needs to be written. If the delivery address is written in the
wrong place, the letter cannot be delivered. Internet protocol works in a
similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications define
the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to
arrive within a certain amount of time so that computers do not wait
indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also initiate
alternative actions if the network does not meet the timing rules. Many
protocols consist of a suite of other protocols that are stacked in layers.
These layers depend on the operation of the other layers in the suite to
function properly.
The main functions of protocols are:
Identifying errors
Compressing the data
Deciding how the data should be sent
Addressing the data
Deciding how to announce sent and received data
(MAC) address is assigned to the host Network Interface Card (NIC) and is
known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that
fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called octets. An IP address, even in this
grouped format, is hard for humans to read, write, and remember. Therefore,
each octet is presented as its decimal value, separated by a decimal point or
period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.
Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If you mistyped just 1 bit, the
address would be different, and the host may not be able to communicate
on the network. The logical 32-bit IP address is hierarchical and is
composed of two parts. The first part identifies the network, and the
second part identifies a host on that network. Both parts are required in an
IP address. For example, if a host has an IP address of 192.168.18.57,
the first three octets, 192.168.18, identify the network portion of the
address, and the last octet, 57, identifies the host. This is called
hierarchical addressing, because the network portion indicates the
network on which each unique host address is located. Routers only need
to know how to reach each network, not the location of each individual
host.
Table 6. Five Classes of IP Address
IP Classes
Class A
Class B
Class C
Class D
Class E
Purpose
Used for large networks, implemented by large companies and
some countries
Used for medium-sized networks, implemented by universities
Used for small networks, implemented by ISPs for customer
subscriptions
Used for special use for multicasting
Used for experimental testing
101
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are mapped to the first three classes of IP
addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address
is the network portion
255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
255.255.255.0: Class C, which indicates that the first three octets of
the IP address are the network portion
Table 7. Default Subnet Masks for Usable IP Addresses
Class A
Octet
Network
1
Class B
Octet
Network
1
Class C
Octet
Network
1
Host
2
Host
3
Host
4
102
104
9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
10. Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) servers IP address is
something that your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.
Assigning a Dynamic IP Address
If more than a few computers comprise the LAN, manually configuring
IP addresses for every host on the network can be time-consuming and prone
to errors. In this case, using a Dynamic Host Configuration Protocol (DHCP)
server would automatically assign IP addresses and greatly simplify the
addressing process.
Ping
The ping is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The ping
command is usually used as a simple way to verify that a computer can
communicate over the network with another computer or network device.
The ping command operates by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination computer and
waiting for a response. How many of those responses are returned, and how
long it takes for them to return, are the two major pieces of information that
the ping command provides.
Syntax
-t
-a -
-n count
-l size
-f
-i TTL
-v TOS
-r count
-s count
108
resolve,
if
possible,
-w timeout
-R
-S srcaddr
-4
-6
target
/?
109
I. Protocols
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on your notebook.
Be prepared to discuss your answers in front of the class.
Protocol Definition
Protocol
111
Default
Port(s)
Subnet Mask
255.0.0.0
IP Address Class
A
2. http://www.professormesser.com/n10-005/ip-classes/
112
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/
113
B
D
AP
P
(70-74) (75-79) (80-84) (85-89)
A
(90-100)
Proper
Configuration (30
%)
(The configured
hardware was
properly configured
according to job
specification.)
Adherence to the
Procedures (30%)
(The specified job
was done by
following the
procedures. Safety
measures were
observed during the
activity.)
Quality of Work
(30%)
(The device was
configured properly.)
Comprehension
(10%)
(Interview / Guide
questions were
answered correctly
according to the job
requirements.)
Grand Total
114
Total
(=score x %)
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
Linksys 300N router
A computer running Window XP Professional
Ethernet patch cable
Procedures:
Step 1
Plug one end of the Ethernet patch cable into Port 1 at the back of
the router.
Plug the other end of the Ethernet patch cable into the network port on
the NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click Start.
Right-click My Network Places, and then choose Properties.
The Network Connections window appears.
115
Step 2
Right-click Local Area Connection, and then choose Properties.
The Local Area Connection Properties window appears.
116
117
118
119
Task 2
Configure Wireless Router
Directions: Configure and
LinksysWRT300N.
test
the
wireless
settings
on
the
Recommended Equipment
A computer with Windows XP Professional / Windows 7
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router
with an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as
an administrator.
Step 2
Choose start > Run, and type cmd. Press the Return key.
Type ipconfig.
What is the default gateway for the computer?
Step 3
Open your browser. Type 192.168.1.1 in the Address field, and then
press Return.
120
Step 4
Unplug the Ethernet patch cable from the rear of the computer.
Choose Start, and then right-click My Network Places. Choose
Properties.
Double-click the wireless adapter, and then select View Wireless
Networks.
Choose CHS, and then click the Connect button.
Open Internet Explorer, and then connect to the wireless router.
Log in to the wireless router.
Close Internet Explorer.
122
Peer-to-Peer Network
In a peer-to-peer network, devices are connected directly to each
other without any additional networking devices between them, as shown in
Figure 68. In this type of network, each device has equivalent capabilities and
responsibilities. Individual users are responsible for their own resources and
can decide which data and devices to share. Because of that, the network
has no central point of control or administration.
124
126
127
Note: The Domain Name System (DNS) is optional. If you have a DNS
system and your connected to ISP you can input an IP address which
came from the DNS server.
Click Start, right-click My Computer, and then select Properties.
7. Click the Computer Name tab and click the Change button.
8. Enter a name that describes the PC in the Computer Description field.
For example, KIDSPC1, MOMSPC2, or WORKPC3.
9. Enter the workgroup name for your network. Use the same workgroup
name for all PCs on the network. Spelling is important in this step.
10. Repeat these steps for each PC on the network.
11. Wait two minutes after Windows opens on all PCs, and then double-click
the Network Neighborhood icon on the desktop. If all went well, you
should see all the PC names on the network when files and folders are
being shared. If you do not see them, press F5 to refresh the screen.
12. If after refreshing the network window, the other PCs still do not appear,
check the firewall settings that may be interfering with the
communication.
128
129
132
12. Now open My network place ==> Click to change then Select Turn on
network discovery and file sharing.
134
Client-Server Network
In a client/server network, the server provides the requested
information or service to the client. Servers on a client/server network
commonly perform some of the processing work for client machines, such as
sorting through a database before delivering only the records requested by
the client.
the network resources. All the data on the network is stored on a centralized
file server. Shared printers on the network are managed by a centralized print
server. Network users with the proper permissions can access both the data
and shared printers. Each user must provide an authorized username and
password to gain access to network resources that he or she is permitted to
use. For data protection, an administrator performs a routine backup of all the
files on the servers. If a computer crashes, or data is lost, the administrator
can easily recover the data from a recent backup.
Comparison
Directions: Using the table below, cite the features of peer-to-peer and client
/server network.
Peer-to-peer Network
Client/Server Network
1.
2.
3.
4.
5.
Peer-to-peer study
Directions: Have a partner. Using different references available such as
articles, books, internet and publications, investigate and search for the
advantages and disadvantages of peer-to-peer network. You will present your
output in front of the class and you will be rated according to the rubrics for
research and rubrics for oral presentation.
136
Poor (0-74)
Followed
poorly the
requirements
Presentation of the related to
text
format and
Structuring of text
layout.
Requirements of
length, font and
style followed
Content/Information The research
(50%)
was not
objective and
All elements of the poorly
topics are
addresses
addressed
the issues
The information is
referred in
technically sound
the proposed
Information based
topic.
on careful
research
The provided
Coherence of
information
information
was not
necessary or
not sufficient
to discuss
these issues.
Good (75-79)
Some format
and layout
related
requirements
were met.
The research
was objective
and for some
part
addresses an
in depth
analysis
The provided
information
was, for some
part,
necessary
and sufficient
to discuss
these issues.
137
Very Good
(80-89)
Most format
and layout
related
requirements
were met.
Excellent
(90-100)
All the
requirements
related to
format and
layout were
strictly
followed.
The research
was objective
and for the
most part
addresses an
in-depth
analysis of
most issues
referred in
the proposed
topic.
The provided
information
was, for the
most part,
necessary
and sufficient
to discuss
these issues.
The research
was objective
and
addresses
with an indepth
analysis all
the issues
referred in
the proposed
topic.
The provided
information
was
necessary
and sufficient
to discuss
these issues.
Quality of Writing
(25%)
Clarity and
cohesiveness of
sentences and
paragraphs
No errors in
spelling, grammar
and use of English
Organization and
coherence of
ideas
References (10%)
Soundness of
references
The essay
was not well
written, and
contains
many spelling
errors, and/or
grammar
errors and/or
use of
English
errors.
It lacks clarity
and/or does
not present
ideas in a
coherent
way.
References
were not
appropriately
used and
cited.
The essay
was well
written for
some part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for some part
well
organized,
clear and
presents
ideas in a
coherent
way.
Some of the
references
were
appropriately
used and
cited.
138
The essay
was well
written for the
most part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for the most
part well
organized,
clear and
presents
ideas in a
coherent
way.
Most of the
references
were
appropriately
used and
cited.
The essay
was well
written from
start to finish,
without
spelling,
grammar or
use of
English
errors.
The essay
was well
organized,
clear and
presents
ideas in a
coherent
way.
All of the
references
were
appropriately
used and
cited.
CRITERIA
B
(70- 74)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information in
logical manner
4. Used complete sentence
5. Offered a concluding
summary
6. Spoke clearly, correctly,
distinctly, and confidently
7. Maintained eye contact
8. Maintained acceptable
posture.
9. Utilized audio-visual aids
10. Handled questions and
comments confidently
Total
Grand Total
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
139
D
(75-79)
AP
(80-84)
P
(85-89)
A
(90-100)
Hands-on Activity
Directions: Follow and perform the prescribed procedures in setting up a
peer-to-peer and client/server network for Windows XP and Windows 7. You
will be rated base on the performance indicators below:
Performance Indicators for Setting- up a peer-to-peer and client/server
network
Indicators
Poor
(70- 74)
Fair
(75-79)
Good
(80-84)
Very
Good
(85-89)
Excellent
(90-100)
Safety
Procedures
(15%)
-Applied /
manifested safety
precautions while
working
Adherence to the
Procedures
(30%)
-Followed the
procedures
systematically
Workmanship
(15%)
-Organized
materials and
tools while
accomplishing the
task and has time
management
Quality of
Service (40%)
-Had set-up a fully
functional peer-topeer and
client/server
network.
Grand Total
140
Total
(score
x
%)
Network Security
As a future Computer Technician you need to understand computer
and network security. Failure to implement proper security procedures can
affect users, computers, and the general public. Private information, company
secrets, financial data, computer equipment, and items about national
security are placed at risk if proper security procedures are not followed.
The Importance of Security in Computer System and Networks
Computer and network security help keep data and equipment safe by
giving only the appropriate people access. Everyone in an organization
should give high priority to security, because everyone can be affected by a
lapse in security.
Theft, loss, network intrusion, and physical damage are some of the
ways a network or computer can be harmed. Damage or loss of equipment
can mean a loss of productivity. Repairing and replacing equipment can cost
the company time and money. Unauthorized use of a network can expose
confidential information and reduce network resources.
An attack that intentionally degrades the performance of a computer or
network can also harm an organizations production. Poorly implemented
security measures that allow unauthorized access to wireless network
devices demonstrate that physical connectivity is not necessary for security
breaches by intruders.
A technicians primary responsibilities include data and network
security. A customer or an organization may depend on you to ensure that
their data and computer equipment are secure. You will perform tasks that
are more sensitive than those assigned to the average employee. You may
have to repair, adjust, and install equipment. You need to know how to
configure settings to keep the network secure, but still keep it available to
those who need to access it. You will ensure that software patches and
updates are applied, antivirus software is installed, and antispyware software
is used. You may also be asked to instruct users on how to maintain good
security practices with computer equipment.
141
Security Attacks
To successfully protect computers and the network, a technician must
understand both of the following types of threats to computer security:
Physical: Events or attacks that steal, damage, or destroy such
equipment as servers, switches, and wiring.
Data: Events or attacks that remove, corrupt, deny access to, allow
access to, or steal information.
Threats to security can come from inside or outside an organization,
and the level of potential damage can vary greatly. Potential threats include
the following:
Internal: Employees who have access to data, equipment, and the
network. Internal attacks can be characterized as follows:
Malicious threats are when an employee intends to cause
damage.
Accidental threats are when the user damages data or equipment
unintentionally.
External: Users outside an organization who do not have authorized
access to the network or resources. External attacks can be
characterized as follows:
Unstructured attacks, which use available resources, such as
passwords or scripts, to gain access to and run programs designed
to vandalize.
Structured attacks, which use code to access operating systems
and software.
Physical loss or damage to equipment can be expensive, and data loss
can be detrimental to your business and reputation. Threats against data are
constantly changing as attackers find new ways to gain entry and commit
their crimes.
Viruses, Worms, and Trojan Horses
Computer viruses are created with malicious intent and sent by
attackers. A virus is attached to small pieces of computer code, software, or
document. The virus executes when the software is run on a computer. If the
virus spreads to other computers, those computers could continue to spread
the virus.
A virus is transferred to another computer through e-mail, file transfers,
and instant messaging. The virus hides by attaching itself to a file on the
computer. When the file is accessed, the virus executes and infects the
computer. A virus has the potential to corrupt or even delete files on your
142
computer, use your e-mail to spread itself to other computers, or even erase
your hard drive. Some viruses can be
exceptionally dangerous. The most damaging
type of virus is used to record keystrokes.
Attackers can use these viruses to harvest
sensitive information, such as passwords and
credit card numbers. Viruses may even alter or
destroy information on a computer. Stealth
viruses can infect a computer and lay dormant
until summoned by the attacker.
A worm is a self-replicating program that is harmful to networks. A
worm uses the network to duplicate its code to the hosts on a network, often
without any user intervention. It is different from a virus because a worm does
not need to attach to a program to infect a host. Even if the worm does not
damage data or applications on the hosts it infects, it harms networks
because it consumes bandwidth.
A Trojan horse technically is a worm. It does not need to be attached
to other software. Instead, a Trojan threat is hidden in software that appears
to do one thing, and yet behind the scenes it does another. Trojans often are
disguised as useful software. The Trojan program can reproduce or replicate
like a virus and spread to other computers. Computer data damage and
production loss could be significant. A technician may be needed to perform
the repairs, and employees may lose or have to replace data. An infected
computer could be sending critical data to competitors while at the same time
infecting other computers on the network.
Security Procedures
You should use a security plan to determine what will be done in a
critical situation. Security plan policies should be constantly updated to reflect
the latest threats to a network.
A security plan with clear security procedures is the basis for a
technician to follow. Security plans should be reviewed each year. Part of the
process of ensuring security is conducting tests to determine areas where
security is weak. Testing should be done on a regular basis. New threats are
released daily.
Regular testing provides details of any possible weaknesses in the
current security plan that should be addressed. A network has multiple layers
of security, including physical, wireless, and data. Each layer is subject to
143
Source: www.computerflu.com
Figure 87. Most Commonly Known Anti Virus Software
Virus protection software, known as antivirus software, is software
designed to detect, disable, and remove viruses, worms, and Trojans before
they infect a computer. Antivirus software becomes outdated quickly,
however. The technician is responsible for applying the most recent updates,
patches, and virus definitions as part of a regular maintenance schedule.
Many organizations establish a written security policy stating that
employees are not permitted to install any software that is not provided by the
company. Organizations also make employees aware of the dangers of
opening e-mail attachments that may contain a virus or worm.
Data Encryption
Encrypting data involves using codes and ciphers. Data encryption
can help prevent attackers from monitoring or recording traffic between
resources and computers. It may not be possible to decipher captured data in
144
time to make any use of it. A security alert may inform you that you are using
an encrypted connection.
A virtual private network (VPN) is an encryption system that protects
data as though it resides on a private network. The data actually travels over
the Internet or another unsecured public network.
Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of
protecting a computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured.
Data being transported on a network is called traffic.
How to Enable Firewall for Windows XP?
The proceeding section provides the procedures for enabling windows
XP firewall:
1. Click Start Button then choose Control Panel.
Double click the icon labeled "Local Area Connection". The icon may
have a number after it, for example "Local Area Connection 5". Click on
Properties button.
Properties Button
Figure 91. Local Area Network Connection Properties Window
5.
146
2.
3.
Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
148
3.
4.
5.
6.
7.
8.
Short Quiz
Test I. Modified true or false
Directions: Write SECURITY if the underlined word on the subsequent
statement makes it true and VIRUS if it is makes the statement a false one
then write the correct term/word to correct it. (2 points each). Write your
answer in a separate sheet of paper.
1. Computer and network security help keep data and equipment safe.
2. A technicians secondary responsibilities include data and network
security.
3. Threats to security can come from inside and outside the organization.
4. Computer viruses are created and sent by attackers who have malicious
intent.
5. A virus is transferred to another computer through e-mail, file transfer and
instant messaging.
Test II. Matching Type
Directions: Match column A with column B in order to identify the term / word
being described.
A
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer
code,
software
and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
150
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
B
Accidental threats
Antivirus software
Data encryption
Firewall
Malicious threats
Traffic
Trojan horse
Virus
VPN
WPA
k. WEP
l. Worm
Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local
store to gather information about hardware and software firewalls.
1. Using the Internet, research two different hardware firewalls. Based on
your research, complete the table below.
Company/Hardware Website Cost Subscription Length
Name
URL
(Month/Year/Lifetime)
Hardware
Features
2. Which hardware firewall would you purchase? List reasons for your
choice.
3. Using the Internet, research two different software firewalls. Based on
your research, complete the table below.
Company/Software Website Cost Subscription Length
Name
URL
(Month/Year/Lifetime)
151
Software
Features
4. Which software firewall would you purchase? List reasons for your
choice.
152
Step 2
Step 3
From the Windows Firewall control menu select the Exceptions tab.
Programs and services that Windows Firewall is not blocking will be
listed with a checkmark.
153
Step 4
From the Windows Firewall control menu select the Advanced tab to
view the Network Connection Settings.
Network Connection
Settings displays the different connections configured for your
computer.
154
Step 5
There are many applications that users do not normally see that also
need to get through the Windows Firewall to access your computer.
These are the network level commands that direct traffic on the
network and the Internet.
Under the ICMP heading, click the Settings button. You will see the
menu where ICMP exceptions are configured.
155
156
7. Youre now at the main network screen, where you should see whats
called a workgroup. A workgroup is a basic group of computers connected
to the same Ethernet network. Double-click the workgroup to see all the
computers connected to your Ethernet network.
159
160
Essay Writing
Directions: Give an explanation on how you understand the subject. Provide
at least 5 sentence response per item.
1. Cite the importance of file sharing and give an example scenario where its
worth was proven.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. Cite the advantages and disadvantages of printer sharing.
Advantages
Disadvantages
Example Situation
Example Situation
161
163
Step 7
Return to the computer that is not directly connected to a printer.
Open the Control Panel. Choose Printers and Other Hardware >
Printers and Faxes.
Choose File > Add Printer on the screen below.
164
165
166
Click Finish.
168
Click OK in the confirmation dialog box, and then click OK to close the
printer properties window.
Step 9
To test the functionality of file and printer sharing, you must be able to
print a document or try the sample print feature of a printer.
Excellent
4
Good
3
Safety Procedures
(15%)
-Applied/Observed
safety precautions while
working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Had organized
materials and tools
while accomplishing the
task and has time
management
Functionality (40%)
-Had set up a functional
file and printer sharing
system and was able to
come up with a printed
hard copy through it
169
Fair
2
Poor
1
170
Safety Precautions
Occupational Health and Safety (OHS) Policy An Information and
Communication technology (ICT) student should know how to behave when
working in the computer laboratory, and to accomplish task safely. Safety
practices should be learned early and always adheres in working with any
electrical and electronic device, including personal computers and its
peripherals. This is for your protection as well as to the people working with
you, and for the devices that you are using.
Occupational safety and health (OSH) is a planned system of
working to prevent illness and injury where you work by recognizing and
identifying hazards and risks. Health and safety procedure is the responsibility
of all persons in the computer and technology industries. You must identify
the hazards where you are working and decide how dangerous they are.
Eliminate the hazard or modify the risk that it presents.
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their
organization to report and act upon any potential workplace hazard. Students
need to be aware of the type of hazards that are possibly present in their work
environment.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other
people from harm.
4. If the hazard can be easily and safely cleared, then do so.
If not
5. Report the hazard to the appropriate person (such as teacher in
charge, principal etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to assist
in identifying improved practice to reduce further incidence of hazards.
171
Name:
Type of Injury
Yr/Sec:
Cause of Injury
172
Remedy
Hazardous substances
If the workplace hazard appears to be dangerous to staff and clients
and professional assistance is required:
A. Call the supervisor or manager and advise them of the problem and
the urgency of the matter.
B. Depending on the risk, an evacuation may be called.
C. Follow the evacuation procedure.
D. The supervisor or manager will call in the fire brigade or specialized
personnel who will deal with the spill.
Fire Exits
All fire exits should be kept clear from any obstacles. All students have
a responsibility to make sure that chairs, empty boxes or any other type of
obstacle are not placed in or near fire exit doorways.
All corridors also need to have equipment stored on one side only to
ensure that in the event of an emergency there is a clear exit.
Fire Safety Procedure
Each work area has a designated fire warden, who in the event of a
fire will take charge. They are recognized by the use of the red hard hat they
wear.
If you find the fire:
173
Check that the Link light the little red or green light next to the RJ-45
port is lit on every computer. You must check this light both on the
computer itself and on the switch or router the computer is plugged into. If
this light is not on, you have a connection problem most likely a bad cable.
174
When you're sure the physical connections are good, you should
attempt to log in to each of your network computers using a valid domain
user account.
Click the Start button, type cmd and press Enter. Then, enter the
command ipconfig /all and press Enter.
This command will spit out numerous lines of information. The line
you're looking for should resemble this:
IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred)
If this part of the output does not show a valid IP address, you need to
check that your IP configuration is set correctly and that your DHCP server is
working.
Another basic test you should perform is to use the ping command
from a command prompt to make sure that the computers on your network
can contact one another.
Do several ping tests. First, make sure that TCP/IP is up and running
by having the computer try to ping itself. Open a command prompt and
type ping local host. The output from this command will indicate whether or
not the ping was successful.
Next, try to ping your servers by name. For example, if your file server
is named FileServer01, use the command ping FileServer01.
175
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
176
Step 1
178
179
180
Specification:
Diagnosis:
Action Taken:
Remarks:
181
A.
Paper and Pencil Test
General Directions: Read the items very carefully. Write your answer in a
clean sheet of paper.
Test I. True or False
Directions: Write TRUE if the proceeding statement is correct and FALSE if
otherwise.
_______1. A safe workplace is clean, organized and well-lit.
_______2. One must unplug the power from the source before opening a
case and performing services.
_______3. It is a best practice that a fire extinguisher and first aid kit must be
available in the workplace.
_______4. You are allowed to open the power supply or a monitor.
_______5. You can bring food and drinks inside the laboratory.
_______6.The key to a well-tuned computer system is proper configuration.
_______7. Boot log stores all information from the boot process.
_______8. Registry is a collection of database of configuration in Windows
operating system.
_______9. The shortcut of Microsoft Configuration is ipconfig.
_______10. Configuration is the way a system is set up.
Test II. Multiple Choice
Direction: Write the letter of the correct answer.
1. What boot configuration utility allows setting the programs that will run at
startup?
a. Ipconfig
c. msconfig
b. regedit
d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig
c. msconfig
b. regedit
d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig
c. msconfig
b. regedit
d. dxdiag
4. Which of the following is an applet that controls the look of windows?
a. Appearance and themes
c. Performance and Maintenance
b. Network and Internet
d. Sounds, Speech and Audio
182
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
l.
Crimping tool
Cross- over
Fiber- optic
Ipconfig
Multi- mode
Ping
Protocol
RJ45
Single- mode
Straight-through
Subnet mask
Twisted pair
184
B.
Skills Checklist
Configuration Skills
Directions: Listed below are the most important skills one must have in order
to configure computer systems and networks. The matrix lists the skills
expected you to master. Check the appropriate column which describes the
level of your confidence with the given skills.
Configuration Skills
I can do it
confidently
3
I can do it
but with
assistance
2
I am not
confident
1
185
Verbal Interpretation
Confident
Confident but needs assistance
Not yet Confident
186