Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Set Up Computer Networks

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 52
At a glance
Powered by AI
The key takeaways are that this module will teach you how to set up computer networks through a series of learning activities and assessments. It covers topics like installing network cables and configuring routers and firewalls.

The purpose of this module is to provide training materials and activities to develop the skills required to set up computer networks as outlined in the unit of competency 'Set-Up Computer Networks'.

The learning outcomes of this module are to install network cables, set network configurations, set router/Wi-Fi/wireless access point configurations, and inspect and test configured computer networks.

HOW TO USE THIS MODULE

Welcome to the Module “Setting Up Computer Networks”. This module


contains training materials and activities for you to complete.

The unit of competency “Set-Up Computer Networks” contains


knowledge, skills and attitudes required for a Computer Systems Servicing NC II
course.

You are required to go through a series of learning activities in order to


complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets, Self-Checks, Operation Sheets and
Task Sheets. Follow these activities on your own and answer the Self-Check at
the end of each learning activity.

If you have questions, don’t hesitate to ask your teacher for assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this
module because you have:

o Been working for some time


o Completed training in this area.

If you can demonstrate to your teacher that you are competent in a


particular skill or skills, talk to him/her about having them formally recognized
so you don’t have to do the same training again. If you have a qualification or
Certificate of Competency from previous trainings show it to your teacher. If
the skills you acquired are still current and relevant to this module, they may
become part of the evidence you can present for RPL. If you are not sure about
the currency of your skills, discuss it with your teacher.

After completing this module ask your teacher to assess your


competency. Result of your assessment will be recorded in your competency
profile. All the learning activities are designed for you to complete at your own
pace.

Inside this module you will find the activities for you to complete followed
by relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity

1
COMPUTER SYSTEMS SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

INSTALL AND CONFIGURE Installing and


COMPUTER SYSTEMS
1. Configuring ELC724331
Computer Systems

SET-UP COMPUTER Setting-Up


NETWORKS Computer
2. ELC724332
Networks

SET-UP COMPUTER SERVERS Setting-Up Computer


3.
Servers ELC724333

Maintaining and
MAINTAIN AND REPAIR
Repairing Computer ELC724334
4. COMPUTER SYSTEMS AND
Systems and
NETWORKS
Networks

2
MODULE CONTENT
UNIT OF COMPETENCY
: SET-UP COMPUTER NETWORKS
MODULE TITLE : Setting Up Computer Networks

MODULES DESCRIPTOR : This unit covers the outcomes required in


setting-up computers networks for LANs and
small-office home-office (SOHO) systems. It
consists of competencies to install network
cables, set network configuration, set
router/Wi-Fi/ wireless access point/repeater
configuration as well as to inspect and test the
configured computer networks.

NOMINAL DURATION : 40 hours

CERFICATION LEVEL : NC II

LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1.1. Install network cables
1.2. Set network configuration
1.3. Set router/Wi-Fi/ wireless access point/repeater configuration
1.4. Inspect and test the configured computer networks

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with network


design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies
and procedures are followed

3
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program.
10. Network connectivity of each terminal is checked in accordance with network
design.
11. Any fault or problem in the network system is diagnosed and remedied in
line with the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance with
network design.
13. Communication checking between terminals are carried out in accordance
with OS network configuration guides
14. Unplanned events or conditions are responded to in accordance with
established procedures
15. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
16. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
17. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
18. Wireless settings are configured in accordance manufacturers’ instructions,
network design and end-user preferences
19. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end-user preferences
20. Final inspections are undertaken to ensure that the configuration done on
the computer networks conforms with the manufacturer’s
instruction/manual
21. Computer networks are checked to ensure safe operation.
22. Reports are prepared/completed according to company requirements.

4
INFORMATION SHEET 1.1-1

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Identify the different types of Computer Network


2. Explain the Importance of each type of Computer Networks.

INTRODUCTION TO COMPUTER NETWORK

 A computer network allows sharing of resources and information among


interconnected devices. In the 1960s, the Advanced Research Projects Agency
(ARPA) started funding the design of the Advanced Research Projects Agency
Network (ARPANET) for the United States Department of Defense. It was the first
computer network in the world.[1] Development of the network began in 1969,
based on designs developed during the 1960s.

Purpose

 Facilitating communications
 Sharing hardware
 Sharing files, data, and information
 Sharing software
 Information preservation
 Security
 Speed up

Network classification

 Connection method
 Wired technologies
 Wireless technologies
 Scale
 Functional relationship (network architecture)
 Network topology

Connection method

 Computer networks can be classified according to the hardware and software


technology that is used to interconnect the individual devices in the network, such
as optical fiber, Ethernet, wireless LAN, HomePNA, power line
communication or G.hn.
 Ethernet uses physical wiring to connect devices. Frequently deployed devices
include hubs, switches, bridges, or routers. Wireless LAN technology is designed
to connect devices without wiring. These devices use radio
waves or infrared signals as a transmission medium. ITU-TG.hn technology uses
existing home wiring (coaxial cable, phone lines and power lines) to create a high-
speed (up to 1 Gigabit/s) local area network.

5
Wired technologies

 Twisted pair wire is the most widely used medium for telecommunication.
Twisted-pair wires are ordinary telephone wires which consist of two insulated
copper wires twisted into pairs and are used for both voice and data transmission.
The use of two wires twisted together helps to
reduce crosstalk and electromagnetic induction. The transmission speed ranges
from 2 million bits per second to 100 million bits per second.
 Coaxial cable is widely used for cable television systems, office buildings, and
other worksites for local area networks. The cables consist of copper or aluminum
wire wrapped with insulating layer typically of a flexible material with a high
dielectric constant, all of which are surrounded by a conductive layer. The layers
of insulation help minimize interference and distortion. Transmission speed range
from 200 million to more than 500 million bits per second.
 Optical fiber cable consists of one or more filaments of glass fiber wrapped in
protective layers. It transmits light which can travel over extended distances.
Fiber-optic cables are not affected by electromagnetic radiation. Transmission
speed may reach trillions of bits per second. The transmission speed of fiber optics
is hundreds of times faster than for coaxial cables and thousands of times faster
than a twisted-pair wire.
Scale
 Networks are often classified as local area network (LAN), wide area
network (WAN), metropolitan area network (MAN), personal area
network (PAN), virtual private network (VPN), campus area network (CAN), storage
area network (SAN), and others, depending on their scale, scope and purpose,
e.g., controller area network (CAN) usage, trust level, and access right often differ
between these types of networks. LANs tend to be designed for internal use by an
organization's internal systems and employees in individual physical locations,
such as a building, while WANs may connect physically separate parts of an
organization and may include connections to third parties.

Functional relationship (network architecture)

 Computer networks may be classified according to the functional relationships


which exist among the elements of the network, e.g., active networking, client–
server and peer-to-peer (workgroup) architecture.

Network topology

 Computer networks may be classified according to the network topology upon


which the network is based, such as bus network, star network, ring
network, mesh network. Network topology is the coordination by which devices in
the network are arranged in their logical relations to one another, independent of
physical arrangement. Even if networked computers are physically placed in a
linear arrangement and are connected to a hub, the network has a star topology,
rather than a bus topology. In this regard the visual and operational
characteristics of a network are distinct. Networks may be classified based on the
method of data used to convey the data, these include digital and analog
networks.

6
Types of networks based on physical scope

 A local area network (LAN)


 A personal area network (PAN)
 A home area network (HAN)
 A wide area network (WAN)
 Campus network
 Metropolitan area network
 Enterprise private network
 Virtual private network
 Internetwork

Global area network

 A global area network (GAN) is a network used for supporting mobile


communications across an arbitrary number of wireless LANs, satellite coverage
areas, etc. The key challenge in mobile communications is handing off the user
communications from one local coverage area to the next. In IEEE Project 802,
this involves a succession of terrestrial wireless LANs

Internet

 The Internet is a global system of interconnected governmental, academic,


corporate, public, and private computer networks. It is based on the networking
technologies of the Internet Protocol Suite. It is the successor of the Advanced
Research Projects Agency Network(ARPANET) developed by DARPA of the United
States Department of Defense. The Internet is also the communications backbone
underlying the World Wide Web (WWW).

Intranets and extranets

 An intranet is a set of networks, using the Internet Protocol and IP-based tools
such as web browsers and file transfer applications, that is under the control of a
single administrative entity. That administrative entity closes the intranet to all
but specific, authorized users. Most commonly, an intranet is the internal network
of an organization. A large intranet will typically have at least one web server to
provide users with organizational information.
 An extranet is a network that is limited in scope to a single organization or entity
and also has limited connections to the networks of one or more other usually, but
not necessarily, trusted organizations or entities—a company's customers may be
given access to some part of its intranet—while at the same time the customers
may not be considered trusted from a security standpoint. Technically, an extranet
may also be categorized as a CAN, MAN, WAN, or other type of network, although
an extranet cannot consist of a single LAN; it must have at least one connection
with an external network.

Overlay network

7
 An overlay network is a virtual computer network that is built on top of another
network. Nodes in the overlay are connected by virtual or logical links, each of
which corresponds to a path, perhaps through many physical links, in the
underlying network.

Basic hardware components

 All networks are made up of basic hardware building blocks to interconnect


network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches,
and Routers. In addition, some method of connecting these building blocks is
required, usually in the form of galvanic cable (most commonly Category 5 cable).
Less common are microwave links (as in IEEE 802.12) or optical cable ("optical
fiber")

Network interface cards

 A network card, network adapter, or NIC (network interface card) is a piece


of computer hardware designed to allow computers to communicate over a
computer network. It provides physical access to a networking medium and often
provides a low-level addressing system through the use of MAC addresses.

Repeaters

 A repeater is an electronic device that receives a signal, cleans it of unnecessary


noise, regenerates it, and retransmits it at a higher power level, or to the other
side of an obstruction, so that the signal can cover longer distances without
degradation. In most twisted pair Ethernet configurations, repeaters are required
for cable that runs longer than 100 meters. Repeaters work on the Physical Layer
of the OSI model.

Hubs

 A network hub contains multiple ports. When a packet arrives at one port, it is
copied unmodified to all ports of the hub for transmission. The destination
address in the frame is not changed to a broadcast address.[7] It works on the
Physical Layer of the OSI model.

Bridges

 A network bridge connects multiple network segments at the data link layer (layer
2) of the OSI model. Bridges broadcast to all ports except the port on which the
broadcast was received. However, bridges do not promiscuously copy traffic to all
ports, as hubs do, but learn whichMAC addresses are reachable through specific
ports. Once the bridge associates a port and an address, it will send traffic for that
address to that port only.

8
Switches

 A network switch is a device that forwards and filters OSI layer


2 datagrams (chunk of data communication) between ports (connected cables)
based on the MAC addresses in the packets.[8] A switch is distinct from a hub in
that it only forwards the frames to the ports involved in the communication rather
than all ports connected. A switch breaks the collision domain but represents
itself as a broadcast domain. Switches make forwarding decisions of frames on the
basis of MAC addresses. A switch normally has numerous ports, facilitating a star
topology for devices, and cascading additional switches.[9] Some switches are
capable of routing based on Layer 3 addressing or additional logical levels; these
are called multi-layer switches. The term switch is used loosely in marketing to
encompass devices including routers and bridges, as well as devices that may
distribute traffic on load or by application content (e.g., a Web URL identifier).

Router

 A router is an internetworking device that forwards packets between networks by


processing information found in the datagram or packet (Internet protocol
information from Layer 3 of the OSI Model). In many situations, this information is
processed in conjunction with the routing table (also known as forwarding table).
Routers use routing tables to determine what interface to forward packets (this
can include the "null" also known as the "black hole" interface because data can
go into it, however, no further processing is done for said data).

9
SELF CHECK 1.1-1

IDENTIFICATION: Identify what is being ask, write on the space provided.

1. A ____________ is an internetworking device that forwards packets between


networks by processing information found in the datagram or packet (Internet
protocol information from Layer 3 of the OSI Model). In many situations, this
information is processed in conjunction with the routing table (also known as
forwarding table). Routers use routing tables to determine what interface to
forward packets (this can include the "null" also known as the "black hole"
interface because data can go into it, however, no further processing is done for
said data).
2. A __________________ contains multiple ports. When a packet arrives at one port,
it is copied unmodified to all ports of the hub for transmission. The destination
address in the frame is not changed to a broadcast address. It works on the
Physical Layer of the OSI model.

3. The ________________ is a global system of interconnected governmental,


academic, corporate, public, and private computer networks. It is based on the
networking technologies of the Internet Protocol Suite. It is the successor of
the Advanced Research Projects Agency Network(ARPANET) developed
by DARPA of the United States Department of Defense. The Internet is also the
communications backbone underlying the World Wide Web (WWW).

4. A _____________________ is a device that forwards and filters OSI layer


2 datagrams (chunk of data communication) between ports (connected cables)
based on the MAC addresses in the packets.[8] A switch is distinct from a hub in
that it only forwards the frames to the ports involved in the communication
rather than all ports connected. A switch breaks the collision domain but
represents itself as a broadcast domain. Switches make forwarding decisions of
frames on the basis of MAC addresses. A switch normally has numerous ports,
facilitating a star topology for devices, and cascading additional
switches.[9] Some switches are capable of routing based on Layer 3 addressing or
additional logical levels; these are called multi-layer switches. The term switch is
used loosely in marketing to encompass devices including routers and bridges, as
well as devices that may distribute traffic on load or by application content (e.g.,
a Web URL identifier).

5. A ________________is an electronic device that receives a signal, cleans it of


unnecessary noise, regenerates it, and retransmits it at a higher power level, or
to the other side of an obstruction, so that the signal can cover longer distances
without degradation. In most twisted pair Ethernet configurations, repeaters are
required for cable that runs longer than 100 meters. Repeaters work on the
Physical Layer of the OSI model.

10
ANSWER KEY 1.1-1

1. Router

2. Hubs

3. Internet

4. Switches

5. Repeaters

11
INFORMATION SHEET 1.1-2

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Identify the different types of Network Cables and Network Cable Tools.
2. Identify the correct Guidelines In Making A Network Cable and Cabling Rules.

INTRODUCTION TO CREATING NETWORK CABLES


• The two most common unshielded twisted-pair (UTP) network standards
are the10 Mhz 10BASE-T Ethernet and the 100Mhz 100BASE-TX Fast
Ethernet. The 100BASE-TX standard is quickly becoming the
predominant LAN standard. If you are starting from scratch, to build a
small home or office network, this is clearly the standard you should
choose. This article will show you how to make cables which will work
with both standards.
LANS SIMPLIFIED
• A LAN can be as simple as two computers, each having a network
interface card (NIC) or network adapter and running network software,
connected together with a crossover cable.
• The next step up would be a network consisting of three or more
computers and a hub. Each of the computers is plugged into the hub
with a straight-thru cable (the crossover function is performed by the
hub).

NETWORK CABLE AND CONNECTORS

• CAT 5 cable has four twisted pairs of wire for a total of eight individually
insulated wires. Each pair is color coded with one wire having a solid
color (blue, orange, green, or brown) twisted around a second wire with
a white background and a stripe of the same color. The solid colors
may have a white stripe in some cables. Cable colors are commonly
described using the background color followed by the color of the stripe;

12
e.g., white-orange is a cable with a white background and an orange
stripe

NETWORK CABLE AND CONNECTORS


• The straight through and cross-over patch cables discussed in this
article are terminated with CAT 5 RJ-45 modular plugs. RJ-45 plugs
are similar to those you'll see on the end of your telephone cable except
they have eight versus four or six contacts on the end of the plug and
they are about twice as big. Make sure they are rated for CAT 5 wiring.
(RJ means "Registered Jack").

NETWORK CABLE TOOLS

• Modular Plug Crimp Tool. You will need a modular crimp tool. This
one is very similar to the one I have been using for many years for all
kinds of telephone cable work and it works just fine for Ethernet cables.

• Universal UTP Stripping Tool (Eclipse). I recently bought one of these


tools and it works slick, and it makes a much neater cut. I recommend
that you purchase one if you will be making many cables

• Diagonal Cutters ("4 to 6"). It is easier to use diagonal cutters ("diags"


or "dikes") to cut the cable off at the reel and to fine tune the cable ends
during assembly. Also, if you don't have a stripper, you can strip the
cable by using a small knife (X-acto, utility, etc.) to carefully slice the
outer jacket longitudinally and use the diags to cut it off around the
circumference

13
COLOR-CODE STANDARDS

• Two wire color-code standards apply: EIA/TIA 568A and EIA/TIA


568B. The codes are commonly depicted with RJ-45 jacks as follows
(the view is from the front of the jacks):

• If we apply the 568A color code and show all eight wires, our pin-out
looks like this:

• If we exchange the green and orange pairs in the 568A diagram we will get a
simplified diagram for a 568B straight-thru cable. If we cross the green and
orange pairs in the 568A diagram we will arrive at a simplified diagram for a
crossover cable.

14
GUIDELINES IN MAKING A NETWORK CABLE

1. Pull the cable off the reel to the desired length and cut. For cable lengths which are a
fraction of ten feet, eye-ball the length as you pull the cable out of the box. For longer
cables, I pull it out to the ten foot mark and go back to the box and pull the remaining
fraction or another ten feet. If you are pulling cables through walls, a hole in the floor,
etc., it easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire
segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328
feet or about the length of a football field) for 100BASE-TX (and 10BASE-T).

2. Strip one end of the cable with the stripper or a knife and diags. If you are using the
stripper, place the cable in the groove on the blade (left) side of the stripper and align the
end of the cable with the right side of the stripper. This is about right to strip a little
over 1/2" of the jacket off the cable. Turn the stripper about one turn or so. If you turn
it much more, you will probably nick the wires. The idea is to score the outer jacket, but
not go all the way through. Once scored, you should be able to twist the end of the
jacket loose and pull it off with one hand while holding the rest of the cable with the
other. If you are using a knife and diags, carefully slit the cable for about an inch or so
and neatly trim around the circumference of the cable with the diags to remove the
jacket.

3. Inspect the wires for nicks. Cut off the end and start over if you see any. You may
have to adjust the blade with the screw at the front stripper. Cable diameters and jacket
thicknesses vary.

4. Spread and arrange the pairs roughly in the order of the desired cable end.

5. Untwist the pairs and arrange the wires in the order of the desired cable end. Flatten
the end between your thumb and forefinger. Trim the ends of the wires so they are even
with one another. It is very important that the unstripped (untwisted) end be
slightly less than 1/2" long. If it is longer than 1/2" it will be out-of-spec and
susceptible to crosstalk. If it less than slightly less than 1/2" it will not be properly
clinched when RJ-45 plug is crimped on.. Flatten again. There should be little or no
space between the wires.

6. Hold the RJ-45 plug with the clip facing down or away from you. Push the wire firmly
into the plug. Now, inspect the darn thing... before crimping and wasting the plug!
Looking through the bottom of the plug, the wire on the far left side will have a white
background. The wires should alternate light and dark from left to right. The furthest
right wire is brown. The wires should all end evenly at the front of the plug. The jacket
should end just about where you see it in the diagram--right on the line. Aren't you glad
you didn't crimp the plug?

7. Hold the wire near the RJ-45 plug with the clip down and firmly push it into the left
side of the front of the crimper (it will only go in one way). Hold the wire in place squeeze
the crimper handles quite firmly. (Crimp it once.) The crimper pushes two plungers
down on the RJ-45 plug. One forces what amounts to a cleverly designed plastic
plug/wedge onto the cable jacket and very firmly clinches it. The other seats the "pins,"
each with two teeth at its end, through the insulation and into the conductors of their
respective wires.

15
8. Test the crimp... If done properly an average person will not be able to pull the plug
off the cable with his or her bare hands. And that quite simply, besides lower cost, is the
primary advantage of twisted-pair cables over the older thinwire, coaxial cables. In fact,
the RJ-45 and ease of its installation is the main reason coaxial cable is no longer widely
used for small Ethernets. But, don't pull that hard on the plug. It could stretch the
cable and change its characteristics. Look at the side of the plug and see if it looks like
the diagram and give it a fairly firm tug to make sure it is crimped well.

9. Prepare the other end of the cable so it has the desired end and crimp.

10. If both ends of the cable are within reach, hold them next to each other and with RJ-
45 clips facing away. Look through the bottom of the plugs. If the plugs are wired
correctly, and they are identical, it is a straight-thru cable. If they are wired correctly
and they are different, it is a crossover cable.

11. If you have an operational network, test the cable. Copy some large files.

12. If the cable doesn't work, inspect the ends again and make sure you have the right
cable and that it is plugged into the correct units for the type of cable. Try power-cycling
(cold booting) the involved computers.

13. If you have many straight-thru cables and a crossover cable in your system, you
should consider labeling the crossover cable or using a different colored cable for the
crossover cable so you don't mix them up. I do not recommend implementing the
crossover function, as recommended elsewhere, with two RJ-45 jacks, appropriately
wired back to back, and two straight-thru cables. This method costs noticeably more,
introduces more than the necessary number of components and connections, increases
the complexity and time of assembly, and decreases reliability.

CABLING RULES

1. Try to avoid running cables parallel to power cables.


2. Do not bend cables to less than four times the diameter of the cable.
3. If you bundle a group of cables together with cable ties (zip ties), do not over-cinch
them. It's okay to snug them together firmly; but don't tighten them so much that you
deform the cables.
4. Keep cables away from devices which can introduce noise into them. Here's a short
list: copy machines, electric heaters, speakers, printers, TV sets, fluorescent lights,
copiers, welding machines, microwave ovens, telephones, fans, elevators, motors, electric
ovens, dryers, washing machines, and shop equipment.
5. Avoid stretching UTP cables (tension when pulling cables should not exceed 25 LBS).
6. Do not run UTP cable outside of a building. It presents a very dangerous lightning
hazard!
7. Do not use a stapler to secure UTP cables. Use telephone wire/RG-6 coaxial wire
hangers which are available at most hardware stores.

16
SELF CHECK 1.1-2

Direction: Identify the Correct guidelines in making a network cable and


cabling rules write TRUE if the statement is correct and FALSE if
the statement is wrong.

_______________ 1. Spread and arrange the pairs roughly in the order of the desired cable
end.

_______________ 2. Don’t inspect the wires for nicks. Cut off the end and start over if
you see any. You may have to adjust the blade with the screw at the
front stripper. Cable diameters and jacket thicknesses vary.

______________ 3. Don’t prepare the other end of the cable so it has the desired end and
crimp.

______________ 4. If both ends of the cable are within reach, don’t hold them next to each
other and with RJ-45 clips facing away. Don’t look through the
bottom of the plugs. If the plugs are wired correctly, and they are
identical, it is a straight-thru cable. If they are wired correctly and
they are different, it is a crossover cable.

______________ 5. Pull the cable off the reel to the desired length and cut. For cable
lengths which are a fraction of ten feet, eye-ball the length as you pull
the cable out of the box. For longer cables, I pull it out to the ten foot
mark and go back to the box and pull the remaining fraction or
another ten feet. If you are pulling cables through walls, a hole in the
floor, etc., it easier to attach the RJ-45 plugs after the cable is pulled.
The total length of wire segments between a PC and a hub or between
two PC's cannot exceed 100 Meters (328 feet or about the length of a
football field) for 100BASE-TX (and 10BASET).

______________ 6. Don’t try to avoid running cables parallel to power cables.

______________ 7. Do not run UTP cable outside of a building. It presents a very


dangerous lightning hazard!

______________ 8. Do not use a stapler to secure UTP cables. Use telephone wire/RG-6
coaxial wire hangers which are available at most hardware stores.

______________ 9. Bend cables to less than four times the diameter of the cable.

______________ 10. If you bundle a group of cables together with cable ties (zip ties), do
not over-cinch them. It's okay to snug them together firmly; but don't
tighten them so much that you deform the cables.

17
ANSWER KEY 1.1-2

1. T

2. F

3. F

4. F

5. T

6. F

7. T

8. T

9. F

10. T

18
INFORMATION SHEET 1.1-3

CONFIGURE CLIENT DEVICE SYSTEMS

Learning Objective:

After reading this information sheet, you must be able to:

1. Identify what is client device systems


2. Configuring client device systems

Client Device Settings s a way of configuring your client device by which you can specify
client settings at a colaboration level, allowing you to define different settings as necessary. It
has the characteristics of being flexible to create multiple client device or client user settings
and apply it to different collections as per requirement. It is a set of default settings. But
alywas take note that those Client Device systems settings are configured inaccordance with
manufacturers’ instructions and end-user preferences. In this module, we will show the steps
on setting up your client device on Windows 7, 8 & 10 whisch are configured manually.

Always take note on the following area’s to be configured:

1. Set up Time and Date


2. Set up Computer Name
3. Install and configure Network Driver
4. Install necessary software appplications e.i MS Office and Anti virus

Configure Client Device Systems

Setp on how to configure client device settings:

1. Setting up Time and Date

a. Click the bottom-right clock icon on the desktop, and tap Change date and time settings
in the pop-up small window.

19
b. As the Date and Time window opens, click Change date and time to continue.

Tip: You can also follow the path of Control Panel/Clock, Language, and
Region/Date and Time to open the above-mentioned window.

Step 3: In the Date and Time Settings window, respectively change date and
time, and then tap OK to confirm the changes.

20
2. Setting up Computer Name

a. Click the Start Button and right-click Computer and select Properties.

Note: Like all things Windows, there are several


ways to do the same thing. With Windows 7 and
Vista, you can just type System and click System as
shown to the right.

b. First, click Change Settings.

21
c. Click Change button under Computer Name Tab.

d. Type in the new name for your computer under Computer Name Field.

Once you complete Step d just click OK a few times. You will be prompted to
reboot the computer, and once your reboot is complete, your new computer name
will be in effect.

22
3. Install and configure Network Driver

Step 1: Install a network card. This could be PCI card or USB network card
adaptor.

If you are installing a PCI card you need to open your computer case and push
the PCI network card into an empty PCI slot. It is quite simple and straight
forward. If you are using a USB network adaptor you simply need to plug it into
an empty USB port.

USB Network
PCI Network card :
Adaptor:

Step 2: Install the device driver for the network card. Windows will detect that
you have installed a new hardware. In most cases it will install the drivers
automatically. If not, you need to install the drivers manually from the CD
supplied with the network card. I am using Windows 7 operating system to
demonstrate each step. If you are using Windows Vista the steps will be very
similar. If you are using Windows XP it will be slightly different so follow this
guide instead.

Step 3: After the drivers have been installed successfully you can see a network
card listed under windows device manager. To go to the device manager
click Start -> Control Panel -> System and Security -> Device Manager.

You will see a network card listed under the device manager similar to the image
below:

23
Step 4: Go to network sharing center by clicking Start -> Control panel ->
Network and Internet -> Network and Sharing Center. As you can see from
the image below the computer name tiger is connected to a network and has
access to the Internet. This indicates that our network card is installed correctly
and managed to get connection to our network. In this case it is connected to a
ADSL router.

Step 5: Check your local area connections by clicking on change adaptor


settings link on the left side of Network and Sharing center. You will get an icon
similar to below:

24
Step 6: Double click on Local Area Connection icon which will display your LAN
status. It shows the network connection duration, the speed of the connection,
number of bytes sent and received etc.

Step 7: Click Details to see the Network connection details. You will see some
very import connection details. Inside the red highlighted area you will see DHCP
Enable is set to Yes and your IP Address listed. DHCP means (Dynamic Host
Configuration Protocol). Basically its a feature built into most Routers or server
operating systems which automatically assigns an IP address to the client
computer. In our case the Router is the DHCP server and our computer is the
client. Please note the dynamic IP address assigned by a DHCP server is random
and can change next time you reboot your computer or the router.

Step 8: Close the Network connection details. Click Properties -> (on Network
area connections status) -> Internet protocol version 4 (TCP/IPv4) ->
Properties. As you can see everything is set to automatic. This means the DHCP
server assigns everything automatically as mentioned above.

25
Step 9: If you have many computers on a network i.e. your Desktop PC, Your
Laptop, and your PS3 console its a good idea to fix the IP Address for each device.
This is called static IP address. By fixing the IP address you can easily identify
each computer on the network. This is what i will do below. I will choose my IP
address as 192.168.0.100. The subnet mask will be automatically set
to 255.255.255.0. Default gateway is 192.168.0.1. The gateway IP address is
normally the IP address of your router. Preferred DNS server is also the IP
Address of your router, although you can use other DNS server like Open DNS IP
address.

Step 10: You can now check if the static settings have taken effect by clicking
on Detailson Local Area connection status as you have done on Step 6. Finally
you will see all the settings that you have made in the previous step has taken
effect. You will notice that the DHCP enable is set to No, as we have set each
value manually.

That’s it, you have managed to install and configure your network device
successfully. You have also learned how to use dynamic and static IP Address to
connect to a network.

26
SELF-CHECK 1.1-3

TRUE OR FALSE: Write the word TRUE in the space provided if the statements are
correct and FALSE if it is not.

____________ 1. Client Device Settings is a way of configuring your client device by


which you cannot specify client settings at a collection level.

____________ 2. On Windows 7 OS, to set up the Time and Date go to the upper left
of your taskbar.

____________ 3. Setting up your computer name is important. This will serve as the
identify of your computer.

____________ 4. In every personal computer, it is necessary to install a network


driver.

____________ 5. Assigning an IP Address must be unique.

____________ 6. The default subnet mask is 255.255.0.0

____________ 7. In setting up Time, you cannot set time automatically.

____________ 8. In setting up the Time Zone, you could use Philippines for the
setting.
____________ 9. Client setting on different OS are just the same.

____________ 10. In installing a network drivers, it compatibility on PC must be


consider.

27
ANSWER KEY TO 1.1-3

TRUE OR FALSE

1. False

2. False

3. True

4. True

5. True

6. True

7. False

8. False

9. False

10. True

28
INFORMATION SHEET 1.1-4

CONFIGURE LOCAL AREA NETWORK

Learning Objective:

After reading this Information Sheet, you should be able to:

1. To identify what is Local Area Network


2. To acquire knowledge in configuring Local Area Network

A Local Area Network (LAN) is a group of computers and associated devices that
share a common communications line or wireless link to a server. Typically, a LAN
encompasses computers and peripherals connected to a server within a distinct
geographic area such as an office or a commercial establishment. Computers and
other mobile devices use a LAN connection to share resources such as a printer or
network storage.

Configuring Local Area Network

Equipment and Peripherals Needed for Configuring LAN

Equipment/Peripherals Name and Description Image

A Personal Computer (PC) is a multi-purpose


electronic computer whose size, capabilities, and
price make it feasible for individual use. PCs are
intended to be operated directly by an end user,
rather than by a computer expert or technician.

Ethernet Cables are networking hardware used


to connect one network device to two or more
computers to share printers, scanners etc.
Different types of network cables, such as
coaxial cable, optical fiber cable, and twisted
pair cables, are used depending on the network’s
physical layer, topology, and size, The devices
can be separated by a few meters (e.g. via

29
Ethernet) or nearly unlimited distances (e.g. via
the interconnections do the Internet)
Router/Hub/Switch is a way stations that
control the traffic of data within a network,
assign a unique IP address to each computer.

When Equipments and Peripherals are all ready, we will now proceed on
Installing and Configuring Local Area Network. Below are the steps in configuring
Local Area Network.

1. Prepare your Workplace


It must be clean and dry. Work on a spacious table. If necessary work with your
PPE. Do not forget to apply the OHS policies and procedures.
2. Determine the number of computers you’re connecting will determine the type of
network hardware you’ll need.
 If you are connecting four or less computers, you’ll just need a single
router or one switch if you don’t need internet.
 If you’re connecting more than four computers, you’ll want a router and a
switch if you don’t need internet.
3. Determine your network layout.
If you’re installing a permanent LAN solution, you’ll want to keep cable length in
mind. CAT5 Ethernet cables should not run longer than 250 feet. If you need to
cover larger distances, you’ll need switches at regular intervals, or you’ll need to
use CAT6 cables.
4. Plug one end of an Ethernet cable into your computer. Make sure you're using
an Ethernet cable (RJ45), not a telephone cable (RJ11).
5. Plug the other end of the cable into an open LAN port. This can be any open LAN
port on either the router or the switch, depending on your LAN setup.
6. Reset the Router. In resetting your Router just click the small button on the
back of your router using a Pin or Ballpen and wait until all the icons in front of
the router will Lights on.
7. Go to browser either “Google Chrome” or “I explorer”. And type in the default IP
Address Depends on Manufacturer. Use 192.168.0.1
8. Router Login will appear. Type on default username and password. “admin” is
most default username and password , still depends on manufacturer.

30
9. After encoding the default IP Address and entering the default username and
password, the router user interface will appear. We will now ready for router
setting up.
10.Click the Network Tab and change your IP Address. Take note on the sequence
of your IP Address Save it will reboot.
11. Go to DHCP Tab just click the Disable Button. And browser will reboot.

31
SELF-CHECK 1.1-4

IDENTIFICATION: Identify what is being ask, write on the space provided.

_______________1. A multi-purpose electronic computer whose size, capabilities,


and price make it feasible for individual use.

_______________2. Is a device that sends, receives, and translates information from


the internet and makes it available within the Local Area Network.

_______________3. Are networking hardware used to connect one network device to


other network devices or to connect two or more computers to share printers,
scanners etc.

_______________4. Is a way to stations that control the traffic of data within a


network, assigns a unique IP Address to each computer.

_______________5. Is a group of computers and associated devices that share a


common communications line or wireless link to a server.

_______________6. Default IP address of a Router

_______________7. Default Username and Password use for Logging on your router
Portal.

_______________8. A tab on your Router Portal that can be used to change your IP.

_______________9. It is the first step before configuring your Router.

_______________10. Indicator that your Router are already reset.

32
ANSWER KEY TO 1.1-4

IDENTIFICATION:

1. Personal Computer

2. Modem

3. Ethernet Cable

4. Router

5. LAN

6. 192.168.0.7

7. Admin

8. Network Tab

9. Reset

10. lights On (icons in front)

33
Task Sheet 1.1-4

Configure Local Area Network

Performance Objective: Given a Network Materials (router and Ethernet


Cable) together with a Personal Computer you
should Configure Local Area Network with
allotted time of 40 minutes.

Supplies/Materials and Equipments:


 Personal Computer
 Router and Ethernet Cable
 Personal Protective Equipment (if necessary)
 Pins/Ballpen (use for resetting the Router)

Steps/Procedure:
1. Prepare your Workplace
a. Make sure that you have the necessary
Materials/Peripherals
b. Make sure that the workplace is clean and dry.
2. Start
a. Connect Router and Personal Computer using your Ethernet
Cable
b. Reset your Router using Pins/Ballpen
c. Go to your browser (Google or I explorer
d. Type in the default IP Address
e. Type in the default username and password
f. Set up Network Tab
g. Set up DHCP Tab

Assessment Method:

Performance Criteria Checklist

34
PERFORMANCE CRITERIA CHECKLIST 1.1-4

CRITERIA YES NO

1. Did the trainee configure the Router


correctly?

2. Did the trainee configure the Local Area


Network?

35
INFORMATION SHEET 1.1-5

CONFIGURE WIDE AREA NETWORK (ACCESS POINT)

Learning Objective:

After reading this Information Sheet, you should be able to:


1. To identify what is wide area network
2. To acquire knowledge in configuring wide area network

A wide area network (WAN) is a telecommunications network or computer


network that extends over a large geographical distance. Wide area
networks are often established with leased telecommunications circuits.

Business, education and government entities use wide area network to


relay data to staff, students, clients, buyers, and supplies from various
locations across the world. In essence, this mode of telecommunications
allows a business to effectively carry out its daily function regardless of
location. The internet may be considered a WAN.

Configure Wide Area Network

As we gather all the peripherals and equipment needed we will proceed on


Configuring Wide Area Network. Same process with Router but this time we
will use Modem or the Access Point. See steps listed below.

1. Gather your Modem, Ethernet Cable and Personal Computer. Connect


each peripheral using the Ethernet Cable. Directly connect Modem to
your Personal Computer using the Ethernet Cable. This will just be use
for the setting up process.

2. Reset the Modem. In resetting your Modem just click the small buttons
at the back and lights on.

36
3. Go to browser either Google Chrome or I explorer. And type in the
default IP Address of your Modem. Depends on Manufacturer. We will
use 192.168.0.254, And a dialog box will pop up and you will need to
enter the default username and password. Use admin for both
username and password.

4. Repeat the step shown on Configuring your router.

a. Go to network tab. Change your IP address. Click save then it will


reboot.
b. Go to DHCP tab and click Disable button.
c. Unlike on router we need to setup Wireless Tab on Modem. Click
Wireless Tab. Click on WPA/WPA2 –Personal (recommended) then enter
your desired PSK Password. It must consist of alphanumeric characters.
The browsers will reboot.

Self-Check 1.1-5

37
SELF-CHECK 1.1-5

Rearrange the given steps on how to configure WAN. Put the correct sequence
of steps by using numbers 1-10 in the space provided, 1 is the First Step and
10 is the Last Step.

____________ 1. Gather your Modem, Ethernet Cable and Personal Computer.


Connect each peripherals using the Ethernet cable.

____________ 2. Go to browser either “ Google Chrome” or I explorer/

____________ 3. Go to Network Tab. Change your IP address. Click save then it will
reboot.

____________ 4. Reset the Modem. In resetting your Modem just click the small
button at the back and wait until all the icons in front of the Modem will Lights on.

____________ 5. Directly connect Modem to your Personal Computer using the


Ethernet Cable. This will just be use for setting up process.

____________ 6. Go to DHCP tab and click disable button.

____________ 7. And a dialog box will pop up and you will need to enter the default
username and password. Use ‘admin” for both username and password.

____________ 8. Prepare your Workplace, clean and dry.

____________ 9. And type in the default IP Address of your Modem.

____________ 10. Click Wireless Tab. Click on WPA/WPA2-Personal (recommended)


then enter your desired PSK Password.

38
ANSWER KEY 1.1-5

REARRANGE:

1. 2

2. 5

3. 7

4. 4

5. 3

6. 8

7. 6

8. 1

9. 5

10. 10

39
Task Sheet 1.1- 5

Configure Wide Area Network

Performance objective: Given a Network Materials (Router and Ethernet


Cable) together with a Personal Computer you should Configure Wide Area
Network with allotted time of 40 minutes.

Supplies/Materials and Equipments:

 Personal Computer
 Modem and Ethernet Cable
 Personal Protective Equipment (if necessary)
 Pins/Ballpen (Use for resetting the Router)

Steps/Procedure:
1. Prepare your workplace
a. Make sure that you have the necessary Materials/Peripherals
b. Make sure that the workplace is clean and dry.
2. Start
a. Connect Modem and Personal Computer using your Ethernet
Cable
b. Reset your Modem using Pins/Ballpen
c. Go to your browser (Google chrome or Iexplorer)
d. Type in the default IP Address
e. Type in the default username and password
f. Set up Network Tab
g. Set up DHCP Tab
h. Set up Wireless Tab

Assessment Method:

Performance Criteria Checklist

40
PERFORMANCE CRITERIA CHECKLIST 1.1-5

CRITERIA YES NO

1. Did the trainee configure the Modem


correctly?

2. Did the trainee configure the Wide Area


Network?

41
INFORMATION SHEET 1.1-6

CONFIGURE WIRELESS SETTINGS


Learning Objective:
After reading this Information Sheet, you should be able to:
1. To identify what is Wireless Network?
2. To enumerate steps in configuring Wireless Settings

A wireless network is a computer network that uses wireless data


connections between network nodes.

Wireless networking is a method by which homes, telecommunications


networks and business installations avoid the costly process of introducing
cables into a building, or as a connection between various equipment locations.
Wireless telecommunications networks are generally implemented and
administered using radio communication.

A wireless local area network (WLAN) links two or more devices over a short
distance using a wireless distribution method, usually providing a connection
through an access point for internet access. The use of spread-
spectrum or OFDM technologies may allow users to move around within a local
coverage area, and still remain connected to the network.

Products using the IEEE 802.11 WLAN standards are marketed under
the Wi-Fi brand name. Fixed wireless technology implements point-to-point links
between computers or networks at two distant locations, often using
dedicated microwave or modulated laser light beams over line of sight paths. It is

42
often used in cities to connect networks in two or more buildings without
installing a wired link.

Configure Wireless Settings


After the Router and Modem we will now proceed on setting up the wireless
network.
1. First, we whether you have a wireless adapter.
a. Select the Start button, type Device Manager in the search box, and
then select device Manager.
b. Expand Network adapters.
c. Look for a network adapter that might have wireless in the name.
2. Setting up the modem and internet connection
After you have all the equipment, you’ll need to set up your modem and
Internet connection. If your modem wasn’t set up for you by your Internet
service provider (ISP), follow the instructions that came with your modem to
connect it to your PC and the internet. If you’re using Digital Subscriber Line
(DSL), connect your modem to a phone jack. If you’re using cable, connect
your modem to a cable jack.
3. Positioning the wireless router
Put your wireless router somewhere where it will receive the strongest signal
with the least amount of interface. For better results, follow these steps:
a. Place your wireless router in a central location. Place the router as close
to the center of your home as possible to increase the strength of the
wireless signal throughout your home.
b. Position the wireless router off the floor and away from walls and metal
objects such as metal file cabinets. The fewer physical obstructions
between your PC and the router’s signal, the more likely that you’ll be
using the router’s full signal strength.
4. Securing your wireless network
Security is always important, with a wireless network, it’s even more
important because your network’s signal could be broadcast outside your

43
home. If you don’t help secure your network, people with PCs nearby could
access info stored on your network PCs and use your Internet connection. To
help make your network more secure.
5. Change the default user name and password. This helps protect your router.
Most router manufacturers have a default user name and password on the
router and a default network name (also known as the SSID). Someone could
use this info to access your router without you knowing it. To help avoid that,
change the default user name and password for your router. See the
documentation for your device for instructions.
6. Set u a security key (password) for your network. Wireless networks have a
network security key to help protect them from unauthorized access. We
recommend using Wi-Fi Protected Access 2 (WPA2) security if your router
supports it. See the documentation for your router for more detailed info,
including what type of security is supported and how to set it up.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports
WPS and its connected to the network, follow these steps to set up a network
security key:
1. Select the start button, look for control panel and click network and
internet. Then look for network and sharing center.
2. Select set up a new connection or network.
3. Select Set up a new network, and then choose next

The wizard will walk you through creating a network name and a security key. If
your router supports it, the wizard will default to Wi-Fi Protected Access (WPA or
WPA2) security. We recommend that you use WPA2, because it offers better
security than WPA or Wired Equivalent Privacy (WEP) security. With WPA2 or
WPA you can also use a passphrase, so you don’t have to remember a cryptic
sequence of letters and numbers.
7. Write down your security key and keep it in a safe place. You can also save
your security key on a USB flash drive by following the instructions in the

44
wizard. (saving your security key to a USB flash drive is available in Windows
8 and windows 7, but not in Windows 10.)

Connect a PC to your wireless network

1. Select the Network or icon in the notification area


2. In the list of networks, choose the network that you want to connect to, and
then select Connect.
3. Type the security key (often called the password)
4. Follow additional instructions if there are any.

45
SELF-CHECK 1.1-6

Rearrange the given steps on how to configure WAN. Put the correct sequence
of steps by using numbers 1-10 in the space provided, 1 is the First Step and
10 is the Last Step.

____________ 1. Change the default user name and password.

____________ 2. Set up a security key (password) for your network.

____________ 3. Select Set up a new connection or network.

____________ 4. Securing your wireless network.

____________ 5. Select the start button, look for Control Panel and click Network

and Internet.

____________ 6. Look for Network and Sharing Center.

____________ 7. Positioning the wireless router.

____________ 8. Select Set up a new network, and then choose Next.

____________ 9. Setting up the modem and internet connection.

____________ 10. We need to check whether you have a wireless adapter.

46
ANSWER KEY 1.1-6

Rearrange:

1. 5

2. 6

3. 9

4. 4

5. 7

6. 8

7. 3

8. 10

9. 2

10. 1

47
INFORMATION SHEET 1.1-7

SETTING UP FIREWALL WITH ADVANCE SECURITY

Learning Objective:

After reading this Information sheet, you should be able to:

1. To identify What is Fire wall with advance security


2. To enumerate steps in Configuring Firewall with advance security

The windows firewall with advance security is a tool which gives you
detailed control over the rules that are applied by the windows firewall. You can
view all the rules that are used by the windows firewall, change their properties,
create new rules or disable existing ones. In this tutorial we will share how to
open the Windows Firewall with Advance Security, how to find your way around it
and talk about the types of rules that are available and what kind of traffic they
filter.

A firewall is hardware or software that can help protect your PC from


unauthorized users or malicious software (malware). Running a firewall on each
PC on your network can help control the spread of malicious software on your
network, and help protect your PCs when you’re accessing the Internet. Windows
Firewall is included with this version of Windows.

Setting Up firewall with Advance Security

You have several alternatives to opening the Windows Firewall with Advance
Security:
1. One is to open the standard Windows firewall window, by going to “ Control
Panel – System and Security –Windows Firewall “. Then click or tap
Advanced settings.

2. In Windows 7, another method is to search for the word firewall in the


Start Menu search box and click the “ Windows Firewall with Advanced
Security “ result.

3. In Windows 8.1, Windows Firewall with Advanced Security is not returned


in search results and you need to use the first method shared above for
opening it.

4. The Windows Firewall with Advanced Security looks and works the same
both in Windows 7 and Windows 8.1. To continue our tutorial, we will use
screenshots that were made in Windows 8.1

48
5. What Are The Inbound & Outbound Rules ?

a. In order to provide the security you need, The Windows Firewall has a
standard set of inbound and outbound rules, which are enabled depending
on the location of the network you are connected to.
b. Inbound rules are applied to the traffic that is coming from the network
and Internet to your computer or device. Outbound rules apply to the
traffic from your computer to the network or the Internet.
c. These rules can be configured so that they are specific to : computers,
users, programs, services, ports or protocols. You can also specify to which
type of network adapter ( e.g. wireless, cable, virtual private network ) or
user profile it is applied to.
d. In the Windows Firewall with Advanced Security, you can access all rules
and edit their properties. All you have to do is click or tap the appropriate
section in the left - side panel.

6. The rules used by the Windows Firewall can be enabled or disabled. The
ones which are enabled or active are marked with a green check-box.

7. If you want to know more about a specific rule and learn its properties, right
click on it and select Properties or select it and press Properties in the
column on right, which lists the actions that are available for your selection.

8. In the Properties window you will find complete information about the
selected rule, what it does and in when it is applied. You will also be able to
edit its properties and change any of the available parameters.

9. What Are the Connection Security Rules ?

a. Connection Security Rules are used to secure traffic between two computers
while it crosses the network. One example would be a rule which defines
that connections between two specific computers must be encrypted.

b. Unlike the inbound or outbound rules, which are applied only to one
computer, connections security rules require that both computers have the same
rules defined and enabled.

c. If you want to see if there are any such rules on your computer, click or tap
“Connection Security rules” on the panel on the left. By default, there are no such
rules defined on windows computers and devices. They are generally used in
business environments and such rules are set by the network administrator.

49
10. What Does the windows firewall with advance security monitor?

The windows firewall with advance security includes some monitoring features as
well. In the monitoring section you can find the following information the firewall
rules that are active (both inbound and outbound) the connection security rules
that are active and weather there are any active security associations.

11. You should note that the monitoring section shows only the active rules for
the current network location. If there are rules which get enabled for other
network locations.

50
SELF-CHECK 1.1-7

TRUE or FALSE: Write the word TRUE in the space provided if the statements
are correct FALSE if it is not.

____________ 1. A firewall is hardware or software that can help protect your PC from
unauthorized users or malicious software (malware).

____________ 2. Running a firewall on each PC on your network won’t help control


the spread of malicious software on your network.

____________ 3. In order to provide the security you need, the windows firewall has a
standard set on inbound and outbound rules.

____________ 4. These rules can’t be configured so that they are specific to


computers, users, programs, services, ports or protocols.

____________ 5. In the Windows Firewall with Advance Security you can access all
rules and edit their properties.

51
ANSWER KEY 1.1-7

1. TRUE

2. FALSE

3. TRUE

4. FALSE

5. TRUE

52

You might also like