Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
742 views

Module 9 CSS G11 2nd Sem

This module provides an overview of inspection and testing procedures for computer networks configuration. It discusses network inspection procedures, safe computer network operation, and documentation procedures. The module aims to help learners inspect and test configured computer networks by undertaking final inspection, ensuring configuration conforms to manufacturer's instructions, checking for safe operation, and completing required reports. It contains learning activities such as a pre-test to assess prior knowledge, lessons on the topics, independent practice exercises, and a post-assessment to evaluate mastery of competencies.

Uploaded by

Ella Mae Gadian
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
742 views

Module 9 CSS G11 2nd Sem

This module provides an overview of inspection and testing procedures for computer networks configuration. It discusses network inspection procedures, safe computer network operation, and documentation procedures. The module aims to help learners inspect and test configured computer networks by undertaking final inspection, ensuring configuration conforms to manufacturer's instructions, checking for safe operation, and completing required reports. It contains learning activities such as a pre-test to assess prior knowledge, lessons on the topics, independent practice exercises, and a post-assessment to evaluate mastery of competencies.

Uploaded by

Ella Mae Gadian
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Computer Systems

Servicing NC-II
Module 9:
Inspection and Testing of
Computer Networks
Configuration
Computer Systems Servicing NC-II
Alternative Delivery Mode
Module 9: Inspection and Testing of Computer Networks Configuration
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Authors: Angelo P. Pera
Editors: Raymar C. Francia
Reviewers:
Proofreader: Marites C. Semaning
Illustrator: Name
Layout Artist: Name
Management Team: Name of Regional Director
Name of CLMD Chief
Name of Regional EPS In Charge of LRMS
Name of Regional ADM Coordinator
Name of CID Chief
Name of Division EPS In Charge of LRMS
Name of Division ADM Coordinator
Printed in the Philippines by ________________________

Department of Education – Region IVA CALABARZON

Office Address: Gate 2, Karangalan Village,


Cainta, Rizal, Philippines
Telefax: 647-7487, 684-4914, 682-5773
E-mail Address: region4a@deped.gov.ph
CSS
Module 9:

Inspection and Testing of


Computer Networks
Configuration
Introductory Message
For the facilitator:

Welcome to the Computer Systems Servicing NC-II for Grade 11


Alternative Delivery Mode (ADM) module on Inspection and Testing of
Computer Networks Configuration

This module was collaboratively designed, developed and reviewed by educators


both from public and private institutions to assist you, the teacher or facilitator in
helping the learners meet the standards set by the K to 12 Curriculum while
overcoming their personal, social, and economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of
the module:

Notes to the Teacher


As a facilitator you are expected to orient the learners
on how to use this module. You also need to keep
track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are
expected to encourage and assist the learners as they
do the tasks included in the module.

4
For the learner:

Welcome to the Computer Systems Servicing NC-II Alternative Delivery Mode (ADM)
module on Inspection and Testing of Computer Networks Configuration!
The hand is one of the most symbolized part of the human body. It is often used to
depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a
learner is capable and empowered to successfully achieve the relevant
competencies and skills at your own pace and time. Your academic success lies in
your own hands!

This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner.

This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This is a brief drill or review to help you link


the current lesson with the previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such as a
story, a song, a poem, a problem opener, an
activity or a situation.

What is It This section provides a brief discussion of


the lesson. This aims to help you discover
and understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.

What I Have Learned This includes questions or blank


sentence/paragraph to be filled in to process
what you learned from the lesson.

5
What I Can Do This section provides an activity which will
help you transfer your new knowledge or
skill into real life situations or concerns.

Assessment This is a task which aims to evaluate your


level of mastery in achieving the learning
competency.

Additional Activities In this portion, another activity will be given


to you to enrich your knowledge or skill of
the lesson learned. This also tends retention
of learned concepts.

Answer Key This contains answers to all activities in the


module.

At the end of this module you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.

We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!

6
What I Need to Know

This module was designed and written with you in mind. It is here to help you
master the nature of Computer Systems Servicing NC-II. The scope of this module
permits it to be used in many different learning situations. The language used
recognizes the diverse vocabulary level of students. The lessons are arranged to
follow the standard sequence of the course. But the order in which you read them
can be changed to correspond with the textbook you are now using. The module is
divided into three lessons, namely:

This module is composed of the following contents:


1. network inspection procedures;
2. safe computer network operation; and
3. documentation procedures.

After going through this module, you are expected to:

1. inspect and test the configured computer networks:


(TLE_IACSS912SUCN-IIf-j-36):
1.1. undertake final inspection of the configuration to conform to the
manufacturer’s instructions/manual;
1.2. ensure the configuration conforms to the manufacturer’s
instructions/manual;
1.3. check computer networks to ensure safe operation;
1.4. prepare reports according to company requirements; and
1.5. complete reports according to company requirements.

7
What I Know

Pre-test. Multiple Choice.


Direction. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. Which of the following commands is used for checking the network connectivity
of two network devices?
a. IFCONFIG
b. PING
c. GETMAC
d. IPCONFIG

2. Which of the following is not a part of the PING result?


a. packet size
b. bandwidth
c. latency
d. IP of the replying computer

3. What type of network security must be used to reduce the number of users that
can connect on your network?
a. intrusion prevention system
b. firewall
c. behavioral analytics
d. access control

4. How many packets are being sent when you PING a device by using a windows
computer?
a. 6
b. 5
c. 4
d. 3

5. What is the maximum pulling tension for a 4 pair horizontal cables?


a. 28 lbf
b. 27 lbf
c. 26 lbf
d. 25 lbf

6. What type of network security must be used to assess the past activities being
processed of your network?
a. behavioral analytics
b. intrusion prevention system
c. firewall
d. access control

8
7. In network cabling, what is the length that needs to be maintained if you are
going to untwist the twisted pair wires of the UTP cables?
a. 0.375 inch
b. greater than 0.375 inch
c. less than 0.375 inch
d. none of these

8. Identity theft is an example of cybercrime. It is being done by getting your


personal information from the web, and by learning your internet activities such as
when and where you send messages. Later on, it pretends to be you. Studying your
messaging activities is more likely a form of what network attack?
a. release of message contents
b. modification of message
c. traffic analysis
d. denial of service

9. A bank sent you an e-mail, after a while, you received a duplicate message from
an unexpected sender. What kind of possible network attack is this?
a. replay
b. denial of service
c. passive attack
d. masquerade

10. This network attack happens when the network user can only read the message
intended for the other user, how do you call this attack? *
a. replay
b. active attack
c. passive attack
d. masquerade

11. A network user is unable to access the shared resources from other computer
in spite of having connectivity between the user’s computer and the computer that
shares resources, how was this possible?
a. checking network connectivity
b. checking physical connection
c. verifying network log on
d. checking network adapter settings

12. You are going to inspect the network cables installed on your network, if they
conformed to the cabling standards and if they installed properly, how are you
going to do this?
a. check network adapter settings
b. go to network connectivity
c. open network log on
d. check physical connection

13. Part of the contents of the network documentation are the position of network
devices on the network and how they are connected with each other. Describe this
kind of content in your network documentation.
a. It is on hardware directory
b. It can be located in IP allocation
c. Check software directory
d. Open Network Topology

9
14. We have several network attacks available in the digital world. If somebody was
pretending on the web as a legit service provider, how will you call this attack?
a. This is called a replay
b. It is part of denial of service
c. This is what we call modification of message
d. It is imbedded in a masquerade system

15. Checking the IP addresses of computers on a network is very important in


network documentation, because it is one of the contents needed to record on the
documentation report. How are you going to get the assigned IP address of the
computer?
a. checking network connectivity
b. verifying network log on
c. checking physical connection
d. checking network adapter settings

10
Lesson
Inspection and Testing of
1 Computer Networks Configuration

O
nce the network has been fully setup, a network technician needs to inspect
and test the network connectivity to ensure that it performs well based on
the needs of the organization or the owner of the network. To ensure the
safe operations of the network, the implementation of securities and best practices
are also part of the technician’s concern. 1

A proper documentation is also needed while doing an inspection to use the


recorded data, to come up with a good solution or improvement that may
implement in the future.

This lesson will guide you on how to inspect and test the configured networks,
network securities and how will you record all the details regarding with the
inspection and testing of the computer networks.

1
"Responsibilities Of The Network Administrator (System Administration Guide, Volume 3)",
Docs.Oracle.Com, 2020, https://docs.oracle.com/cd/E19455-01/806-
0916/6ja85398i/index.html.

11
What’s In

Let us review first on what you have learned on the previous module. On this
Word Search Puzzle, find the 12 words that are mentioned in the previous lesson.

Have you found all of them? Let’s try to differentiate them from one another. Please
provide a simple definition of using your own words of all the words you got, on the
same paper you have used. This will help your recall and review process from the
previous lesson.

12
What’s New

Before you proceed to the lesson’s discussion, try to complete this Mind
Map. There are various ways on how to test a computer network, having one
standard when doing a network testing can save you time and avoid repetitions of
some steps while doing the testing.

From the main idea in the center bubble namely Network Testing,
brainstorm related procedures that you think is part of the testing in the
connecting bubbles. Add details to the bubble connected to each idea. If you need
more space, draw your own bubbles and connections. Use a blank sheet of paper to
complete this activity.

Network Testing

You will be graded based on the following rubrics. You can get a highest possible
score of 20 points.
Criteria Excellent (4) Strong (3) Fair (2) Poor (1) Score
Ideas radiate out
Ideas provide a
from the center in Some ideas radiate Few ideas
complete picture
a clear picture out from the radiate out from
Structure with a high degree
that involves center but are not center. Not very
of imagination and
imagination and suitable to topic clear.
creativity
creativity
Clear and highly Ideas are arranged
Some ideas move Ideas are not
effective indication in order of
from most connected from
Exploratory of connection importance from
complex to most complex to
between ideas and most complex to
simplest. simplest
central image. simplest.
Good use of
Highly effective use keywords and
Key words are Limited use of
of keywords and images connected
Communicati used. Average keywords. Some
images and deep to central topic.
on understanding of images are not
understanding of Good
topic applicable.
topic. understanding of
topic.
Effective use of Some effort to use Little or no use
Clearly uses color,
Connections color, codes, or links color, codes or of color, codes,
codes, or links to
between to make meaningful links to show or links to show
show connections
Sections connections connections connections
between ideas.
between ideas. between ideas. between ideas.

13
Good or adequate Limited or
Highly effective Effective effort to
Extent of effort to connect ineffective effort
effort to connect connect main
Coverage main ideas to connect main
main ideas together. ideas together
together. ideas together.

Total

What is It

Since you have learned on how to configure a computer network from the
previous modules. It is now time to understand on how you will inspect a
configured computer network and how to create reports regarding network testing.

I. Network Inspection Procedures

Testing a computer network is an inspection conducted to provide the


network owner the information about the quality of service that the network can
provide. It is also done to make sure that the network configuration works based on
the plan.

Network testing usually divided into different stages:

1. Checking Physical Connection


2. Checking Network Adapter Settings
3. Checking Network Connectivity
4. Verifying Network Log On

A. Checking Physical Connection

On an Ethernet network that usually being setup with the use of either
CAT6 or CAT5e cable, is always important to monitor all parts of the cable
installation, from pulling to terminating the cable ends. There are so many
cases that the cable may fail due to different types of problems, such as
problems with installation, cable stretching, and cable failing to meet
manufacturer specifications. 2

i. Cable Installation Error


This error is commonly due to the installer allowing too much
untwisted cable at the termination point. Remember that the twist
on UTP cable must be maintained to less than 0.375 inch.

ii. Cable Stretching


It is important to avoid stretching UTP cable because doing so
changes the electrical characteristics of the cable, increasing the
attenuation and crosstalk. Maximum pulling tension for a 4 pair
horizontal cable is 25 lbf (pound force per inch).

2
Scott Lowe, "10 Things You Shouldn't Do When Running Network Cable", Techrepublic, 2020,
https://www.techrepublic.com/blog/10-things/10-things-you-shouldnt-do-when-running-network-cable/.

14
iii. Cable Failing to Meet Manufacturer Specifications
This error is due to a bad production run that causes the cable not
to meet minimum specifications. It can be noticed when repeated
test failures on the cable with no apparent cause. But this type of
error is very rare.

iv. Other common issues on Network’s Physical Connection


a. Open/Short: A cable may have a wire connection that is open or
shorted. This issue is most often associated with patch cables and
wall plates.
b. Incorrect cable type: This problem usually occurs when data
speeds increase and a cable is not designed to support the higher
data rate.
c. Bad port: When troubleshooting, it might be discovered that a
port is not “hot,” meaning that it is not connecting to the network.
You have to make sure the cable to the switch port is connected
and the cable link is good. Next, you need to verify that the switch
port or wall port is functional. If it isn’t, it needs to be replaced.
d. Bent pins: This condition can be associated with connectors on a
computer motherboard. If this does happen, you can carefully
straighten the cable pins with needle-nose pliers.

B. Checking Network Adapter Settings

After checking the installed cable, the next thing you need to do is to
check the network adapter settings. This is to make sure that you configure
to its right settings based on the given instruction manual.

The IPCONFIG Command


The fastest way to check the network adapter settings is to use the
IPCONFIG at the command prompt. The IPCONFIG is used to display
the IP address of a windows computer. It works like the IFCONFIG
command on Linux computers. To use the IPCONFIG,

1. Open the Run Window (Windows Logo Key + R). Type CMD
and click the OK button.

Figure 1 – The Run Window

2. Type IPCONFIG then press Enter on the keyboard.

15
Figure 2 – IPCONFIG command
C. Checking Network Connectivity

Sometimes when computers are connected on a connection point, such


as a network switch or an access point, it doesn’t mean that they are all
belong to the same network. Maybe they are connected on one device but
there are some cases that they are connected on different networks. To make
sure that they belong to the same network the network connectivity testing
must be perform.

The PING Command


The PING is command that is use to check the connectivity of two or
more devices on the network. Using PING is also the first step in
troubleshooting network failure, because it can identify the source of
the problem. Aside from network connectivity testing it can be used also
for testing the network interface card, if it works properly, DNS issues
such as name resolution and for checking the internet connection.3

Ping operates by sending Internet Control Message Protocol (ICMP)


echo request packets to the target host and waiting for an ICMP echo
reply. The program reports errors, packet loss, and a statistical
summary of the results, typically including the minimum,
maximum, the mean round-trip times, and standard deviation
of the mean. To use the PING command:

1. Make sure that the computer is connected on network. The


image shows the topology of the network that will test the
connectivity.

Figure 3 – PC1 and PC2 connection

3
"How To Troubleshoot Network Connectivity Using Ping And Traceroute", A2hosting.Com, 2020,
https://www.a2hosting.com/kb/getting-started-guide/internet-and-networking/troubleshooting-network-
connectivity-with-ping-and-traceroute.

16
2. To check the connectivity of the two computers on the
network. On PC1, open the command prompt then type ping
192.168.0.2 and press Enter on the keyboard.

Figure 4 – The ping command

3. If the configuration on the two computers are correct. The


result of the ping should look like this.

Figure 5 – The Result of Ping Command

If ping test fails, the following message will display as the result.
1. Request timed out
2. Destination host unreachable
3. Transmit failed

PING can be done also on other devices such as the router, access
point or any device on the network that has an IP address.

D. Verifying Network Logon

After checking the connectivity of the computers on network. It is now


time to try if you can log on to the computers to check if they are able to
view and access their shared resources by other computers from the
network. To do that,

1. Open the Network window.

17
Figure 6 – Opening Network Window

2. Open the computer that you want view or access its shared
resources.

Figure 7 – The Network Window

3. If the Windows Security window appears on the screen. Enter the


User Name and Password of the computer that you want to access.

18
Figure 8 – Windows Security window

4. If you are able to view the shared resources of that computer it


means that you are able to use its shared resources because you can
log on to that computer from the network.

Figure 9 – PC1’s Shared Resources

Tip: To skip log on every time you open a computer on the network.
Turn Off the Password Protected Sharing on the Advanced
Sharing Settings of the computer.

II. Network Security

Network security is the process of taking preventative measures to protect


the underlying networking infrastructure from unauthorized access, misuse,
malfunction, modification, destruction or improper disclosure. 4

4
Josh Fruhlinger, "What Is Network Security? Definition, Methods, Jobs & Salaries", CSO Online,
2020, https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-
and-salaries.html.

19
A. Network Security Attack

A network attack can be defined as any method, process, or means


used to maliciously attempt to compromise network security.

Types of Network Attacks

1. Active Attacks

Active attacks involve some modification of the data stream or the


creation of a false stream, and can be subdivided into four categories
masquerade, replay, modification of messages, and denial of service.

Active Attacks Categories

a. Masquerade

Figure 10 – The hacker pretends to be the Service Provider

b. Replay

Figure 11 – Hacker retransmit the message from the Provider

20
c. Modification of Messages

Figure 12 – The message is being altered by the hacker

d. Denial of service

Figure 13 – The hacker interrupts the services of the provider

2. Passive Attacks

Passive attacks are in the nature of eavesdropping on, or


monitoring of transmissions. The goal of the attacker is to obtain
information that is being transmitted.

21
Two Types of Passive Attacks

a. Release of message contents

Figure 14 – The hackers reads the message sent by the sender

b. Traffic Analysis

Figure 15 – The hacker studies the activities of the sender

B. Network Security Types

There are many techniques in a network that can be used for


implementing security network system. The most common network security
systems are the following.

1. Access Control

Access control is the ability to limit and control the access to host
systems and applications via communications links. To achieve this,
each entity trying to gain access must first be identified, or
authenticated so that access rights can be tailored to the individual.

22
2. Application Security

Application security includes the hardware, software, and processes


that can be used to track and lock down application vulnerabilities that
attackers can use to infiltrate your network.

3. Firewalls

A firewall is a device or a software that can be an effective means of


protecting a local system or network of systems from network-based
security threats, while at the same time affording access to the outside
world via wide area networks and the Internet.

4. Virtual Private Networks (VPN)

A virtual private network encrypts the connection from an endpoint to


a network, often over the Internet. By using VPN, it authenticates the
communication between a device and a secure network, creating a
secure, encrypted “tunnel” across the open internet.

5. Behavioral Analytics

You should know what normal network behavior looks like, so that
you can spot anomalies or network breaches as they happen. Behavioral
analytics tools automatically identify activities that deviate from the
norm.

6. Wireless Security

Wireless networks are not as secure as wired


networks. Cybercriminals are increasingly targeting mobile devices and
apps. So, you need to control which devices can access into your
network.

7. Intrusion Prevention System

These systems scan network traffic to identify and block attacks, often
by correlating network activity signatures with databases of known
attack techniques.

III. Network Documentation

Network documentation is a technical record of the hardware, software,


servers, directory structure, user profiles, data, and how it all works together.
Network documents should include any information that helps administrators and
IT professionals to keep the network up and running smoothly. 5

There is no requirement that the records be kept in a bound notebook or


binder. Records may also be kept electronically. The records are kept in a secure

5
"Who Needs Network Documentation? Benefits And Best Practices | Lucidchart Blog",
Lucidchart.Com, 2020, https://www.lucidchart.com/blog/importance-of-network-documentation.

23
and accessible place. The most important is, when the information is needed it
must be easily accessible and can be understood.
A. Network Documentation Importance

1. To save time-consuming and research and recurring repair of


problems.
2. To provide consistency on the network among employees to eliminate
errors and problems.
3. For easily endorsement of information from the employee that will
leave to the newly hired employee.
4. For faster troubleshooting of network when errors occur.
5. To retain the old information that maybe useful for the future use
when you upgrade the network.

B. Network Documentation Contents

1. Network Topology

Network topology is a type of diagram that shows arrangement of


devices on the network physically and logically. It will give you an idea on
how your devices on the network are connected. It can also help you to
plan if you need to upgrade your network. A network topology also
includes the cable installation and wireless flow signals of your network.
2. Hardware Directory

This part of the documentation is the inventory of hardware


components of the network. It includes the physical addresses, serial
numbers and configurations.

3. Software Directory

It is the software inventory of your network. It can help you identify


where and how many software are installed on computers on the network
in case of auditing happens. It includes name of the software, software
license information, and computers they installed.

4. IP Address Allocation

It contains the list of IP address allocations whether an external or


internal IP. It is helpful in case you want to expand your network by
adding new devices. Documenting your allocation process gives you an
understanding of subnet size, subnet assignments, and the devices that
have been assigned to specific IP addresses or to a dynamic range of
addresses.

Some network documentations include recovery plan in case some of


the components fail and wi-fi diagram that contains the information
about SSIDs, network security keys and access points mapping.

After reading this lesson, do you think that you have created your cable
before, that conforms with the standard? Have you installed properly the network
cables that you used to connect different wired devices on your network? Did you
check your network based on the procedures from this lesson? Have you ever
experienced a network attack either a passive or an active attack before? Did you

24
implement any network security measures to protect your network? Do you have
an idea now on how will you document a network inspection and testing?

25
What’s More

Notes to the Teacher

This activity should be done inside the computer laboratory.


Prepare a computer network for this activity. Print this activity
sheet based on the number of computers on your network.
….inspection.
Independent Activity 1. Inspecting Network Computer
This activity will help you understand how to perform final inspection of the
configuration conforming the network standards. By using this inspection form,
perform a final inspection on the configured computers on the network.

Network Computer Inspection Form


Instruction: Fill out this form based on the configuration of the network. Put a
check (✓) on the box. In case the field is not applicable write N/A.
PC Name:
Workgroup Name:
Operating System:
System Type: □ 32 - bit □ 64 - bit
User Name:
Password:
Network Adapter Used: □ Ethernet/Wired □ Wi-Fi/Wireless
MAC Address:
Network Cable: (if applicable only)
Status Findings (if bad network cable)
□ Good □ Bad Cabling
□ Bad □ Stretched
□ Others: _____________________
IP Address:
□ Static □ Dynamic
□ Hard drive □ Printer/Scanner
Shared Resources:
□ File/Folder
Overall Findings/Recommendations:

26
You will be graded using the rubrics below in this activity. And you will be able to
have a highest possible score of 30 pts.
Indicators Excellent Good Fair Score
10 8 6
Organization Extremely well Organized. Somewhat
organized. Structure allows organized
Order & structure of to move through structure allows
information is content without to move through
compelling and flows confusion. Flows some of the
smoothly. Made all smoothly. content without
five of the form well. confusion. Flow is
sometimes
interrupted.
Content Thorough and Complete Shows some
insightful understanding of understanding of
understanding of the the activity the activity
activity
Ideas Insightful and well Ideas are Ideas are
considered ideas considered; more somewhat on
making possible than one topic; makes
solutions thoughtful some solutions
possible solutions
TOTAL

Process questions:
1. What are the things you have put into consideration upon performing
inspection?
2. How are you able to fulfill this activity?

Independent Assessment 1. Show the Flow


Good Job! Now you are familiar with inspecting network configurations, you
are now ready to take another assessment! Read the following instructions for your
next task.

Flowcharting is very essential to computing. It is very important for an ICT


student to learn how to create a flowchart because there is a field in computing
that requires a documentation regarding with algorithm. To refresh your knowledge
about flowcharting, draw a flowchart on how you completed the Network Computer
Inspection Form that you used on the previous activity.

You will be graded based on the following rubrics. You can get a highest
possible score of 16 points.
Criteria Excellent (4) Strong (3) Fair (2) Poor (1) Score

The flowchart The flowchart is


The flowchart is The flowchart is
includes all the missing three or
missing one step missing two steps
Steps steps of the more steps of
of the inspection of the inspection
inspection the inspection
process. process.
process. process.

27
The flowchart is
The flowchart is The flowchart is The flowchart is
not labeled or
accurately labeled accurately labeled labeled and has
does not provide
and is detailed and is detailed to some detail to
Vocabulary enough detail to
enough to provide provide some provide limited
demonstrate
understanding of understanding of understanding of
understanding of
the instructions. the instructions. the instructions.
the instructions.

The overall The overall


The overall appearance of the appearance of the
The flowchart is
appearance of the flowchart is flowchart is
difficult to
flowchart is somewhat somewhat
Readability interpret. It is
pleasing and easy pleasing and easy pleasing and easy
not logically set
to interpret. It is to interpret. It is to interpret. It is
out.
logically set out. somewhat logically not logically set
set out. out.

The images used Th images used


The image used to The images used
to demonstrate to demonstrate
demonstrate each to demonstrate
each of the steps each of the steps
of the steps are each of the steps
are mostly are not relevant
Shapes relevant and add are relevant and
relevant and and do not add
to the visual somewhat add to
somewhat add to to the visual
quality of the the visual quality
the visual quality quality of the
flowchart. of the flowchart.
of the flowchart. flowchart.

Total

Independent Activity 2. Inspecting Intermediary Device


Activity 1, helped you perform an inspection of computer configuration in
networking. In this activity, you will be using this inspection form to perform a final
inspection on the configured intermediary devices on the network. Intermediary
devices have been discussed in the previous module.
Intermediary Device Inspection Form
Instruction: Fill out this form based on the configuration of the intermediary
device. Put a check (✓) on the box. In case the field is not applicable write N/A.
□ Router □ Access Point
Equipment type: □ Modem □ Repeater/Extender
□ Others: __________________________
Serial Number:
IP Address (LAN):
MAC Address:
IP Address (WAN):
□ Static □ Dynamic
SSID:
Wireless Settings:
Network Security Key:
(if applicable only)
Firewall Settings:
□ Enabled □ Disabled
DHCP Settings: (if applicable only)
Status: □ Enabled □ Disabled
Starting IP Address:
Scope:
Ending IP Address:
Overall Findings/Recommendations:

28
You will be graded using the rubrics below in this activity. And you will be able to
have a highest possible score of 30 pts.
Indicators Excellent Good Fair Score
10 8 6
Organization Extremely well Organized. Somewhat
organized. Structure allows organized
Order & structure of to move through structure allows
information is content without to move through
compelling and flows confusion. Flows some of the
smoothly. Made all smoothly. content without
five of the forms well. confusion. Flow is
sometimes
interrupted.
Content Thorough and Complete Shows some
insightful understanding of understanding of
understanding of the the activity the activity
activity
Ideas Insightful and well Ideas are Ideas are
considered ideas considered; more somewhat on
making possible than one topic; makes
solutions thoughtful some solutions
possible solutions
TOTAL

Process questions:
1. Let’s recall what intermediary devices are. Can you name them?
2. What problems have you encountered in this activity?
3. How are you able to find a solution to that problem?

Independent Assessment 2. Evaluate IT


Based on the last activities, evaluate the network security of the configured
network that you test during the inspection by constructing an essay that will
discuss the implemented security measures on the network. You can also make a
graphic organizer, or any device that can help you finish this task. Do not forget
also to add recommendations that can be implemented later to improve the safety
of data and equipment of the configured network.

You will be graded based on the following rubrics. You can get a highest
possible score of 30 points.
Does Not Meet Score
Exceeds Expectations Meets Expectations
Criteria Expectations
(8-10 points) (4-7 points)
(1-3 points)
Has well-organized Has introduction, body
Paragraphs are poorly
introduction, body, and and conclusion
organized; some
conclusion paragraphs. paragraphs. Sequence
Structure, paragraphs may be
Sequence of paragraphs of paragraphs is logical
Organization, missing. Sequence of
is logical and transitional for the most part and
Coherence paragraphs is illogical
expressions are used to helps to make
and hinders document
allow easy navigation document navigation
navigation.
through the document. easy.

29
Ideas are described
Engaging, clear, elegant, adequately but some Ideas are not formulated
and concise description of refinement is missing. and described clearly;
ideas. Sentences are well Sentences are long-winded and
Focus, Clarity
formulated and use words occasionally hard to confusing sentences; does
that are appropriate for read but are mostly not focus on task/topic at
the task/topic at hand. focused on task/topic hand.
at hand.

Sentences are well- Sentences are generally Sentences are poorly


written; there are no well-written; there are written; there are
incorrect word choices few incorrect word numerous incorrect word
Mechanics
and the text is free of choices and errors in choices and errors in
error in grammar, grammar, punctuation grammar, punctuation
punctuation and spelling. and spelling. and spelling.

Total

30
What I Have Learned

Key Terms:
1. Network testing is computer network inspection conducted to provide the
network owner the information about the quality of service that the network
can provide.
2. Network testing is being done by checking the physical connection,
network adapter settings, network connectivity and network logon
verification.
3. IPCONFIG is a command used to display the IP address of a windows
computer. It is also a command used to display IP address of a computer
with linux operating system.
4. PING is a command that is used to check the connectivity of two or more
devices on the network.
5. Network Security is the process of taking preventive measure to protect the
underling networking infrastructure from unauthorized users.
6. Network attack can be defined as any method, process, or means used to
maliciously attempt to compromise network security.
7. Active attacks involve some modification of the data stream or the creation
of a false stream.
8. Masquerade is a type of an active attack where the hacker pretends to be
the sender of message from the service provider.
9. Replay is a type of an active attack where the receiver receives two the same
message.
10. Modification of message attack wherein the hacker altered the message.
11. Denial-of-service attack interrupts the services of the provider
12. Release of message contents is a type of passive attack where the hacker
reads the message sent by the sender.
13. Traffic analysis attack is being performed to learn the messaging activities
of the victim.
14. Access control is the ability to limit and control the access to host systems
and applications via communication links.
15. Application security includes the hardware, software, and processes that
can be used to track and lock down application vulnerabilities.
16. Firewall is a device or a software that can be an effective means of
protecting a local system or network systems from network threats.
17. Virtual Private Network encrypts the connection from an endpoint to a
network.
18. Behavioral analytics is a technique used for monitoring network activities
to detect irregularities.
19. Wireless security is used to limit the number of devices that can access
thru wireless connection.
20. Intrusion prevention system scans network traffic to identify and block
attacks.
21. Network documentation is a technical record of the hardware, software,
servers, directory structure, user profiles, data, and how it all works
together.

31
22. Network documentation contents include network topology, hardware
directory, software directory, IP address allocation, recovery plan, and
wi-fi diagrams.

What I Can Do

Inspect IT!
Now let’s test how much you have learned in inspecting and testing
configured computer networks. By using this template, check a computer network
configured by your classmate based on the network design given by your teacher.
Prepare a report of your network inspection by using the two templates from
Independent Activities and provide them a feedback regarding with the inspection
that you did on the network.
YES NO
Do all network cables installed on the network conform
with the standard?
Do all installed cables are not stretched?
Do all network devices used on the network have
connectivity with each other?
Do all network adapter settings are configured based on the
network design?
Do all computer names and workgroup names are
configured based on the network design?
Do all computers can log on to each other to access shared
resources?
Do all intermediary devices are configured as planned?

You will be graded based on the following rubrics. You can get a highest
possible score of 40 points.
Criteria Excellent (10) Strong (8) Fair (6) Poor (4) Score
Some of the tests Most of the tests
All tests were
Network were not were not Testing was not
completed
Testing completed completed done
successfully.
successfully. successfully

All data are All data are Some of the data Most of the data
Documentation documented documented with are not are not
properly. minor errors. documented. documented.

Demonstrates Demonstrates Demonstrates Did not


outstanding above average below average demonstrate
sensitivity in sensitivity in sensitivity in sensitivity in
Student evaluating evaluating evaluating evaluating
Support classmate’s work classmate’s work classmate’s work classmate’s work
and promotes and promotes and promotes and promotes
their positive self- their positive self- their positive self- their positive
concept. concept. concept. self-concept.

32
The learner
The learner does
constructs a valid The learner
not construct a
generalized constructs a valid
valid generalized
feedback about generalized
feedback about
the network feedback about
the network
Feedback testing and clearly the network
testing or
explains why the testing but some
constructs one
feedback is based details are not
that is not at all
on the result of supported by the
supported by the
data from the documents.
documents.
documents.

Total

Assessment

Post-test. Multiple Choice.


Direction. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
1. What type of network security must be used to reduce the number of users that
can connect on your network?
a. firewall
b. intrusion prevention system
c. access control
d. behavioral analytics

2. What is the maximum pulling tension for a 4 pair horizontal cables?


a. 25 lbf
b. 26 lbf
c. 27 lbf
d. 28 lbf

3. Which of the following commands is used for checking the network connectivity
of two network devices?
a. PING
b. IPCONFIG
c. IFCONFIG
d. GETMAC

4. In network cabling, what is the length that needs to be maintained if you are
going to untwist the twisted pair wires of the UTP cables?
a. less than 0.375 inch
b. greater than 0.375 inch
c. 0.375 inch
d. none of these

5. What type of network security must be used to assess the past activities being
processed of your network?
a. firewall
b. intrusion prevention system
c. access control
d. behavioral analytics

33
6. How many packets are being sent when you PING a device by using a windows
computer?
a. 3
b. 5
c. 4
d. 6

7. Which of the following is not a part of the PING result?


a. IP of the replying computer
b. bandwidth
c. packet size
d. latency

8. Somebody pretends on the web as a legit service provider. What kind of attack is
this?
a. masquerade
b. denial of service
c. replay
d. modification of message

9. The network user can only read the message intended for the other user, is a
type of network attack used by hackers. How are these called?
a. This is an attack for masquerades
b. This is an attack for active attacks
c. This is an attack for replays
d. This is an attack for passive attacks

10. Identity theft is an example of cybercrime. It is being done by getting your


personal information from the web and by learning your internet activities such as
when and where you send messages. Later on, it pretends to be you. Studying your
messaging activities is more likely a form of what network attack?
a. denial of service
b. modification of message
c. release of message contents
d. traffic analysis

11. This network is purely IP based. You are troubleshooting some IP connectivity
issues. You are using some of the command line utilities on a connected Win7 PC.
How will you display such result?
a. In the command prompt, type in Ping local host
b. In the command prompt, type Tracert local
c. In the command prompt, type Ipconfig -p
d. In the command prompt, type Ipconfig /all

12. Checking the IP addresses of computers on a network is very important in


network documentation, because it is one of the contents needed to record on the
documentation report. How are you going to get the assigned IP address of the
computer?
a. by checking physical connection
b. by checking network connectivity
c. by checking network adapter settings
d. by verifying network log on

34
13. A bank sent you an e-mail, a moment ago you received a duplicate message
from an unexpected sender. How is this possible?
a. it is because of masquerade
b. it is because of denial of service
c. it is because of replay
d. it is because of passive attack

14. Part of the contents of the network documentation are the position of network
devices on the network, and how they are connected with each other. How are you
going to describe this kind of content in your network documentation?
a. It can be called IP allocation
b. It is hardware directory
c. This is named Network Topology
d. It is software directory

15. If a network user is unable to access the shared resources from other computer
in spite of having connectivity between the user’s computer and the computer that
shares resources, how are you going to resolve this?
a. checking physical connection
b. checking network connectivity
c. checking network adapter settings
d. verifying network log on

Additional Activities

Draw IT!
Scenario: You were asked by a customer to setup a computer network for
his\her computer shop with 50 desktop computers, 2 network switches (24
ports), a router, an ISP modem, a multi-purpose printer and an access point to
provide Free Wi-Fi access for their customers.

How are you going to plan it by constructing a network topology?

In designing your network topology, you can draw it on a sheet of paper or


by using any network designing software tool available on the internet or in your
school. Submit the digital copy of your work to the Messenger Account of your
teacher if you are unable to submit it personally.

You will be graded based on the following rubrics. You can get a highest
possible score of 20 points.
Criteria Excellent (4) Strong (3) Fair (2) Poor (1) Score

Topology The topology graphic The layouts were The layouts lack The layout is
Graphics was eye catching. presentable. designs done poorly

35
Few labels are Most of the labels
Labels Complete Label No labels
missing are missing

5 or less 11 or more
All equipment from 6 to 10 equipment
equipment from equipment from
the scenario are from the scenario
Equipment the scenario are the scenario are
presented on the are not presented
not presented on not presented on
network topology. on the topology.
the topology. the topology.

Completed Completed
Completed
Completed topology topology is neat, topology is
Neatness topology is more
is very neat. with some parts extremely
messy than neat
less neat. messy.

Most of the
Some of the
connections used
All connections from connections from No connections
from the topology
Connection the topology are the topology were presented on the
were not
presented properly. not presented topology.
presented
properly.
properly.
Total

36

You might also like