Module 9 CSS G11 2nd Sem
Module 9 CSS G11 2nd Sem
Servicing NC-II
Module 9:
Inspection and Testing of
Computer Networks
Configuration
Computer Systems Servicing NC-II
Alternative Delivery Mode
Module 9: Inspection and Testing of Computer Networks Configuration
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of
the module:
4
For the learner:
Welcome to the Computer Systems Servicing NC-II Alternative Delivery Mode (ADM)
module on Inspection and Testing of Computer Networks Configuration!
The hand is one of the most symbolized part of the human body. It is often used to
depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a
learner is capable and empowered to successfully achieve the relevant
competencies and skills at your own pace and time. Your academic success lies in
your own hands!
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.
5
What I Can Do This section provides an activity which will
help you transfer your new knowledge or
skill into real life situations or concerns.
1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.
We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!
6
What I Need to Know
This module was designed and written with you in mind. It is here to help you
master the nature of Computer Systems Servicing NC-II. The scope of this module
permits it to be used in many different learning situations. The language used
recognizes the diverse vocabulary level of students. The lessons are arranged to
follow the standard sequence of the course. But the order in which you read them
can be changed to correspond with the textbook you are now using. The module is
divided into three lessons, namely:
7
What I Know
1. Which of the following commands is used for checking the network connectivity
of two network devices?
a. IFCONFIG
b. PING
c. GETMAC
d. IPCONFIG
3. What type of network security must be used to reduce the number of users that
can connect on your network?
a. intrusion prevention system
b. firewall
c. behavioral analytics
d. access control
4. How many packets are being sent when you PING a device by using a windows
computer?
a. 6
b. 5
c. 4
d. 3
6. What type of network security must be used to assess the past activities being
processed of your network?
a. behavioral analytics
b. intrusion prevention system
c. firewall
d. access control
8
7. In network cabling, what is the length that needs to be maintained if you are
going to untwist the twisted pair wires of the UTP cables?
a. 0.375 inch
b. greater than 0.375 inch
c. less than 0.375 inch
d. none of these
9. A bank sent you an e-mail, after a while, you received a duplicate message from
an unexpected sender. What kind of possible network attack is this?
a. replay
b. denial of service
c. passive attack
d. masquerade
10. This network attack happens when the network user can only read the message
intended for the other user, how do you call this attack? *
a. replay
b. active attack
c. passive attack
d. masquerade
11. A network user is unable to access the shared resources from other computer
in spite of having connectivity between the user’s computer and the computer that
shares resources, how was this possible?
a. checking network connectivity
b. checking physical connection
c. verifying network log on
d. checking network adapter settings
12. You are going to inspect the network cables installed on your network, if they
conformed to the cabling standards and if they installed properly, how are you
going to do this?
a. check network adapter settings
b. go to network connectivity
c. open network log on
d. check physical connection
13. Part of the contents of the network documentation are the position of network
devices on the network and how they are connected with each other. Describe this
kind of content in your network documentation.
a. It is on hardware directory
b. It can be located in IP allocation
c. Check software directory
d. Open Network Topology
9
14. We have several network attacks available in the digital world. If somebody was
pretending on the web as a legit service provider, how will you call this attack?
a. This is called a replay
b. It is part of denial of service
c. This is what we call modification of message
d. It is imbedded in a masquerade system
10
Lesson
Inspection and Testing of
1 Computer Networks Configuration
O
nce the network has been fully setup, a network technician needs to inspect
and test the network connectivity to ensure that it performs well based on
the needs of the organization or the owner of the network. To ensure the
safe operations of the network, the implementation of securities and best practices
are also part of the technician’s concern. 1
This lesson will guide you on how to inspect and test the configured networks,
network securities and how will you record all the details regarding with the
inspection and testing of the computer networks.
1
"Responsibilities Of The Network Administrator (System Administration Guide, Volume 3)",
Docs.Oracle.Com, 2020, https://docs.oracle.com/cd/E19455-01/806-
0916/6ja85398i/index.html.
11
What’s In
Let us review first on what you have learned on the previous module. On this
Word Search Puzzle, find the 12 words that are mentioned in the previous lesson.
Have you found all of them? Let’s try to differentiate them from one another. Please
provide a simple definition of using your own words of all the words you got, on the
same paper you have used. This will help your recall and review process from the
previous lesson.
12
What’s New
Before you proceed to the lesson’s discussion, try to complete this Mind
Map. There are various ways on how to test a computer network, having one
standard when doing a network testing can save you time and avoid repetitions of
some steps while doing the testing.
From the main idea in the center bubble namely Network Testing,
brainstorm related procedures that you think is part of the testing in the
connecting bubbles. Add details to the bubble connected to each idea. If you need
more space, draw your own bubbles and connections. Use a blank sheet of paper to
complete this activity.
Network Testing
You will be graded based on the following rubrics. You can get a highest possible
score of 20 points.
Criteria Excellent (4) Strong (3) Fair (2) Poor (1) Score
Ideas radiate out
Ideas provide a
from the center in Some ideas radiate Few ideas
complete picture
a clear picture out from the radiate out from
Structure with a high degree
that involves center but are not center. Not very
of imagination and
imagination and suitable to topic clear.
creativity
creativity
Clear and highly Ideas are arranged
Some ideas move Ideas are not
effective indication in order of
from most connected from
Exploratory of connection importance from
complex to most complex to
between ideas and most complex to
simplest. simplest
central image. simplest.
Good use of
Highly effective use keywords and
Key words are Limited use of
of keywords and images connected
Communicati used. Average keywords. Some
images and deep to central topic.
on understanding of images are not
understanding of Good
topic applicable.
topic. understanding of
topic.
Effective use of Some effort to use Little or no use
Clearly uses color,
Connections color, codes, or links color, codes or of color, codes,
codes, or links to
between to make meaningful links to show or links to show
show connections
Sections connections connections connections
between ideas.
between ideas. between ideas. between ideas.
13
Good or adequate Limited or
Highly effective Effective effort to
Extent of effort to connect ineffective effort
effort to connect connect main
Coverage main ideas to connect main
main ideas together. ideas together
together. ideas together.
Total
What is It
Since you have learned on how to configure a computer network from the
previous modules. It is now time to understand on how you will inspect a
configured computer network and how to create reports regarding network testing.
On an Ethernet network that usually being setup with the use of either
CAT6 or CAT5e cable, is always important to monitor all parts of the cable
installation, from pulling to terminating the cable ends. There are so many
cases that the cable may fail due to different types of problems, such as
problems with installation, cable stretching, and cable failing to meet
manufacturer specifications. 2
2
Scott Lowe, "10 Things You Shouldn't Do When Running Network Cable", Techrepublic, 2020,
https://www.techrepublic.com/blog/10-things/10-things-you-shouldnt-do-when-running-network-cable/.
14
iii. Cable Failing to Meet Manufacturer Specifications
This error is due to a bad production run that causes the cable not
to meet minimum specifications. It can be noticed when repeated
test failures on the cable with no apparent cause. But this type of
error is very rare.
After checking the installed cable, the next thing you need to do is to
check the network adapter settings. This is to make sure that you configure
to its right settings based on the given instruction manual.
1. Open the Run Window (Windows Logo Key + R). Type CMD
and click the OK button.
15
Figure 2 – IPCONFIG command
C. Checking Network Connectivity
3
"How To Troubleshoot Network Connectivity Using Ping And Traceroute", A2hosting.Com, 2020,
https://www.a2hosting.com/kb/getting-started-guide/internet-and-networking/troubleshooting-network-
connectivity-with-ping-and-traceroute.
16
2. To check the connectivity of the two computers on the
network. On PC1, open the command prompt then type ping
192.168.0.2 and press Enter on the keyboard.
If ping test fails, the following message will display as the result.
1. Request timed out
2. Destination host unreachable
3. Transmit failed
PING can be done also on other devices such as the router, access
point or any device on the network that has an IP address.
17
Figure 6 – Opening Network Window
2. Open the computer that you want view or access its shared
resources.
18
Figure 8 – Windows Security window
Tip: To skip log on every time you open a computer on the network.
Turn Off the Password Protected Sharing on the Advanced
Sharing Settings of the computer.
4
Josh Fruhlinger, "What Is Network Security? Definition, Methods, Jobs & Salaries", CSO Online,
2020, https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-
and-salaries.html.
19
A. Network Security Attack
1. Active Attacks
a. Masquerade
b. Replay
20
c. Modification of Messages
d. Denial of service
2. Passive Attacks
21
Two Types of Passive Attacks
b. Traffic Analysis
1. Access Control
Access control is the ability to limit and control the access to host
systems and applications via communications links. To achieve this,
each entity trying to gain access must first be identified, or
authenticated so that access rights can be tailored to the individual.
22
2. Application Security
3. Firewalls
5. Behavioral Analytics
You should know what normal network behavior looks like, so that
you can spot anomalies or network breaches as they happen. Behavioral
analytics tools automatically identify activities that deviate from the
norm.
6. Wireless Security
These systems scan network traffic to identify and block attacks, often
by correlating network activity signatures with databases of known
attack techniques.
5
"Who Needs Network Documentation? Benefits And Best Practices | Lucidchart Blog",
Lucidchart.Com, 2020, https://www.lucidchart.com/blog/importance-of-network-documentation.
23
and accessible place. The most important is, when the information is needed it
must be easily accessible and can be understood.
A. Network Documentation Importance
1. Network Topology
3. Software Directory
4. IP Address Allocation
After reading this lesson, do you think that you have created your cable
before, that conforms with the standard? Have you installed properly the network
cables that you used to connect different wired devices on your network? Did you
check your network based on the procedures from this lesson? Have you ever
experienced a network attack either a passive or an active attack before? Did you
24
implement any network security measures to protect your network? Do you have
an idea now on how will you document a network inspection and testing?
25
What’s More
26
You will be graded using the rubrics below in this activity. And you will be able to
have a highest possible score of 30 pts.
Indicators Excellent Good Fair Score
10 8 6
Organization Extremely well Organized. Somewhat
organized. Structure allows organized
Order & structure of to move through structure allows
information is content without to move through
compelling and flows confusion. Flows some of the
smoothly. Made all smoothly. content without
five of the form well. confusion. Flow is
sometimes
interrupted.
Content Thorough and Complete Shows some
insightful understanding of understanding of
understanding of the the activity the activity
activity
Ideas Insightful and well Ideas are Ideas are
considered ideas considered; more somewhat on
making possible than one topic; makes
solutions thoughtful some solutions
possible solutions
TOTAL
Process questions:
1. What are the things you have put into consideration upon performing
inspection?
2. How are you able to fulfill this activity?
You will be graded based on the following rubrics. You can get a highest
possible score of 16 points.
Criteria Excellent (4) Strong (3) Fair (2) Poor (1) Score
27
The flowchart is
The flowchart is The flowchart is The flowchart is
not labeled or
accurately labeled accurately labeled labeled and has
does not provide
and is detailed and is detailed to some detail to
Vocabulary enough detail to
enough to provide provide some provide limited
demonstrate
understanding of understanding of understanding of
understanding of
the instructions. the instructions. the instructions.
the instructions.
Total
28
You will be graded using the rubrics below in this activity. And you will be able to
have a highest possible score of 30 pts.
Indicators Excellent Good Fair Score
10 8 6
Organization Extremely well Organized. Somewhat
organized. Structure allows organized
Order & structure of to move through structure allows
information is content without to move through
compelling and flows confusion. Flows some of the
smoothly. Made all smoothly. content without
five of the forms well. confusion. Flow is
sometimes
interrupted.
Content Thorough and Complete Shows some
insightful understanding of understanding of
understanding of the the activity the activity
activity
Ideas Insightful and well Ideas are Ideas are
considered ideas considered; more somewhat on
making possible than one topic; makes
solutions thoughtful some solutions
possible solutions
TOTAL
Process questions:
1. Let’s recall what intermediary devices are. Can you name them?
2. What problems have you encountered in this activity?
3. How are you able to find a solution to that problem?
You will be graded based on the following rubrics. You can get a highest
possible score of 30 points.
Does Not Meet Score
Exceeds Expectations Meets Expectations
Criteria Expectations
(8-10 points) (4-7 points)
(1-3 points)
Has well-organized Has introduction, body
Paragraphs are poorly
introduction, body, and and conclusion
organized; some
conclusion paragraphs. paragraphs. Sequence
Structure, paragraphs may be
Sequence of paragraphs of paragraphs is logical
Organization, missing. Sequence of
is logical and transitional for the most part and
Coherence paragraphs is illogical
expressions are used to helps to make
and hinders document
allow easy navigation document navigation
navigation.
through the document. easy.
29
Ideas are described
Engaging, clear, elegant, adequately but some Ideas are not formulated
and concise description of refinement is missing. and described clearly;
ideas. Sentences are well Sentences are long-winded and
Focus, Clarity
formulated and use words occasionally hard to confusing sentences; does
that are appropriate for read but are mostly not focus on task/topic at
the task/topic at hand. focused on task/topic hand.
at hand.
Total
30
What I Have Learned
Key Terms:
1. Network testing is computer network inspection conducted to provide the
network owner the information about the quality of service that the network
can provide.
2. Network testing is being done by checking the physical connection,
network adapter settings, network connectivity and network logon
verification.
3. IPCONFIG is a command used to display the IP address of a windows
computer. It is also a command used to display IP address of a computer
with linux operating system.
4. PING is a command that is used to check the connectivity of two or more
devices on the network.
5. Network Security is the process of taking preventive measure to protect the
underling networking infrastructure from unauthorized users.
6. Network attack can be defined as any method, process, or means used to
maliciously attempt to compromise network security.
7. Active attacks involve some modification of the data stream or the creation
of a false stream.
8. Masquerade is a type of an active attack where the hacker pretends to be
the sender of message from the service provider.
9. Replay is a type of an active attack where the receiver receives two the same
message.
10. Modification of message attack wherein the hacker altered the message.
11. Denial-of-service attack interrupts the services of the provider
12. Release of message contents is a type of passive attack where the hacker
reads the message sent by the sender.
13. Traffic analysis attack is being performed to learn the messaging activities
of the victim.
14. Access control is the ability to limit and control the access to host systems
and applications via communication links.
15. Application security includes the hardware, software, and processes that
can be used to track and lock down application vulnerabilities.
16. Firewall is a device or a software that can be an effective means of
protecting a local system or network systems from network threats.
17. Virtual Private Network encrypts the connection from an endpoint to a
network.
18. Behavioral analytics is a technique used for monitoring network activities
to detect irregularities.
19. Wireless security is used to limit the number of devices that can access
thru wireless connection.
20. Intrusion prevention system scans network traffic to identify and block
attacks.
21. Network documentation is a technical record of the hardware, software,
servers, directory structure, user profiles, data, and how it all works
together.
31
22. Network documentation contents include network topology, hardware
directory, software directory, IP address allocation, recovery plan, and
wi-fi diagrams.
What I Can Do
Inspect IT!
Now let’s test how much you have learned in inspecting and testing
configured computer networks. By using this template, check a computer network
configured by your classmate based on the network design given by your teacher.
Prepare a report of your network inspection by using the two templates from
Independent Activities and provide them a feedback regarding with the inspection
that you did on the network.
YES NO
Do all network cables installed on the network conform
with the standard?
Do all installed cables are not stretched?
Do all network devices used on the network have
connectivity with each other?
Do all network adapter settings are configured based on the
network design?
Do all computer names and workgroup names are
configured based on the network design?
Do all computers can log on to each other to access shared
resources?
Do all intermediary devices are configured as planned?
You will be graded based on the following rubrics. You can get a highest
possible score of 40 points.
Criteria Excellent (10) Strong (8) Fair (6) Poor (4) Score
Some of the tests Most of the tests
All tests were
Network were not were not Testing was not
completed
Testing completed completed done
successfully.
successfully. successfully
All data are All data are Some of the data Most of the data
Documentation documented documented with are not are not
properly. minor errors. documented. documented.
32
The learner
The learner does
constructs a valid The learner
not construct a
generalized constructs a valid
valid generalized
feedback about generalized
feedback about
the network feedback about
the network
Feedback testing and clearly the network
testing or
explains why the testing but some
constructs one
feedback is based details are not
that is not at all
on the result of supported by the
supported by the
data from the documents.
documents.
documents.
Total
Assessment
3. Which of the following commands is used for checking the network connectivity
of two network devices?
a. PING
b. IPCONFIG
c. IFCONFIG
d. GETMAC
4. In network cabling, what is the length that needs to be maintained if you are
going to untwist the twisted pair wires of the UTP cables?
a. less than 0.375 inch
b. greater than 0.375 inch
c. 0.375 inch
d. none of these
5. What type of network security must be used to assess the past activities being
processed of your network?
a. firewall
b. intrusion prevention system
c. access control
d. behavioral analytics
33
6. How many packets are being sent when you PING a device by using a windows
computer?
a. 3
b. 5
c. 4
d. 6
8. Somebody pretends on the web as a legit service provider. What kind of attack is
this?
a. masquerade
b. denial of service
c. replay
d. modification of message
9. The network user can only read the message intended for the other user, is a
type of network attack used by hackers. How are these called?
a. This is an attack for masquerades
b. This is an attack for active attacks
c. This is an attack for replays
d. This is an attack for passive attacks
11. This network is purely IP based. You are troubleshooting some IP connectivity
issues. You are using some of the command line utilities on a connected Win7 PC.
How will you display such result?
a. In the command prompt, type in Ping local host
b. In the command prompt, type Tracert local
c. In the command prompt, type Ipconfig -p
d. In the command prompt, type Ipconfig /all
34
13. A bank sent you an e-mail, a moment ago you received a duplicate message
from an unexpected sender. How is this possible?
a. it is because of masquerade
b. it is because of denial of service
c. it is because of replay
d. it is because of passive attack
14. Part of the contents of the network documentation are the position of network
devices on the network, and how they are connected with each other. How are you
going to describe this kind of content in your network documentation?
a. It can be called IP allocation
b. It is hardware directory
c. This is named Network Topology
d. It is software directory
15. If a network user is unable to access the shared resources from other computer
in spite of having connectivity between the user’s computer and the computer that
shares resources, how are you going to resolve this?
a. checking physical connection
b. checking network connectivity
c. checking network adapter settings
d. verifying network log on
Additional Activities
Draw IT!
Scenario: You were asked by a customer to setup a computer network for
his\her computer shop with 50 desktop computers, 2 network switches (24
ports), a router, an ISP modem, a multi-purpose printer and an access point to
provide Free Wi-Fi access for their customers.
You will be graded based on the following rubrics. You can get a highest
possible score of 20 points.
Criteria Excellent (4) Strong (3) Fair (2) Poor (1) Score
Topology The topology graphic The layouts were The layouts lack The layout is
Graphics was eye catching. presentable. designs done poorly
35
Few labels are Most of the labels
Labels Complete Label No labels
missing are missing
5 or less 11 or more
All equipment from 6 to 10 equipment
equipment from equipment from
the scenario are from the scenario
Equipment the scenario are the scenario are
presented on the are not presented
not presented on not presented on
network topology. on the topology.
the topology. the topology.
Completed Completed
Completed
Completed topology topology is neat, topology is
Neatness topology is more
is very neat. with some parts extremely
messy than neat
less neat. messy.
Most of the
Some of the
connections used
All connections from connections from No connections
from the topology
Connection the topology are the topology were presented on the
were not
presented properly. not presented topology.
presented
properly.
properly.
Total
36