Css 9 q2 w4 5 Mod3 Set Network Configuration
Css 9 q2 w4 5 Mod3 Set Network Configuration
9
Technical Vocational Education
Computer Systems Servicing
Quarter 2-Week 4-5-Module 3
Set Network Configuration
SPTVE_CSYS9- SUCNIIc-e-6
English – Grade 7
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Management Team:
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II
Introductory Message
For the Facilitator:
This module was collaboratively designed, developed and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the module:
As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners9 progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage and the learners as they do the tasks included
in the module.
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don9t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!
5
89
Pre-Test:
Direction: Write the letter of the correct answer in your answer sheet.
1. It refers to the layout or structure of the network about the flow of data.
a. Ethernet c. Topology
b. Network d. WAN
2. The most commonly applied topology uses a central device(hub) with cables
extending in all directions.
a. Hybrid Topology c. Linear Bus Topology
b. Ring Topology d. Star Topology
8. A device that physically connects each computer to the network and allows your
computer to talk to other computers and devices on the network.
a. DHCP c. Network Interface Card (NIC)
b. IP address d. Subnet Mask
Directions: Arrange the jumbled letter to arrange the following word(s). Write
your answer in your answer sheet.
3. S T U D K A M S – is used to cover the mouth and nose from tiny particles when
cleaning computer peripherals. ______________________________
Directions: Identify the type of topology by arranging the scrambled letters to get the
correct type of topology. Write your answer in your answer sheet.
S A T R TOPOLOGY E A N L I U B S TOPOLOGY
1. ________________________ 2. ________________________
N G R I TOPOLOGY D I H Y B R TOPOLOGY
3. ________________________ 4. ________________________
H E M S TOPOLOGY
5. ________________________
COMMON TOPOLOGIES:
1. Star Topology
➢ The most commonly applied
topology.
➢ Uses a central device (hub/switch)
with cables extending in all
directions.
➢ Each device requires a single cable
point-to-point connection between
the device and hub.
3. Ring Topology
➢ It is consists of several computers
joined together to form a circle.
➢ Data moves from one computer to
the next in one direction only.
➢ Any data or messages will pass
through adjacent nodes until it
reaches the target node.
4. Hybrid Topology
➢ A combination of different types of
topology used in a network system
to adapt to the different designs of
floors or rooms in a building.
5. Mesh Topology
➢ Each computer connects to every
other.
➢ High level of redundancy.
➢ Rarely used
➢ Wiring is very complicated
➢ Cabling cost is high
Sometimes when the problem with a system is not totally apparent and the problem
may be intermittent, using a basic common diagnostic procedure may help
determine what is wrong. This procedure has a number of steps that, if followed
each time, can be of help.
Troubleshooting Techniques:
IP address
➢ is a number that is used to identify a device on the network. Each device on a
network must have a unique IP address to communicate with other network
devices.
➢ it is consisting of a series of 32 binary bits (1s and 0s). It is very difficult for
humans to read a binary IP address. For this reason, the 32 bits are grouped
into four 8-bit bytes called octets.
➢ an IP address, even in this grouped format, is hard for humans to read, write,
and remember. Therefore, each octet is presented as its decimal value,
separated by a decimal point or period. This format is called dotted-decimal
notation.
Take Note:
12
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP address,
a subnet mask is a dotted-decimal number. Usually, all hosts within a LAN use the same
subnet mask.
Table 3 shows default subnet masks for usable IP addresses that are mapped to the
first three classes of IP addresses:
➢ 255.0.0.0: Class A - which indicates that the first octet of the IP address is the network
portion
➢ 255.255.0.0: Class B - which indicates that the first two octets of the IP address are
the network portion
➢ 255.255.255.0: Class C - which indicates that the first three octets of the IP address
are the network portion
13
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog box appears.
15
5. Additional time
➢ In some cases, it may take a computer some additional time to detect or see the
network. If after booting the computer you are unable to see the network, give the
computer 2-3 minutes to detect the network. Windows users may also want to try
pressing the F5 (refresh) key when in Network Neighborhood to refresh the
network connections and possibly detect the network
6. Additional troubleshooting
➢ If after following or verifying the above recommendations you are still unable to
connect or see the network, and if you have installed or are using TCP/IP as your
protocol you can ping another computer's IP address to verify if the computer can
send and receive data.
Once at the prompt assuming, that the address of the computer you wish to ping
is 102.55.92.2, you would type: ping 102.55.92.2
Activity 1:
Directions: Identify the troubleshooting techniques for the network system as stated
below. Write the letter of the correct answer only in your answer sheet.
16
Independent Activity 1:
Instructions:
Independent Assessment 1:
Directions: Determine the given topologies below. Write ST if it's a Star Topology;
LBT if it is a Linear Bus Topology; RT for Ring Topology; and MT if it is a Mesh
Topology. Write your answer in your answer sheet.
1. ___ A terminator is placed at each end of the backbone to keep the signals from
bouncing back and being received again by the nodes in the network.
2. ___ Any data or messages will pass through adjacent nodes until it reaches the
target node.
3. ___ Data moves from one computer to the next in one direction only.
4. ___ Each computer connects to every other.
5. ___ Each device requires a single cable point-to-point connection between the
device and hub.
6. ___ It is consists of several computers joined together to form a circle.
7. ___ The most commonly applied topology.
8. ___ Uses a central device (hub/switch) with cables extending in all directions.
9. ___ Uses one long cable, referred to as backbone, to which computers and other
devices are attached.
10. ___ Wiring is very complicated.
17
Independent Activity 2:
Instructions: Match the Five(5) Classes of IP Addresses to their purpose in
alphabetical order. Write only the letter of the correct answer inside the table.
A. Class E
B. Used for special use for multicasting IP Classes Purpose
C. Class D
D. Used for small networks, implemented by ISPs 1. _____ 6. _____
for customer subscriptions
E. Class C 2. _____ 7. _____
F. Used for medium-sized networks, implemented
by universities 3. _____ 8. _____
G. Class B
H. Used for large networks, implemented by large 4. _____ 9. _____
companies and some countries
I. Class A 5. _____ 10. _____
J. Used for experimental testing
Independent Assessment 2:
Directions: Arrange the steps in Assigning a static IP Address chronologically using
the numbers. Write your answer in your answer sheet.
18
Independent Activity 3:
Directions: Supply the missing column by choosing the correct answer inside the
box. Write your answer inside the table.
Independent Assessment 3:
Directions: Write T if the statement causes network problems and F if it is false. Write
your answer in your answer sheet.
1. How does topology help you when it comes to computer network systems?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
19
2. Which of the following type of topology is commonly used in a computer laboratory room?
Why do you think so?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________.
Instructions:
]\
Post Test:
Direction: Write the letter of the correct answer in your answer sheet.
1. It refers to the layout or structure of the network about the flow of data.
a. Ethernet c. Topology
b. Network d. WAN
2. The most commonly applied topology uses a central device(hub) with cables
extending in all directions.
a. Hybrid Topology c. Linear Bus Topology
b. Ring Topology d. Star Topology
8. A device that physically connects each computer to the network and allows your
computer to talk to other computers and devices on the network.
a. DHCP c. Network Interface Card (NIC)
b. IP address d. Subnet Mask
Instructions:
21
References
Ronaldo V. Ramilo And Deover M. Pasco<K to 12 Basic Education Curriculum- Technology
and Livelihood EducationLearning Module –Computer Hardware Servicing=
http://www.depedbataan.com/resources/9/k_to_12_entrep
based_pc_hardware_servicing_learning_module.pdf
Fundamentals of PC repair
http://www.ustudy.in/ce/hard/u1
JENIELLE SISON – Computer hardware servicing module
https://www.academia.edu/22093398/COMPUTER_HARDWARE_SERVICING_ICTCOMPU
TER_HARDWARE_SERVICING
https://www.geeksforgeeks.org/advantages-and-disadvantages-of-computer-networking/
24
25