tle10_ict_css_q3_module3
tle10_ict_css_q3_module3
Technology and 10
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 3 - Module 3
Set Network Configuration
1
Technology and Livelihood Education Grade 10
Information and Communications Technology - Computer Systems Servicing
Alternative Delivery Mode
Quarter 3 - Module 3: Network Configuration
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalty.
Borrowed materials (i.e., pictures, photos, brand names, trademarks, etc.) included in
this book are owned by their respective copyright holders. Every effort has been exerted to
locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
2
Lesson
1 NETWORK
What’s New
NETWORK
A network consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
There are two basic types of networks which includes the following:
Wide Area Networks (WANs) connect larger geographic areas, such as Florida,
the United States, or the world. Dedicated transoceanic cabling or satellite uplinks
may be used to connect this type of network.
Networking Devices
Consist of, but are not limited to non-local printers, workstations, servers,
webcams, data loggers, instruments, dial-in devices, and, in general anything that
requires an Ethernet connection. These devices are supported on a best-effort basis
limited by the staffing and equipment level available.
3
types including USB hubs also exist, but Ethernet is the type traditionally used in
home networking.
4
network (home, school, business intranet) against malicious access from the outside.
Network firewalls may also be configured to limit access to the outside from internal
users.
Direction: Identify what is being described in the following sentences and write your
answer on a separate sheet of paper.
What’s More
Now, that you are done with the introduction of network as well as the
networking devices, to enlighten your understanding and knowledge have some
more readings about it thru books and other resources. You should consider the
following topics for research:
After the research, you can also deepen your understanding by watching a
video presentation using the URL below:
5
https://www.youtube.com/watch?v=YqRHaR-OQVQ
https://www.youtube.com/watch?v=4nPnQVaRj4k
1. List down all the network devices and their advantages cited in the
video.
2. List down the different network topologies and their differences.
6
Lesson
2 IP Addressing
What Is It
IP Addressing
A person’s name and fingerprints usually do not change. They provide a label
or address for the person’s physical aspect—the body. A person’s mailing address,
on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Media Access Control (MAC) address is assigned to the
host Network Interface Card (NIC) and is known as the physical address. The
physical address remains the same regardless of where the host is placed on the
network in the same way that fingerprints remain with someone regardless of where
he or she goes.
7
Table: Five Classes of IP Address
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address is the
network portion
255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion
Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are
reserved for research use only.
IpConfig
8
Figure: Command Prompt Window
3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be useful
because it shows the IP address, subnet mask and default gateway of a network you
are connected to.
9
In a home network with several computers and devices, it is ideal to assign
each of them a specific address. This is for the purpose of avoiding problems when
you do troubleshooting which requires figuring out the IP address of each of them. It
is also a means to prevent address conflicts between the devices. You can also
manage them with ease if you have assigned their own addresses.
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog
box appears.
6. Type the IP address for your computer. Enter the appropriate IP Address in the IP
address section.
7. Type a subnet mask. The value used on a local network is
commonly255.255.255.0, but it can be different, such as 255.255.255.127.
10
8. Type the default gateway address. The default gateway is the router, so type
the router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.
9. Type the address for the preferred DNS server. The address should be obtained
from your Internet Service Protocol. It is used to help your computer find web
pages and other addresses on the internet.
10.Type the address for the alternate DNS server. The alternate Domain Name
System (DNS) server’s IP address is something that your ISP provides.
11.Click OK to confirm the settings.
12.Close all other open dialog boxes and windows.
11
IP address. Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins the network.
These are the IP address information that a DHCP server can assign to hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a Domain Name System (DNS) server address
The DHCP server receives a request from a host. The server then selects IP
address information from a set of predefined addresses that are stored in a
database. After the IP address information is selected, the DHCP server offers these
values to the requesting host on the network. If the host accepts the offer, the DHCP
server leases the IP address for a specific period of time.
Ping
The ping is a Command Prompt command used to test the ability of the
source computer to reach a specified destination computer. The ping command is
usually used as a simple way to verify that a computer can communicate over the
network with another computer or network device.
12
Using the ping Command
13
are trying to talk to is reachable, and how long it takes to get there. It does this at a
very low level — only the most basic Internet functions have to be up and running.
1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
3) Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.
Figure: Step 3
Figure: Pinging
14
of traffic on the communication lines or differing loads on the server are
common causes. You will see very different response times depending on
the access equipment you use.
Routing hop count — The part of the replies that says TTL=50 tells you
about the route the message took from one point to another. The acronym
TTL stands for Time to Live, which is a measure of how many rerouting
from one point to another the packet has to go through before IP declares
it undeliverable. The number following TTL (called the hop count) is a
number that usually starts at 255 and counts down by one every time the
message gets rerouted through an intermediary computer.
10.0.0.0 255.0.0.0 A
192.168.123.132 255.255.255.0
101.102.103.5 255.255.255.0
10.10.10.10 255.0.0.0
172.168.10.1 255.255.0.0
172.16.1.1 255.255.0.0
What’s More
1.https://www.youtube.com/watch?v=5pXSh1lUCFs
2.https://www.youtube.com/watch?v=bkYT3BEumw8
15
3. https://www.youtube.com/watch?v=jRi-qfqM7iA
4. https://www.youtube.com/watch?v=7t4CQdBhhMM
Directions: Answer the essential questions below based on the video presentations
you had watched. Write your answer in a clean sheet of paper.
16
What I Can Do
Configure an Ethernet NIC to use DHCP
Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address.
You need to follow the procedures given below and apply safety precautions in
accomplishing this task. While doing the activity, you have to answer activity
questions written after every step. Write your answer in a clean sheet of paper.
Your performance will be rated based on the performance rubrics.
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
Procedures:
Step 1
Computer Systems Servicing
17
Plug one end of the Ethernet patch cable into “Port 1” at the back of the
router.
Plug the other end of the Ethernet patch cable into the network port on the
NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click Start.
Right-click My Network Places, and then choose Properties.
The “Network Connections” window appears.
Step 2
Right-click Local Area Connection, and then choose Properties.
The “Local Area Connection Properties” window appears.
Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:”
field?
2. What are the items listed in the “This connection uses the following items:”
field?
18
Step 3
Choose Internet Protocol (TCP/IP).
Click Properties.
The “Internet Protocol (TCP/IP) Properties” window appears.
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the fields
of the “Use the following IP address:” area? Answers may vary. If the
computer is configured to obtain an IP address automatically, there will be no
information in the fields.
Click OK.
Restart your computer.
Computer Systems Servicing
19
Step 4
Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter Local Area
Network Connection”?
2. What is the IP address of the DHCP server?
20
What I Can Do
Task 2
Recommended Equipment
A computer with Windows XP Professional / Windows 7
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router with
an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
Choose start > Run, and type “cmd”. Press the Return key.
Type ipconfig.
What is the default gateway for the computer?
Step 3
Open your browser. Type “192.168.1.1” in the “Address” field, and then press
Return.
21
Step 4
Click the “Wireless” tab.
Choose “Mixed” in the “Network Mode” drop-down box.
Step 4
Unplug the Ethernet patch cable from the rear of the computer.
Choose Start, and then right-click My Network Places. Choose Properties.
Double-click the wireless adapter, and then select View Wireless Networks.
22
Choose CHS, and then click the Connect button.
References
https://www.youtube.com/channel/UCkefXKtInZ9PLsoGRtml2FQ
Prepared by:
JERICA D. SIMBOL
Teacher III
23
Computer Systems Servicing
24