Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
8 views

tle10_ict_css_q3_module3

This document is a module for Grade 10 students in the Philippines focusing on network configuration as part of Computer Systems Servicing. It covers the basics of networking, including types of networks (LAN and WAN), networking devices, IP addressing, and methods for assigning IP addresses. Additionally, it provides practical instructions for using commands like 'ipconfig' and 'ping' for network troubleshooting.

Uploaded by

Jonathan Alug
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

tle10_ict_css_q3_module3

This document is a module for Grade 10 students in the Philippines focusing on network configuration as part of Computer Systems Servicing. It covers the basics of networking, including types of networks (LAN and WAN), networking devices, IP addressing, and methods for assigning IP addresses. Additionally, it provides practical instructions for using commands like 'ipconfig' and 'ping' for network troubleshooting.

Uploaded by

Jonathan Alug
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 24

NOT

Technology and 10
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 3 - Module 3
Set Network Configuration

Department of Education ● Republic of the Philippines

Computer Systems Servicing

1
Technology and Livelihood Education Grade 10
Information and Communications Technology - Computer Systems Servicing
Alternative Delivery Mode
Quarter 3 - Module 3: Network Configuration
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalty.

Borrowed materials (i.e., pictures, photos, brand names, trademarks, etc.) included in
this book are owned by their respective copyright holders. Every effort has been exerted to
locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.

Computer Systems Servicing

2
Lesson

1 NETWORK

What’s New

NETWORK

A network consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.

There are two basic types of networks which includes the following:

 Local Area Network (LAN)


 Wide Area Network (WAN)

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small


area. It is generally limited to a geographic area such as a writing lab, school, or
building. Rarely are LAN computers more than a mile apart.

In a typical LAN configuration, one computer is designated as the file server. It


stores all of the software that controls the network, as well as the software that can
be shared by the computers attached to the network. Computers connected to the
file server are called workstations. The workstations can be less powerful than the
file server, and they may have additional software on their hard drives. On most
LANs, cables are used to connect the network interface cards in each computer.

Wide Area Network

Wide Area Networks (WANs) connect larger geographic areas, such as Florida,
the United States, or the world. Dedicated transoceanic cabling or satellite uplinks
may be used to connect this type of network.

Networking Devices

Consist of, but are not limited to non-local printers, workstations, servers,
webcams, data loggers, instruments, dial-in devices, and, in general anything that
requires an Ethernet connection. These devices are supported on a best-effort basis
limited by the staffing and equipment level available.

Hub is a small, simple, inexpensive device that joins


multiple computers together. Many network hubs
available today support the Ethernet standard. Other
Computer Systems Servicing

3
types including USB hubs also exist, but Ethernet is the type traditionally used in
home networking.

Ethernet switch is a device that gathers the


signals from devices that are connected to it, and
then regenerates a new copy of each signal.

Bridge is a device filters


data traffic at a network boundary. Bridges reduce the
amount of traffic on a LAN by dividing it into two
segments.

Routers are small physical devices that join multiple networks


together.

Network gateway is an internetworking system


capable of joining together two networks that use
different base protocols. A network gateway can be
implemented completely in software, completely in
hardware, or as a combination of both.

Modem is a contraction of the


terms modulator and demodulator. Modems perform a simple
function: They translate digital signals from a computer into
analog signals that can travel across conventional phone lines.
The modem modulates the signal at the sending end and
demodulates at the receiving end.

Network interface card is a device that connects a client


computer, server, printer or other component to your
network. Most often, a network interface consists of a small
electronic circuit board that is inserted into a slot inside a
computer or printer. Alternatively, some computers, printers,
or other services include network interfaces as part of their
main circuit boards (motherboards).

Network firewall protects a computer network from


unauthorized access. Network firewalls may be
hardware devices, software programs, or a
combination of the two. It guards an internal computer
Computer Systems Servicing

4
network (home, school, business intranet) against malicious access from the outside.
Network firewalls may also be configured to limit access to the outside from internal
users.

What I Have Learned

Direction: Identify what is being described in the following sentences and write your
answer on a separate sheet of paper.

1. It protects a computer network from unauthorized access.


2. Type of network that connect larger geographic areas, such as Florida, the
United States, or the world.
3. This is an internetworking system capable of joining together two networks
that use different base protocols.
4. It is consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications.
5. They translate digital signals from a computer into analog signals that can
travel across conventional phone lines.
6. It is a device that connects a client computer, server, printer or other
component to your network.
7. A device filters data traffic at a network boundary.
8. It is a device that gathers the signals from devices that are connected to it,
and then regenerates a new copy of each signal.
9. It is a small, simple, inexpensive device that joins multiple computers
together.
10. Type of network that is confined to a relatively small area.

What’s More

Now, that you are done with the introduction of network as well as the
networking devices, to enlighten your understanding and knowledge have some
more readings about it thru books and other resources. You should consider the
following topics for research:

1. Different types of Network Topology


2. Common networking tools

After the research, you can also deepen your understanding by watching a
video presentation using the URL below:

Computer Systems Servicing

5
https://www.youtube.com/watch?v=YqRHaR-OQVQ

https://www.youtube.com/watch?v=4nPnQVaRj4k

After the video presentation here are your tasks:

1. List down all the network devices and their advantages cited in the
video.
2. List down the different network topologies and their differences.

Computer Systems Servicing

6
Lesson

2 IP Addressing

What Is It

IP Addressing

An IP address is a number that is used to identify a device on the network.


Each device on a network must have a unique IP address to communicate with other
network devices. Network devices are those that move data across the network,
including hubs, switches, and routers. On a LAN, each host (device that sends or
receives information on the network) and network device must have an IP address
within the same network to be able to communicate with each other.

A person’s name and fingerprints usually do not change. They provide a label
or address for the person’s physical aspect—the body. A person’s mailing address,
on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Media Access Control (MAC) address is assigned to the
host Network Interface Card (NIC) and is known as the physical address. The
physical address remains the same regardless of where the host is placed on the
network in the same way that fingerprints remain with someone regardless of where
he or she goes.

An IP address consists of a series of 32 binary bits (1s and 0s). It is very


difficult for humans to read a binary IP address. For this reason, the 32 bits are
grouped into four 8-bit bytes called octets. An IP address, even in this grouped
format, is hard for humans to read, write, and remember. Therefore, each octet is
presented as its decimal value, separated by a decimal point or period. This format is
called dotted-decimal notation. When a host is configured with an IP address, it is
entered as a dotted-decimal number, such as 192.168.1.5.

Computer Systems Servicing

7
Table: Five Classes of IP Address

Subnet Mask

The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:

 255.0.0.0: Class A, which indicates that the first octet of the IP address is the
network portion
 255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
 255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion

Table: Default Subnet Masks for Usable IP Addresses:

Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are
reserved for research use only.

IpConfig

Ipconfig is a command used to find out the IP address of a certain network


you are connected to.

How to use the ipconfig command?


1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.

Computer Systems Servicing

8
Figure: Command Prompt Window

3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be useful
because it shows the IP address, subnet mask and default gateway of a network you
are connected to.

Figure: IP Configuration in CMD Window

Assigning a Static IP Address

Computer Systems Servicing

9
In a home network with several computers and devices, it is ideal to assign
each of them a specific address. This is for the purpose of avoiding problems when
you do troubleshooting which requires figuring out the IP address of each of them. It
is also a means to prevent address conflicts between the devices. You can also
manage them with ease if you have assigned their own addresses.

Here are the procedures in assigning an IP Address on a windows base


computer system:

1. Open the Control Panel’s Network Connections icon.


2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).

Figure: Wireless Network Connections Properties Dialog Box

5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog
box appears.

Figure: TCP / IPV4 Dialog


Box

6. Type the IP address for your computer. Enter the appropriate IP Address in the IP
address section.
7. Type a subnet mask. The value used on a local network is
commonly255.255.255.0, but it can be different, such as 255.255.255.127.

Computer Systems Servicing

10
8. Type the default gateway address. The default gateway is the router, so type
the router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.

Figure: Assigning an IP Address

9. Type the address for the preferred DNS server. The address should be obtained
from your Internet Service Protocol. It is used to help your computer find web
pages and other addresses on the internet.
10.Type the address for the alternate DNS server. The alternate Domain Name
System (DNS) server’s IP address is something that your ISP provides.
11.Click OK to confirm the settings.
12.Close all other open dialog boxes and windows.

Assigning a Dynamic IP Address


If more than a few computers comprise the LAN, manually configuring IP
addresses for every host on the network can be time-consuming and prone to errors.
In this case, using a Dynamic Host Configuration Protocol (DHCP) server would
automatically assign IP addresses and greatly simplify the addressing process.

Figure: Assigning a Dynamic IP Address


Dynamic Host Configuration Protocol (DHCP) is a software utility used to
dynamically assign IP addresses to network devices. This dynamic process
eliminates the need to manually assign IP addresses. A DHCP server can be set up
and the hosts can be configured to automatically obtain an IP address. When a
computer is set to obtain an IP address automatically, the other entire IP addressing
configuration boxes are dimmed or disabled. The server maintains a list of IP addresses to
assign, and it manages the process so that every device on the network receives a unique
Computer Systems Servicing

11
IP address. Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins the network.

These are the IP address information that a DHCP server can assign to hosts:
 IP address
 Subnet mask
 Default gateway
 Optional values, such as a Domain Name System (DNS) server address

The DHCP server receives a request from a host. The server then selects IP
address information from a set of predefined addresses that are stored in a
database. After the IP address information is selected, the DHCP server offers these
values to the requesting host on the network. If the host accepts the offer, the DHCP
server leases the IP address for a specific period of time.

Using a DHCP server simplifies the administration of a network because the


software keeps track of IP addresses. Automatically configuring TCP/IP also reduces
the possibility of assigning duplicate or invalid IP addresses. Before a computer on
the network can take advantage of the DHCP server services, the computer must be
able to identify the server on the local network. You can configure a computer to
accept an IP address from a DHCP server by clicking the Obtain an IP address
automatically option in the NIC configuration window, as shown in previous Figure.

If your computer cannot communicate with the DHCP server to obtain an IP


address, the Windows operating system automatically assigns a private IP address.
If your computer is assigned an IP address in the range of 169.254.0.0 to
169.254.255.255, it can communicate with only other computers in the same range.
An example of when these private addresses would be useful is in a classroom lab
where you want to prevent access outside to your network. This operating system
feature is called Automatic Private IP Addressing (APIPA). APIPA continually
requests an IP address from a DHCP server for your computer.

Ping

The ping is a Command Prompt command used to test the ability of the
source computer to reach a specified destination computer. The ping command is
usually used as a simple way to verify that a computer can communicate over the
network with another computer or network device.

The ping command operates by sending Internet Control Message Protocol


(ICMP) Echo Request messages to the destination computer and waiting for a
response. How many of those responses are returned, and how long it takes for
them to return, are the two major pieces of information that the ping command
provides.
Table: Ping Command Syntax

Computer Systems Servicing

12
Using the ping Command

Ping is one of your most important tools in troubleshooting Internet problems. It


shows you whether the Domain Name Server is working, whether the computer you

Computer Systems Servicing

13
are trying to talk to is reachable, and how long it takes to get there. It does this at a
very low level — only the most basic Internet functions have to be up and running.

1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
3) Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.

Figure: Step 3

Figure: Pinging

This output shows several things:


 Decoding names to network addresses — A domain name server
(DNS) resolves machine names to numeric addresses. A single machine
can have many names, all of which resolve to the same Internet address.
In the example just given, the name www.google.com resolves to the
Internet address 122.2.152.23.
 Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client machine
sent out the ping message until a reply came back (1 ms is 1 millisecond,
or one thousandth of a second). The variability in the times you see
reflects that networks do not always respond identically. Differing amounts
Computer Systems Servicing

14
of traffic on the communication lines or differing loads on the server are
common causes. You will see very different response times depending on
the access equipment you use.

 Routing hop count — The part of the replies that says TTL=50 tells you
about the route the message took from one point to another. The acronym
TTL stands for Time to Live, which is a measure of how many rerouting
from one point to another the packet has to go through before IP declares
it undeliverable. The number following TTL (called the hop count) is a
number that usually starts at 255 and counts down by one every time the
message gets rerouted through an intermediary computer.

What I Have Learned


I. Identifying IP Address Classes

Directions: In this worksheet, your teacher will write several IP addresses


with their appropriate subnet masks. You will copy the IP address and Subnet
Mask. You will write which IP Address Class is appropriate in the IP Address
Class column in the chart below. An example has been provided for you.

IP Address Subnet Mask IP Address Class

10.0.0.0 255.0.0.0 A

192.168.123.132 255.255.255.0

101.102.103.5 255.255.255.0

10.10.10.10 255.0.0.0

172.168.10.1 255.255.0.0

172.16.1.1 255.255.0.0

Be prepared to discuss the IP Address Class you select.

What’s More

To deepen your understanding with regard to the Internet Protocols, IP


Address and subneting, utilize the Internet and the website
www.professormesser.com, watch and learn from the video presentations. Use the
URLs below:

1.https://www.youtube.com/watch?v=5pXSh1lUCFs
2.https://www.youtube.com/watch?v=bkYT3BEumw8

Computer Systems Servicing

15
3. https://www.youtube.com/watch?v=jRi-qfqM7iA

4. https://www.youtube.com/watch?v=7t4CQdBhhMM

Reflection on the video presentations

Directions: Answer the essential questions below based on the video presentations
you had watched. Write your answer in a clean sheet of paper.

1. What are the procedures involved in calculating IP address and the


procedures in converting IP address to binary and vice versa?
________________________________________________________
________________________________________________________
________________________________________________________
2. What are the different IP Classes? Discuss each briefly and give examples.
________________________________________________________
________________________________________________________
________________________________________________________

3. What are the distinguished Internet Protocols? Describe each.


________________________________________________________
________________________________________________________
________________________________________________________

4. What are the necessary procedures in calculating subnet mask or simply


subnetting? Show an example solution for the calculation.
________________________________________________________
________________________________________________________
________________________________________________________
Computer Systems Servicing

16
What I Can Do
Configure an Ethernet NIC to use DHCP
Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address.
You need to follow the procedures given below and apply safety precautions in
accomplishing this task. While doing the activity, you have to answer activity
questions written after every step. Write your answer in a clean sheet of paper.
Your performance will be rated based on the performance rubrics.

Rubrics for Configuration

Legend:

B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance

Recommended Equipment

 Linksys 300N router


 A computer running Window XP Professional
 Ethernet patch cable

Procedures:
Step 1
Computer Systems Servicing

17
 Plug one end of the Ethernet patch cable into “Port 1” at the back of the
router.
 Plug the other end of the Ethernet patch cable into the network port on the
NIC in your computer.
 Plug in the power cable of the router if it is not already plugged in.
 Turn on your computer and log on to Windows as an administrator.
 Click Start.
 Right-click My Network Places, and then choose Properties.
 The “Network Connections” window appears.

Figure: My Network Places

Step 2
 Right-click Local Area Connection, and then choose Properties.
 The “Local Area Connection Properties” window appears.

Figure: Local Area Connection Properties

Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:”
field?
2. What are the items listed in the “This connection uses the following items:”
field?

Computer Systems Servicing

18
Step 3
 Choose Internet Protocol (TCP/IP).
 Click Properties.
 The “Internet Protocol (TCP/IP) Properties” window appears.

Figure: Internet Protocol (TCP/IP) Properties

Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the fields
of the “Use the following IP address:” area? Answers may vary. If the
computer is configured to obtain an IP address automatically, there will be no
information in the fields.

 Click the Obtain an IP address automatically radio button.


 Click OK. The “Internet Protocol (TCP/IP) Properties” window closes.

Figure: Local Area Connection Properties Window

 Click OK.
 Restart your computer.
Computer Systems Servicing

19
Step 4

 Log on to Windows as an administrator.


 Check the lights at the back of the NIC. These lights will blink when there is
network activity.

 Choose Start > Run.

 Type cmd and click OK.

Figure: Run Window

 Type ipconfig/all, and then press the Enter key.

Figure: ipconfig all window

Activity Questions:

1. What is the IP address and subnet mask of the “Ethernet Adapter Local Area
Network Connection”?
2. What is the IP address of the DHCP server?

3. On what date was the Lease obtained?

4. On what date will the Lease expire?


Computer Systems Servicing

20
What I Can Do

Task 2

Configure Wireless Router


Directions: Configure and test the wireless settings on the LinksysWRT300N.

Recommended Equipment
 A computer with Windows XP Professional / Windows 7
 A Wireless NIC installed
 An Ethernet NIC installed
 Linksys WRT300N Wireless Router
 Ethernet patch cable
Step 1
 Connect the computer to one of the Ethernet ports on the wireless router with
an Ethernet patch cable.
 Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
 Choose start > Run, and type “cmd”. Press the Return key.
 Type ipconfig.
 What is the default gateway for the computer?

Step 3
 Open your browser. Type “192.168.1.1” in the “Address” field, and then press
Return.

Figure: Browser Window

 The “Connect to 192.168.1.1” window appears.

Figure: Connect to 192.168.1.1 Window

 Type “admin” in the “Password” field.


 The Setup screen appears.
Computer Systems Servicing

21
Step 4
 Click the “Wireless” tab.
 Choose “Mixed” in the “Network Mode” drop-down box.

Figure: Wireless Tab Window


 Type “CHS#” in the “Network Name (SSID)” field, where # is the number
assigned by your instructor.
 Click Save Settings.
 The “Settings are successful” screen appears.

Figure: Settings are Successful Window

 Click Continue, and then close the browser window.

Step 4

 Unplug the Ethernet patch cable from the rear of the computer.
 Choose Start, and then right-click My Network Places. Choose Properties.

 Double-click the wireless adapter, and then select View Wireless Networks.

Computer Systems Servicing

22
 Choose CHS, and then click the Connect button.

 Open Internet Explorer, and then connect to the wireless router.

 Log in to the wireless router.

 Close Internet Explorer.

References

Rosalie P. Lujero, Ronaldo V. Ramilo. “Technology and Livelihood Education-


Information and Communications Technology Learners Manual - Computer
Hardware Servicing Grade 9”.

Rosalie P. Lujero. “Technology and Livelihood Education - Information and


Communications Technology Learners Manual - Computer Hardware
Servicing Grade 10”.

https://www.youtube.com/channel/UCkefXKtInZ9PLsoGRtml2FQ

Prepared by:

JERICA D. SIMBOL
Teacher III

Reviewed by: Approved by:

JOSELITO C. IBAÑEZ EPIFANIA B.


DUNGCA, EdD
Head Teacher VI Principal IV
TLE Department Tarlac National High School
Computer Systems Servicing

23
Computer Systems Servicing

24

You might also like