You are on page 1of 58

rty

10
e

me
n tP
rop
ALE
rn S
OR
ve
Go
T F
NO

Technology and
Livelihood Education
Information and Communication Technology
Computer Systems Servicing
Quarter 4 - Module 4
Troubleshooting Network Breakdowns
sdfgsd

Department of Education ● Republic of the Philippines


Technology and Livelihood Education – Information and Communication Technology
(Computer Systems Servicing) Grade 10
Alternative Delivery Mode
Quarter 4 - Module 4: Troubleshooting Network Breakdowns
ICT CSS Network Maintenance
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein
the work is created shall be necessary for exploitation of such work for profit. Such agency or office
may, among other things, impose as a condition the payment of royalty.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.

Published by the Department of Education – Division of Bukidnon

Development Team of the Module

Author: Venice Andrea A. Sanchez, Leah A. Viloria


Editors: Emmanuel T. Yap, Ma. Nelly M. Vildosola
Reviewers: Mary Jane R. Cardente, PhD
Illustrator and Layout Artist: Leah A. Viloria

Management Team:
Chairperson: Arturo B. Bayocot, PhD, CESO III
Regional Director

Co-Chairpersons: Victor G. De Gracia Jr., PhD, CESO V


Asst. Regional Director

Randolph B. Tortola, PhD, CESO IV


Schools Division Superintendent
Lanila M. Palapar, PhD
Assistant Schools Division Superintendent
Audie S. Borres, PhD
Assistant Schools Division Superintendent
Mala Epra B. Magnaong, PhD, Chief ES, CLMD
Marie Emerald A. Cabigas, PhD, EPS-LRMS
Bienvenido U. Tagolimot, Jr., PhD, EPS-ADM

Members Elbert R. Francisco, PhD., Chief ES, CID


Mary Jane R. Cardente, PhD., EPS in Tech. and Livelihood Educ.
Rejynne Mary L. Ruiz, PhD., LRMDS Manager
Jeny B. Timbal, PDO II
Shella O. Bolasco, Division Librarian ll

Printed in the Philippines by


Department of Education – Division of Bukidnon
Office Address: Fortich Street, Sumpong, Malaybalay City, Bukidnon
Telefax: (088)813-3634
E-mail Address: bukidnon@deped.gov.ph
Website: depedbukidnon.net.ph

0
Lesson Reactive Network
1 Troubleshooting

Welcome to your first lesson in troubleshooting network breakdowns!

What I Need to Know

__________________________________________________________________________________

Below are the skills and competencies you need to learn for today’s
lesson.

SKILLS AND COMPETENCIES/OBJECTIVES:

At the end of this lesson, you are expected to:

 explain what is meant by reactive network troubleshooting;


 describe a systematic approach to problem solving network situations; and
 give examples of reactive network troubleshooting.

What I Know

__________________________________________________________________________________

Before you start the lesson on reactive network troubleshooting,


you need to answer the following activity below. You will be
challenged to dig deeper into your prior knowledge and previous
experiences. This phase will guide you in assessing yourself on
how much you have known reactive network troubleshooting.

ACTIVITY 1. Multiple Choice

Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.

1. Any changes to the network software or hardware can create problems. This is
when reactive network troubleshooting comes in. Is this statement correct?
A. Yes
B. No

1
2. What network troubleshooting approach is also known network breakdown
troubleshooting?
A. Proactive network troubleshooting
B. Reactive network troubleshooting
C. Preventive network troubleshooting
D. Corrective network troubleshooting

3. Which steps in a scientific problem-solving approach requires to identify what


is the problem all about?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

4. Which steps in a scientific problem-solving approach requires to dig deeper


into the problem?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

5. Which steps in a scientific problem-solving approach requires to solve the


network problem?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

6. Which steps in a scientific problem-solving approach requires to test the


formed hypothesis?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

7. Which steps in a scientific problem-solving approach requires to formulate a


hypothesis?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

8. Which of the following is an example of reactive network troubleshooting


approach?
A. Maintaining a troubleshooting preventive schedule
B. Maintaining a documentation logbook
C. Doing repair as problem occurs
D. Having a network design in the wall.

2
9. Which of the following is an example of reactive network troubleshooting
approach?
A. Diagnose the problem
B. Do the replacement of defective parts
C. Do the scheduled troubleshooting
D. Test the solution to the problem

10. The following are the situation when network breakdown usually occurs,
except for one. Which of the following is the least possible reason for network
breakdown?
A. A new software was installed.
B. A new hardware was installed.
C. A new upgrade was performed.
D. A new network device was installed.
E. A new network technician was installed.

What’s In

__________________________________________________________________________________

You have reached Module 1 in Network Systems Breakdowns. Last


module, we tackle about how to diagnose network problems. So as a
sort of review, kindly carry out the activity below.

ACTIVITY 2

Direction: Read and answer the questions below. Write your answer in your
activity notebook.

1. What is the way of isolating problem presented in previous lesson?

2. What is the next reasonable thing to do after isolating the problem?

3. Why is it important to document network issues?

3
What’s New

__________________________________________________________________________________

Before you start the lesson on network fault diagnosis, do the activity
below.

ACTIVITY 3: BIG Word – One Word

Direction: Answer the question below and write your answer in your activity
notebook.

1. What word that pops into mind you see


this word?
Reactivee

What is it

__________________________________________________________________________________

What is network reactive troubleshooting?

Reactive network troubleshooting, also known as network breakdown


troubleshooting, is one of the commonly adopted approaches. It is a method of
keeping the network operational by correcting problems as they occur. It also refers
to troubleshooting that are performed to restore a failed network equipment, network
connection or network configuration to bring back to a workable condition. It is
typically performed when the cable or equipment needs to be replaced, or software or
configuration needs an upgrade. A systematic approach you can use is Scientific
Method. The steps are:
1. State the problem
2. Research the problem
3. Form a hypothesis
4. Test the hypothesis
5. Draw conclusions and solve problem

State the Problem

When a user complains about the network, investigate first if there is really a
problem. Sometimes it may be just a user problem especially when the user has a
deadline to meet.

Research the Problem

Once problem was confirmed, do following:


1. Check the connections if they are loose.
2. Try to log on with a correct password.

4
3. Check the configurations on the workstation, if IP address is correct and if a
correct NIC card configured.
4. Check all the physical media attached to the malfunctioning device.
5. Interview the user. Ask what he or she was doing just before the problem
occurred. Look for clues that will help you determine the root of the problem.

The very first question you should be asking yourself when a problem occurs
is “what is new or different?” Any changes to network software or hardware can
create problems. Some of the places where change might have occurred are with
systems files, new devise, new device drivers, new accounts, changed privileges,
upgraded software, etc.

Isolate the Problem

Where to look first when there are many workstations in a network? Start with
your network diagram. Are the complaints coming from a single department? Are they
connected to a single hub?

Problems in any network can either be:


 Local
 Systemic

Look for systemic issues first before examining into local ones. Systemic
problems are the one that every user in the network experiences. This means that the
problem might involve a shared resource, device, or program. Isolate systemic issues
first before local problems.

For example:

Juan knows from the baseline performance data that when the system is
running optimally for that time frame takes an average of 3 ms (milliseconds) to ping
POP mail server. When he ping the workstation and find that it takes 5ms. The
problem is that the network throughput is low. Juan then look at the performance
monitoring software and found that one workstation cannot even load for lack of
resources, but another workstation is running smoothly. This might indicate that the
problem is the server’s memory cache is almost full. What might be causing that?
In addition, the server is locked in the secure server room. The logbook also
tells that the computer room door has not been opened since late last night when the
backup media were removed offsite. No new software has been installed on the
network in the last 2 weeks. The performance manager shows correct amount of
memory; the problem is not that it is not connected but that it is unavailable.

In the company where Juan work, a marketing director was fired last week.
Could these two seemingly unrelated incidences, connected?

Form a Hypothesis

The fact that server’s very little memory available can explain why people are
having trouble with network connection. In addition, processes are competing with a
very little memory.

In our example, it appears that memory is the issue. A reasonable hypothesis


is that something has made memory unavailable. The possible reason for this might
be:

 Someone may have removed memory boards from the file.

5
- This cannot be since the server room is locked and been untouched.
 Memory may have become unavailable due to a wiring
- This is impossible since the performance manager shows the right amount of
memory.
 Some process is gobbling up the memory
- This is a reasonable hypothesis. Memory should be available, and

Thus, one hypothesis is obvious that a runaway process is using excess memory.

Test the Hypothesis

How will Juan know what he is dealing with? So far, his hypothesis is that a
runaway process is using excess memory.

To test the hypothesis, run utilities to identify the various process that are
running and where they are running. If there are 53 ping processes running, and
another ping appears after 5 minutes, a program might be responsible for this.

The right thing to do for Juan is to isolate the ping program and determine
that it originated from a workstation in the marketing department. This workstation
was assigned to the marketing director who was fired last week.

Draw Conclusions

The conclusion is that the disgruntled employee set the continuous ping
before he or she left the company. He made a program that runs ping continuously,
then, after 5 minutes regenerates itself to run a second version of ping, and so on,
until the system crashes.

The solution is to kill the 55 pings running. This will speed up again the
systems and regain the memory that ping was using. Never forget to document
everything. Print the ping program causing the trouble for future legal use.

Network Problem Solving


When troubleshooting, be sure to check one parameter at a time. If you make
multiple changes before checking out the device, it becomes difficult to detect the
problem.

There is no easy solution, but there are different approaches you can take.
Whichever solution you choose, be sure to document it, so that the next person who
must troubleshoot the same problem you encountered can see where the potential
problem lies.

6
What’s More

__________________________________________________________________________________

This comprises activities for independent practice to solidify your


understanding and skills of the topic.

ACTIVITY 4: Scientific Problem-Solving Approach

Direction: Read the scenario below. Identify the problem and formulate
hypothesis using the scientific problem-solving approach. Write your
answer in your activity notebook.

One day a computer café owner approached a computer network technician friend
with a problem. The five computers of his computer café cannot communicate to the server.
The access point where it is connected indicates it is okay. “What could be the problem?”
asked the computer café owner to the technician. The technician considered some of the
options. One possibility was that an IP Stack failure. Another possibility was that the
configuration settings was faulty. “A third possibility was that the access point was the
problem especially you have multiple access points,” said the technician. “Let’s check the
network connection first,” said the technician. The two walked over to where the five
computers located. The technician turned on the computers and begin typing ping in the
command prompt. It said, “destination host unreachable.” The friend then checked the
physical connection. “Let’s try unplugging the access point,” said the technician. The two
walked over to the server room of the internet cafe, then the technician unplugging and
plugging the access point back again. “Turn on the access point,” said the technician to the
owner. As the access point labored to turn on and connect. The technician went back to the
computers, use ping again. He shouted, “That’s the problem!”

7
What I Have Learned

__________________________________________________________________________________

What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson.

ACTIVITY 5: Own Words is Important

Direction: Identify the keywords below and explain it your own words. Write your
answer in your activity notebook.

reactive network
troubleshooting

What I Can Do

What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.

ACTIVITY 6: Tell-me-what, Tell-me-how

Direction: Read the scenario given. Examine the Job Order Form carefully and
identify what was the complain of the customer, and how to
troubleshoot the problem. Explain your answer. Write it in your activity
notebook.

Mario is a network maintenance technician in a TPM (third party


maintenance) company. One day, he received a job order from his boss. Refer
to Figure 4 – Network Maintenance Job Order Form received by Mario.

8
Network Maintenance Job Order Form
Client Name: Viloria Enterprise Phone No.: 0936-1234567
Client Address: Sayre Highway, Poblacion,
Quezon, Bukidnon Client Email:
Job Order Details
Date issued: June 11, 2020 Job Order No.: 1234569
Issued by: Juan dela Cruz Job Performed by: Mario Jose Maria
Client’s Complaints/Problems:
• Cannot connect to the internet
Description of Job Required:
1. Check physical connection and hardware
2. Do the diagnostic tool – ping
3. Contact ISP
Materials Required:
Remarks: The client suspected about broken cables because of
rats.
Completion Information
Date Completed: Time Required
Materials Used:
Remarks
Employee Signature: Supervisor Signature:

Figure 1 Network Maintenance Job Order Form

1. What was client’s complaint about?


Client’s complains about _________________________________________.

2. What you should do to determine the real problem?


To determine the real I would ______________________________________
____________________________________________________________________
____________________________________________________________________

3. How would you troubleshoot the problem presented?


____________________________________________________________________
____________________________________________________________________

Your performance will be assessed according to this Rubric:


5 4 3 2 1
Reasoning Excellent Correct logical Has the point in Get the answer Reasoning is
reasoning. reasoning. his/her right but not out of the
Beyond Evidently, reasoning yet convincing context.
expectation. Did studies the not grounded reasoning
extra-research given hand-outs enough.
about the topic
Correctness Answer is Answer is Answer is Answer is Answer is
correct. Easy to correct. Stated correct. No correct. correct yet no
understand what was given ample Explanation is explanation.
reasoning using in the hand-outs explanation. out of the
his/her own context.
words.

9
Assessment

_________________________________________________________________________________

Awesome! You made it to “Assessment” part. A task will be given to you


to evaluate your level of mastery in achieving the learning competency.
Just be patient in answering it. Believe in yourself.

ACTIVITY 7. Multiple Choice

Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.

1. Any changes to the network software or hardware can create problems. This is
when reactive network troubleshooting comes in. Is this statement correct?
A. Yes
B. No

2. What network troubleshooting approach is also known network breakdown


troubleshooting?
A. Proactive network troubleshooting
B. Reactive network troubleshooting
C. Preventive network troubleshooting
D. Corrective network troubleshooting

3. Which steps in a scientific problem-solving approach requires to identify what


is the problem all about?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

4. Which steps in a scientific problem-solving approach requires to dig deeper


into the problem?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

5. Which steps in a scientific problem-solving approach requires to solve the


network problem?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

10
6. Which steps in a scientific problem-solving approach requires to test the
formed hypothesis?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

7. Which steps in a scientific problem-solving approach requires to formulate a


hypothesis?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem

8. Which of the following is an example of reactive network troubleshooting


approach?
A. Maintaining a troubleshooting preventive schedule
B. Maintaining a documentation logbook
C. Doing repair as problem occurs
D. Having a network design in the wall.

9. Which of the following is an example of reactive network troubleshooting


approach?
A. Diagnose the problem
B. Do the replacement of defective parts
C. Do the scheduled troubleshooting
D. Test the solution to the problem

10. The following are the situation when network breakdown usually occurs,
except for one. Which of the following is the least possible reason for network
breakdown?
A. A new software was installed.
B. A new hardware was installed.
C. A new upgrade was performed.
D. A new network device was installed.
E. A new network technician was installed.

11
Additional Activities

Amidst the challenges of the previous activities, you did well. That was
divine. The following activity will enrich your knowledge and skill of the
lesson learned. Enjoy doing this activity.

ACTIVITY 8: Research Activity

Direction: Do a small research.

Is reactive network troubleshooting the same as corrective maintenance? Why or why


not?

12
Lesson Proactive Network
2 Troubleshooting

Welcome to your second lesson!

What I Need to Know

__________________________________________________________________________________

To start with, let us try to find out the learning competencies in which you
are going to master at the end of this lesson.

SKILLS AND COMPETENCIES/OBJECTIVES:

At the end of this lesson, you are expected to:

 identify the purpose of proactive network troubleshooting;


 give examples of proactive network troubleshooting; and
 appreciate the importance of network security as a proactive approach to
network troubleshooting.

What I Know

__________________________________________________________________________________

Before you start the lesson on reactive network troubleshooting,


you need to answer the following activity below. You will be
challenged to dig deeper into your prior knowledge and previous
experiences. This phase will guide you in assessing yourself on
how much you have known reactive network troubleshooting.

ACTIVITY 1. Multiple Choice

Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.

1. What is the purpose of proactive network troubleshooting?


A. Limit reactive network troubleshooting
B. Respond to a problem as they occur
C. Do the necessary repair of network breakdown

13
D. Do the necessary replacement of a defective network device

For the items 2, 3, 4, 5 ,6 and 7 use the selection below:


I. Redundant Array of Inexpensive Disks (RAID);
II. SNMP and other protocol-based management;
III. Planning practices
IV. Network security;
V. Developing Fail-Safe;
VI. Network management system; and
VII. Documentation procedures.

2. This provides data striping but no data redundancy at level 0. Which of the
proactive network troubleshooting approach was described?
A. I
B. II
C. III
D. IV

3. This ensures confidentiality, integrity, and availability of data. Which of the


proactive network troubleshooting approach was described?
A. I
B. II
C. III
D. IV

4. This serves as watchdog that send alert to the management system when it
detected that something is not right. Which of the proactive network
troubleshooting approach was described?
A. I
B. II
C. III
D. IV

5. This provides information, diagnostic tools, and problem-solving capabilities to the


network manager. Which of the proactive network troubleshooting approach was
described?
A. III
B. IV
C. V
D. VI

6. This provides rationale about the importance of a good plan. Which of the
proactive network troubleshooting approach was described?
A. III
B. IV
C. V
D. VI

7. This reduces the chances of failure in a device. Which of the proactive network
troubleshooting approach was described?
A. III
B. IV
C. V
D. VI

8. Which of following is an example of security measure?


A. Providing all access to every user using the same login access.
B. Putting passwords easy to remember.
C. Giving every user key to the server room

14
D. Limiting dial-up access

9. You want to save your device from failure due to sudden blackout. What Fail-Safe
device you should have?
A. RAID
B. SNMP
C. UPS
D. A spare device

10. Which part in planning that is concerned about being mission-critical?


A. Scope and timeline for changes or upgrades
B. Prioritization of task
C. Testing plan
D. Implementation
E. Retesting

11. Which device is required to provide a steady stream of continuous electrical


power to a server?
A. UPS
B. AVR
C. Switch
D. Router

12. Which RAID system provides no fault tolerance protection? RAID 0


A. RAID level 0
B. RAID level 1
C. RAID level 3
D. RAID level 5

13. You need to design a fault tolerant system for backing up critical data stored on a
single network server. The system is in operation five days per week, Monday
through Friday. You want to be able to restore the data as fast as possible after a
hard disk drive failure. Which fault tolerance system will best meet the
requirement of restoring the lost data as quickly as possible?
A. Install a RAID level 0 system in the server.
B. Install a RAID level 1 system in the server.
C. Install a RAID level 3 system in the server.
D. Install a RAID level 5 system in the server.

14. Maria is public school teacher. She needs to connect to internet everyday for
additional resources. She only uses less than 1GB of data every day. When she
checked internet bills, it was way too much she had used in a month. She
suspects that someone is stealing her data usage. What security measures she
must have to prevent others from stealing her internet data?
A. Install IPS/IDS in her network.
B. Install firewall hardware.
C. Subscribe to VPN network.
D. Install rogue connection detection in her system.

15. Is having a password enough?


A. Yes, if I changed them often.
B. Yes, if it is a complicated password.
C. No, I must have an authentication device to doubly verify access.
D. No, I must have used the mobile number of my best friend for verification.

15
What’s In

__________________________________________________________________________________

In the previous lesson, you learned about reactive network


troubleshooting. So as a sort of review, kindly carry out the activity
below.

ACTIVITY 2: One-Phraser

Direction: Answer the questions given below. Write your answer on the space
provided. Write your answer in your activity notebook.

1. In your own words, what is reactive network troubleshooting?


2. Give one example of reactive network troubleshooting. Explain.

_______________________________
1. Reactive network troubleshooting is
_____________________________________________________________

2 One example of reactive network troubleshooting is _____________________


because ______________________________________________________
_____________________________________________________________

16
What’s New

__________________________________________________________________________________

Before you start the lesson on diagnostic procedure, you need to do the
activity below.

ACTIVITY 3: Brain Teaser

Direction: Read the scenario below and try to solve the problem presented. Answer
the questions provided. Write your answer in your activity notebook.

One day you decided to water your garden, using a garden hose that is
already connected to a spigot on the side of your house:

Source 1 https://www.allaboutcircuits.com/worksheets/basic-troubleshooting-strategies/

When you turn on the valve at the spigot, no water comes out the nozzle at the
other end of the hose.

How would you prevent this incident from happening again? Give at least to
ways to prevent from recurring.
1. ________________________________________________________
2. ________________________________________________________

Glossary:

 Data striping – the spreading of data over multiple disk drives to improve
performance. Also known as “RAID 0,” data are interviewed by bytes or blocks
of bytes across the drives. For example, with four drives and a RAID controller
that simultaneously read and writes all drives, four times as much data is read
or written in the same time frame as a system without striping. Disk striping

17
does not provide fault tolerance but is often used in conjunction with disk
mirroring (RAID 3 and RAID 5) to provide both speed and safety.

 Disk mirroring – a technique used to protect a computer system from loss of


data and other potential losses due to disk failures. In this technique, the data
is duplicated by being written to two or more identical hard drives, all of which
are connected to one disk controller card. If one hard drive fails, the data can
be retrieved from the other mirrored hard drives. It is often referred to as RAID
1 or RAID level 1.

What is it

__________________________________________________________________________________

What is proactive network troubleshooting? What are some the proactive


network planning practices?

Basic proactive troubleshooting procedures limit reactive network


troubleshooting activities. The following are examples how to keep the network
proactively running smoothly and efficiently:
 Redundant Array of Inexpensive Disks (RAID);
 SNMP and other protocol-based management;
 Planning practices
 Security;
 Developing Fail-Safe;
 Network management system; and
 Documentation procedures.

Documentation were discussed in the previous modules. Let us just briefly discuss
remaining topics.

Redundant Array of Inexpensive Disks (RAID)

RAID is a technique using two or more disk drives in combination for fault
tolerance and performance. RAID disk drives are used frequently on servers but are
not generally necessary for personal computers. There are numbers of different ways
to use multiple disks together in a RAID scheme and these are known as RAID
levels. There are many different RAID levels, and some manufacturers have
developed their own variations.

 Level 0
This level provides data striping but no redundancy. This improves
performance but does not deliver fault tolerance.

 Level 1
This level provides disk mirroring, which gives good data protection but
no performance benefit.

 Level 3
This level is the same as Level 0, but also reserves one dedicated disk
for error-correction data. It provides good performance and some
degree of fault tolerance.

 Level 5

18
This level provides data striping at the byte level and strips error-
correction information. This results in excellent performance and good
fault tolerance.

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) collects and manipulates


valuable network information. It gathers data by polling the devices on the network
from a management station at fixed or random intervals, requiring them to disclose
certain information. When all is well, SNMP receives something called a baseline—a
report delimiting the operational traits of a healthy network. This protocol can also
stand as a watchdog over the network, quickly notifying managers of any sudden turn
of events. These network watchdogs are called agents, and when aberrations occur,
agents send an alert called a trap to the management station. In addition, SNMP can
help simplify the process of setting up a network as well as the administration of your
entire internetwork.

Planning Practices for Proactive Network Troubleshooting

To ensure the network continues to run smoothly, proper planning is devised.


The steps are:

1. Scope and timeline for changes or upgrades


Start with a mission-critical areas and base recommendations on a
realistic timeline and resources considerations like budget and technical
expertise needed.

2. Prioritization of task
Which work should come first? What is the schedule for the changes or
upgrades?

3. Testing plan
When the changes are implemented, they should be done in controlled
environment. Schedule this so that it has the minimum impact on
network users.
4. Implementation
Notify users of the implementation schedule ahead of the actual time of
implementation so they can plan their work around any disruption this
may cause.

5. Retesting
Once you implement changes, test the network to verify the correct
operation of the changes.

6. Documentation
Again, document all changes/modifications. This will save time and
money for continued network improvements.

Network Security

You already know several important points about security. This section is a
quick review of the security issues of which you should be aware.

The goals of security are confidentiality, integrity, and availability. Users expect
their data to be confidential. They expect to retrieve untampered data from servers.
Users need assurance that unauthorized changes will not occur.

19
20
A secure network should prevent “eavesdropping” and unauthorized use. How
to do this?
 Scrambling and encrypting data as it travels over the physical media. An
example for this is using virtual private network (VPN).
 Attending to the unauthorized person access to devices. An example for this
providing a unique access to each user.
 Preventing intrusion from unauthorized devices that attempt to alter, steal, or
corrupt data as it goes through network. Example for this is using different
passwords for each device.
 Installing prevention and detection mechanisms to guard against someone
tampering with data. An example for this is installing intrusion preventive
system / intrusion detection system (IPS/IDS) in the network.
 Preventing malware in the system.

Security measures that help manage network security include the following:
 Physically lock wiring closets, server room and equipment.
 Frequently change passwords.
 Store backups in different physical location from the network.
 Limit dial-up access.
 Explain and distribute a written security policy throughout the organization.
The policy must be understood by the individuals who need to know the
following:
- Resources that are secured
- Procedures implemented
- Resource availability

Developing Fail-Safe

All network equipment will fail eventually. The equipment may reach the end of
its useful life, it may fail because of physical (malicious or accidental) damage, or it
may be the victim of environmental damage such as a power spike, lightning strike or
overload from adjacent equipment. A fail-safe is any method or device used to reduce
the chance of failure.

There are four types of fail-safe:


 a protective device such as an uninterruptible power supply (UPS) to protect
network equipment from a specific threat (in this case, power failure or power
fluctuations)
 a duplicate device connected and working as part of the network such as a
RAID array or a secondary cable run
 a hot standby – a duplicate device ready to connect in place of a failed
component (the device already loaded with the correct software and
configuration to enable the quickest possible swap)
 a spare device that you can configure to replace a failed network component.

Network Management Systems

Network management systems is a way to proactively troubleshoot network.


This provides information, diagnostic tools, and problem-solving capabilities to the
network manager. involves:
 A graphical interface that can display physical and logical view of the network.
 Industry-standard protocols like SNMP.
 Automatic “discovery” of new devices.
 A way of storing and retrieving information about network performance.
 Monitoring capabilities.
 Alarm alert functionality.

21
 Problem solving capabilities.
 Interfaces that allow development of third-part applications.
 Modeling capabilities for cable, hardware, etc.
 Accounting management functionality for tracking network use and billing
accounts.

What’s More

__________________________________________________________________________________

The succeeding activity is for your independent practice to solidify your


understanding and skills of the topic.

ACTIVITY 4: Network Security

Direction: Match each presented security threats below to the security risk matrix.
One security threat may appear multiple times. The first threat is done
for you. Write your output in a separate sheet.
security threats

security risks

22
What I Have Learned

__________________________________________________________________________________

What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson. You can do
it.

ACTIVITY 5: One-liner Statement

Direction: Answer the questions briefly and concisely. Use the space provided for
your answer.

1. What is the purpose of proactive network troubleshooting?

2. Why proactive network troubleshooting important?

What I Can Do

__________________________________________________________________________________

What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.

ACTIVITY 6: Reflection

Direction: Read the famous quotation above. Write a reflection based on that
quotation and what you have learned from the lesson 2. Write your
output in a separate sheet.

1. Do you believe in a saying “Prevention is better than cure?”

23
2. How you relate that saying to Lesson 2 Proactive Network
Troubleshooting? Does lesson 2 also talked about prevention?

My Reflection

Assessment

_________________________________________________________________________________

Awesome! You made it to “Assessment.” A task will be given to you to


evaluate your level of mastery in achieving the learning competency.
Just be patient in answering it. Believe in yourself.

ACTIVITY 7. Multiple Choice

Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.

1. What is the purpose of proactive network troubleshooting?


A. Limit reactive network troubleshooting
B. Respond to a problem as they occur
C. Do the necessary repair of network breakdown
D. Do the necessary replacement of a defective network device

For the items 2, 3, 4, 5 ,6 and 7 use the selection below:


I. Redundant Array of Inexpensive Disks (RAID)
II. SNMP and other protocol-based management
III. Planning practices
IV. Network security
V. Developing Fail-Safe
VI. Network management system
VII. Documentation procedures

2. This provides data striping but no data redundancy at level 0. Which of the
proactive network troubleshooting approach was described?
A. I
B. II
C. III

24
D. IV

25
3. This ensures confidentiality, integrity, and availability of data. Which of the
proactive network troubleshooting approach was described?
A. I
B. II
C. III
D. IV

4. This serves as watchdog that send alert to the management system when it
detected that something is not right. Which of the proactive network
troubleshooting approach was described?
A. I
B. II
C. III
D. IV

5. This provides information, diagnostic tools, and problem-solving capabilities to the


network manager. Which of the proactive network troubleshooting approach was
described?
A. III
B. IV
C. V
D. VI

6. This provides rationale about the importance of a good plan. Which of the
proactive network troubleshooting approach was described?
A. III
B. IV
C. V
D. VI

7. This reduces the chances of failure in a device. Which of the proactive network
troubleshooting approach was described?
A. III
B. IV
C. V
D. VI

8. Which of following is an example of security measure?


A. Providing all access to every user using the same login access.
B. Putting passwords easy to remember.
C. Giving every user key to the server room
D. Limiting dial-up access

9. You want to save your device from failure due to sudden blackout. What Fail-Safe
device you should have?
A. RAID
B. SNMP
C. UPS
D. A spare device

10. Which part in planning that is concerned about being mission-critical?


A. Scope and timeline for changes or upgrades
B. Prioritization of task
C. Testing plan
D. Implementation
E. Retesting

26
11. Which device is required to provide a steady stream of continuous electrical
power to a server?
A. UPS
B. AVR
C. Switch
D. Router

12. Which RAID system provides no fault tolerance protection?


A. RAID level 0
B. RAID level 1
C. RAID level 3
D. RAID level 5

13. You need to design a fault tolerant system for backing up critical data stored on a
single network server. The system is in operation five days per week, Monday
through Friday. You want to be able to restore the data as fast as possible after a
hard disk drive failure. Which fault tolerance system will best meet the
requirement of restoring the lost data as quickly as possible?
A. Install a RAID level 0 system in the server.
B. Install a RAID level 1 system in the server.
C. Install a RAID level 3 system in the server.
D. Install a RAID level 5 system in the server.

14. Maria is public school teacher. She needs to connect to internet every day for
additional resources. She only uses less than 1GB of data every day. When she
checked internet bills, it was way too much she had used in a month. She
suspects that someone is stealing her data usage. What security measures she
must have to prevent others from stealing her internet data?
A. Install IPS/IDS in her network.
B. Install firewall hardware.
C. Subscribe to VPN network.
D. Install rogue connection detection in her system.

15. Is having a password enough?


A. Yes, if I changed them often.
B. Yes, if it is a complicated password.
C. No, I must have an authentication device to doubly verify access.
D. No, I must have used the mobile number of my best friend for verification.

Additional Activities

Amidst the challenges of the previous activities, you did well. That was
divine. The following activity will enrich your knowledge and skill of the
lesson learned. Enjoy doing this activity.

ACTIVITY 8: Research Activity

Direction: Do a small research.

27
Is proactive network troubleshooting the same as preventive maintenance? Why or
why not

Lesson Solving Common Network


3 Problems

Welcome to your third lesson!

What I Need to Know

_________________________________________________________________________________

To start with, let us try to find out the learning competencies in which you
are going to master at the end of this lesson.

SKILLS AND COMPETENCIES/OBJECTIVES:

At the end of this lesson you are expected to:

 Identify common network problems;


 Solve network problems, and
 Perform network troubleshooting.

What I Know

__________________________________________________________________________________

Before you start the lesson on diagnostic software, you need to


answer the following activity below. You will be challenged to dig
deeper into your prior knowledge and previous experiences. This
phase will guide you in assessing yourself on how much you have
known diagnostic software.

ACTIVITY 1

Direction: Discuss your answer to the question below. Write your output in your
Write your answers here:
activity notebook.
_______________________________________________________________
_______________________________________________________________
What are easy-to-do ways to solve network connection in laptop?
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
28
_______________________________________________________________
______________________________________

What’s In

__________________________________________________________________________________

You are done with Lesson 2 where you learned about proactive
network troubleshooting. So as a sort of review, kindly carry
out the activity below.

ACTIVITY 2. Big Questions, Key Words

Direction: Read the questions below and answer it with a just keyword. Write your
answer in your activity notebook.

1. Why is it important to do proactive network troubleshooting?

What’s New

__________________________________________________________________________________

Before you start the lesson on solving common network problems, you
need to do the activity below.

ACTIVITY 3. One-phraser

Direction: Identify the internet connection problem and give the possible solution.
Write your output in your activity notebook.

A. What will you do if suddenly you cannot connect to the internet? What could be
wrong? How could you fix it?

29
B. You are task to match security keys upon connecting, upon inputting the password
you find out that suddenly someone changes the password. What could be wrong?
How could you fix it?

C. You found out that the broadband router you use at home is malfunctioning. What
could be wrong? How could you fix it?

What is it

__________________________________________________________________________________

What are the common network problems? How to solve them?

When you suddenly cannot connect to the Internet, any of several things could
be wrong. Use this checklist to find and solve common Internet connection problems.

1. Unplugged Network Cable

Unplugged or loose network cables are one of the most common reasons why
you might suddenly find yourself unable to connect to the Internet. That's a problem
on wireless networks, but on most laptops the wireless-fidelity (Wi-Fi) radio can be
inadvertently shut off instead. On home networks, it's also possible that someone
unplugged the router.

Action: Ensure your wired or wireless network hardware is switched on and plugged
in.

30
2. Website Temporarily Offline

What may seem to be a network problem connecting to the Internet is


sometimes simply a Web site (or whatever server is on the other end of the
connection) being temporarily offline.

Action: Before assuming your Internet connection is faulty, try visiting several
popular Web sites rather than just one.

3. IP Address Conflicts

If your computer and another on the network both have the same IP address,
the conflict between them will prevent either from working properly online.

Action: To resolve an IP conflict, follow these instructions to release and renew your
IP address. If your network uses static IP addresses, manually change your IP to a
different number.

Step 1: Click Start > Run. In the Run window, enter “cmd” then click OK.

Step 2: On the command prompt, enter “ipconfig /release” then press [Enter].

Step 3: Once the IP address becomes 0.0.0.0, enter “ipconfig /renew” then press
[Enter].

31
4. Computer Firewall Malfunctions

Firewall software running on most computers is intended to prevent unwanted


network traffic from disrupting its operation. Unfortunately, these software firewalls
can malfunction and start blocking valid Internet traffic. When two software firewalls,
such as Windows Firewall plus a third-party product, are installed on the same
computer, contention between the two can also incorrectly block traffic.

Action: If you have recently installed or upgraded software firewalls on your


computer, temporarily disable them to determine whether it may be the cause of
Internet connection problems.

5. Outside Wireless Signal Range

The performance of Wi-Fi network connections depends on distance between


the device and the wireless access point. The farther away a Wi-Fi device is, the
slower the local connection generally runs, until it breaks altogether. Wireless signal
interference in the area can also limit the effective range of a Wi-Fi connection.
Whenever you are unable to reach the access point, you also cannot connect to the
Internet, obviously.

Action: Use one of the options written below to measure the strength of your wireless
signal and try these ideas to expand the range of your Wi-Fi. Ideally, you should
place the router at a height in some central location and away from other cordless
devices. Make sure that the router is not placed near something metallic (like an
almirah or window grills) as that will weaken the wireless signals. Avoid mirrors as
they can reflect the wireless signals away from the desired direction. Wireless routers
generally ship with omni-directional antennas, but you can replace them with more
powerful uni-directional antennas and that will keep the signal from getting broadcast
in all directions.

6. Wireless Network Configuration

Wi-Fi networks with encryption options like WPA or WEP turned on require
computers to use matching security keys when connecting. If someone changes the
encryption keys or password on the access point, devices that worked before will
suddenly be unable to establish sessions and Internet connections. Likewise (though
less likely), if the access point settings are changed to require using a specific Wi-Fi
channel number, some computers may be unable to discover it.

Action: Confirm that the Wi-Fi channel number and encryption keys on your router
have not recently changed (check with the network administrator if necessary). When
using a hotspot, follow the provider's instructors for signing in carefully.

7. Broadband Router or Access Point Malfunctions

Home networks that use broadband routers are easier to manage than those
without one, but technical glitches with the router can also prevent computers from
connecting to the Internet. Router failures are caused by overheating, excessive
traffic, or simply a faulty unit. Typical symptoms of a flaky router include computers on
the network not being able to obtain IP addresses, or the router console not
responding to requests.

32
Action: Check the router's lights and console if possible to ensure it is running and
responding properly. Troubleshoot and reset the router if necessary. Change the old
router if necessary.

8. Blocked By Your Service Provider

Internet Service Providers (ISPs) can choose to block access from your
account if you fail to make payment or otherwise violate the provider's Terms of
Service. Especially when using paid hotspots that charge by the hour or day,
sometimes people forget to keep their subscription updated. Other common reasons
an ISP might block your account include exceeding bandwidth caps, sending spam e-
mail, and downloading illegal or inappropriate content.

Action: Contact your ISP if you suspect your account has been blocked.

9. Computer Glitches

Computers suffer from technical glitches or malfunctions. Although relatively


uncommon nowadays, a computer's network adapter hardware might suddenly fail
due to overheating or age. Failures in the operating system software that control the
adapter, on the other hand, can occur frequently especially with computers that are
heavily used. Viruses and worms also may disable or block a computer's network
interfaces from functioning properly. If using a laptop or other mobile device,
transporting it from one location to another can corrupt the state of its network.

Action: Check the computer and remove any malware that you will find. On Windows
computers, try resetting the network connection. Reboot the computer if necessary.

10. Network Downtime

Those using satellite Internet service may notice they cannot connect to the
Internet during periods of very bad weather. Providers in dense urban areas
(including cellular Internet carriers) sometimes are unable to support peaks in
network traffic that causes sporadic outages for some customers. Finally, those who
subscribe to newer or more complex forms of Internet services (such as fixed
wireless broadband) may experience more downtime than others as providers
encounter more issues with relatively less mature equipment.

Action - If all else fails, contact your Internet provider to verify whether they are
experiencing an outage. Some providers also give advice on troubleshooting
problems connecting to their network.

33
What’s More

__________________________________________________________________________________

The succeeding activity is for your independent practice to solidify your


understanding and skills of the topic.

ACTIVITY 4. Identifying Network Problems

Direction: Solve the internet connection problems below. Show your answers in a
technological manner. Refer to the lessons discussed as working
reference. Write your output in a separate sheet.

Problems Action

1. Unplugged Network Cable


2. Website Temporarily Offline
3. IP Address Conflicts
4. Computer Firewall Malfunctions
5. Outside Wireless Signal Range
6. Wireless Network Configuration
7.Broadband Router or Access Point
Malfunctions
8.Blocked By Your Service Provider
9.Computer Glitches
10.Network Downtime

ACTIVITY 5. Responding Network Problems

Direction: Imagine you are in a computer class and the computer you are
assigned has an IP Address conflicts with another computer. Give the
steps in resolving the problem.

34
What I Have Learned

__________________________________________________________________________________

What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson. You can do
it.

ACTIVITY 6. Learning Reflection

Direction: Complete the statement. Write your understanding of the topic


presented in the given format.

Today, I learned that _______________________________________________


________________________________________________________________
________________________________________________________________
________________________________________________________________

Because of this, I now solve it by _____________________________________


________________________________________________________________
________________________________________________________________
________________________________________________________________

What I Can Do

__________________________________________________________________________________

What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.

ACTIVITY 5: I’m A Technician Assistant

Directions: Visit a school’s computer laboratory or a computer shop near you.


Discuss to the in-charge the common internet connection problems
relating to the discussed topics. In the worksheet provided below, write
the computer errors/problems, error messages and the network
problems they encountered.

35
Your performance will be assessed according to this rubric:

Excellent Good Poor


(5) (4) (3)
Network Assessed network problems
Problems
Word- based Explanations are with reference
evidence
Details Important details
were included.
Handwriting Legible. Good spacing and
alignment.
Total Points

Assessment

_________________________________________________________________________________

Awesome! You made it to “Assessment” part. A task will be given to you


to evaluate your level of mastery in achieving the learning competency.
Just be patient in answering it. Believe in yourself.

ACTIVITY 7. Connectivity Problem

Direction: Solve the network connectivity problems below. Write your output in
your activity notebook.

Situation 1: One fine Saturday morning, you and your sister decided to watch an
instructional video to answer her subject assignment. Your little siblings come out and
play all over the place. Suddenly, you find yourself unable to connect the internet.

36
Problem/s:
_________________________________________________________________
_________________________________________________________________
Action/Solution:
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

Situation 2: How can bad weather condition extremely affect the network
connectivity problem of a user?
Problem/s:
__________________________________________________________________
________________________________________________________________
Action/Solution:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
______________________________________________________________

Your performance will be assessed according to this rubric:


Excellent Good Poor
(5) (4) (3)
Problems Problem/s were enumerated
Word based evidence Explanations are with reference
Details Important details were included.
Handwriting Legible. Good spacing and
alignment.
Total Points

37
Additional Activities

Amidst the challenges of the previous activities, you did well. That was
divine. The following activity will enrich your knowledge and skill of the
lesson learned. Enjoy doing this activity.

ACTIVITY 8. Past and Future

Direction: Write about a computer or network problem your have already


encountered and how did you resolve it? Then, opposite to it, write the
correct way of troubleshooting it.

38
Lesson

4 Server Stress Test

Welcome to your fourth lesson!

What I Need to Know

_________________________________________________________________________________

To start with, let us try to find out the learning competencies in which you
are going to master at the end of this lesson.

SKILLS AND COMPETENCIES/OBJECTIVES:

At the end of this lesson you are expected to:

 identify server stress testing;


 discuss server stress testing; and
 perform server stress test.

What I Know

__________________________________________________________________________________

Before you start the lesson on server stress test, you need to
answer the following activity below. You will be challenged to dig
deeper into your prior knowledge and previous experiences. This
phase will guide you in assessing yourself on how much you have
known burn-in test.

ACTIVITY 1: Multiple Choice

Direction: Identify the answer on each item. Write your answer in your activity
notebook.

1. What do you call of a server stress test that test on the capability of each
computer?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test

39
40
2. What do you call of a server stress test signals the system to shutdown and
restart?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test

3. What do you call of a server stress test that has workloads that operate in user
level?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test

4. What do you call of a type of test where a computer, device or component is run
for an extended length of time in order to identify any potential problems?
A. Burn-in Test
B. Network Test
C. Restart Test
D. Shutdown Test

5. Why undergo stress-test?


A. ensure the reliability and stability of your system
B. individual tests of the capabilities of the system
C. reveal any problems or defects within a system
D. test signals the system to shut down and restart

What’s In

__________________________________________________________________________________

You are done with Lesson 3 where you learned about solving common
network problems. So as a sort of review, kindly carry out
the activity below.

ACTIVITY 1: My Opinion Piece

Direction: Write an opinion piece based on the topic. Follow the structure to
organize your thoughts.

Why is it important to provide actions in resolving network problems and its


relationship in testing the capacity of the newly resolved problem?
Opinion:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
____________
Reason and Example:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
____________
41
What’s New

__________________________________________________________________________________

Before you start the lesson on server stress test, you need to do the
activity below.

ACTIVITY 3: Burned Experience

Direction: Explain your answer to the question below.

Write
Have youyour answers here:
experienced being burnt out? Tell a situation you experienced about being
________________________________________________________________
burnt out and what did you realize about the experience?
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
_____________________________

What is it

___________________________________________________________________

What is Burn-In Test or Stress Test?

In computer testing, a burn-in test or stress-test is a type of test where a


computer, device or component is run for an extended length of time in order to
identify any potential problems. It aims to reveal any problems or defects within a
system by operating it in the most rigorous, extreme, or extended working conditions.

Why undergo stress-test?

Simple: To ensure the reliability and stability of your system. Even if a


computer boots up and performs well under normal usage, fickle hardware can cause
woes when you step up to heftier tasks, such as gaming or video editing. Stress-
testing software places your components under an intense workload to simulate a
worse-case scenario; if a component crashes, hangs, or otherwise fails a dedicated
stress test, there’s a good chance that it won’t be reliable under a heavy everyday

42
load. It’s best to uncover unstable components sooner rather than later, while they’re
still under warranty.

Running stress tests can also let you know if you need additional cooling in
your computer. If a graphics card or overclocked CPU consistently overheats and
shuts down during a stress test, it is time to dump the stock cooler, add a few case
fans, and possibly even consider liquid cooling.

Windows Server testing is primarily stress-oriented testing that include


client/server I/O, network stress, CPU consumption, and memory consumption. The
specific test you must run depends on the features that you implement on the server.

Kinds of Server Stress Testing

1. System functionality tests

The system functionality tests are individual tests of the capabilities of the
system. Some tests are run for every system, and some tests only run if the capability
exists in the system.

2. System stress test

The System Stress Test consists of several server scenario workloads that
operate from the user level address space that is applied to the system to exercise
the system hardware, system-specific devices and drivers, network and storage
adapters and drivers, and any filter drivers that might be part of the system
configuration, such as multipath storage drivers, storage or file system filter drivers,
or intermediate layer network drivers.

The workloads applied are


 SQL I/O Simulation
 Local Storage I/O
 Disk Stress with Verification
 Client-Server Storage I/O
 Winsock Network Traffic

3. Shutdown/Restart Test

The server test also includes a shutdown and restart test. This test signals the
system to shut down and restart. The test records the event log information related to
shutting down and restarting the system, such as vetoes that prevent shutdown, the
startup event, and any driver errors that are received after restarting the system. This
test makes sure that all device drivers in the system comply with system shutdown,
do not veto, and cleanly restart in the system without conflicting with other drivers.

43
What’s More

__________________________________________________________________________________

The succeeding activity is for your independent practice to solidify your


understanding and skills of the topic.

ACTIVITY 4: Burn-in Testing

Direction: Perform the procedure of burn-in testing below. Follow the procedures
given. Write a reflection right after. Guide questions are provided. Write
your observations in the activity notebook.

Materials Needed: Laptop or Personal Computer, Activity Notebook


Source: https://www.wikihow.com/Stress-Test-a-Computer

1. Close all open programs.

2. Right click the bottom bar


(taskbar) on a windows
computer and select Task
Manager. Or, hit the keys
Ctrl + Alt + Delete and
then select Task Manager.

44
3. If you have a slow
internet connection and
were looking to test a
network intensive
program, use the
networking tab info;
otherwise select the
performance tab.
Here are some live
graphs of your
computer. These will go
up when we test it.

4. Test your computer. Start


opening as many
programs and clicking as
many things as you can.
Watch the effect in the
task manager.

5. Watch the
RAM/memory part -
RAM ranges from
256 MB to 512 MB to
1 GB to 2 GB and
even 4 GB. Note:
512 MB is 1/2 GB. If
you have KB's of
RAM, it's time to
upgrade. When you
open a program and
see the small box
with the programs
name while it is
loading, the program
is loading from the

45
hard disk to the RAM. The more RAM you have, the more programs you can
run at once.

6. Processor/CPU
- the spikier
graph
represents the
processor or
CPU of your
computer. Do
you have
enough "Intel"
inside? If the
computer
doesn't respond
as fast as you
like when you
click
something, you
may consider a
new computer
with a faster processor.

7. If you already
tested your
computer, you may
wish to do so
again if you did not
read about RAM
and CPU first.
Close all programs
and wait for the
CPU to settle, then
If you see that your
processor of RAM
maxes out and hits
the top of the
graph area under
normal activity,
you should
consider more
RAM, or a new computer with a faster processor.

Guide Questions:
1. How was the experience doing the burn-test or stress test?
2. What was the result of the stress-test of your computer?
3. What would you like to recommend to the owner of the computer?

46
Your performance will be assessed according to this rubric:

Criteria Score
Adherence to instruction 10
Details 10
Accuracy 10
TOTAL 30

What I Have Learned

__________________________________________________________________________________

What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson. You can do
it.

ACTIVITY 5 Importance of Burn-in Test or Stress Test

Direction: Answer the question below. Write your answer in your activity notebook.

Why is it necessary to perform stress test in your computer? Give at least two points
of its importance.

47
What I Can Do

__________________________________________________________________________________

What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.

ACTIVITY 6: Network Checking

Direction: Carefully read the situation below and assess what type of stress test
should be applied. Write your answer in activity notebook.

Helen is a Computer Laboratory Incharge in Salawagan National High School.


She decided that since it’s a holiday, shell grab the chance and perform the stress on
the each of the computer to test its individual capability.

What is the right stress test should Helen perform? Why?

Your performance will be assessed according to this rubric:

Criteria Score
Accuracy 10
Details 10
Reasoning 10
TOTAL 30

48
Assessment

_________________________________________________________________________________

Awesome! You made it to “Assessment” part. A task will be given to you


to evaluate your level of mastery in achieving the learning competency.
Just be patient in answering it. Believe in yourself.

ACTIVITY 7: Multiple Choice

Direction: Identify the answer on each item. Write your answer in your activity
notebook.

1. What do you call of a server stress test that test on the capability of each
computer?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test

2. What do you call of a server stress test signals the system to shutdown and
restart?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test

3. What do you call of a server stress test that has workloads that operate in user
level?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test

4. What do you call of a type of test where a computer, device or component is run
for an extended length of time to identify any potential problems?
A. Burn-in Test
B. Network Test
C. Restart Test
D. Shutdown Test

5. Why undergo stress-test?


A. ensure the reliability and stability of your system
B. individual tests of the capabilities of the system
C. reveal any problems or defects within a system
D. test signals the system to shut down and restart
E. all of the above

49
Additional Activities

_________________________________________________________________________________

ACTIVITY 8: Advance Study

Direction: Give your opinion about the chart below. Would you agree to it? Why or
why not? Write your answer in a separate sheet.

Figure 1 Different Stages of Maintenance

Your performance will be assessed according to this rubric:

Criteria Score
Accuracy 10
Details 10
Reasoning 10
TOTAL 30

50
Assessment

_________________________________________________________________________________

POST-TEST

Direction: Read each question in the left-hand column of the chart. Mark a check
opposite each question to indicate your answer.

I can… YES NO
- Explain what is meant by reactive network
troubleshooting
- Describe a systematic approach to problem
solving network situations
- Give examples of reactive network troubleshooting
- Identify the purpose of proactive network
troubleshooting
- Give examples of proactive network
troubleshooting approach
- Appreciate the importance of network security as
a proactive approach to network troubleshooting
- Identify common networking problems
- Solve network problems
- Perform network troubleshooting
- Repair of materials, components, or parts
- Replace defective components, or parts
- Use appropriate PPE
- Create contingency plan
- Respond to unplanned events or conditions
- Perform server stress test

51
52
Lesson 1
What’s More What I Can Do Assessment
Step 1: Five computers cannot 1. Cannot connect to internet 1. A
communicate to the server while the 2. check physical connection and 2. B
rest can. hardware, diagnose problem through 3. A
ping 4. B
Step 2: (answer may vary according
3. Follow the suggested jobs to do 5. E
to the learner) 6. D
Step 3: Loose connection of access listed in the description of job and 7. C
point the follow the scientific method of 8. C
Step 4: Use ping to test step 3 problem-solving by test the 9. B
Step 5: Plug / unplug cable, and then hypothesis stated in the remarks. 10. E
turn-off and on access point
Lesson 2
What’s More What’s More (Continuation) Assessment
Confidentiality Availability 1. A
- Online Data Trackers - Unauthorized Internet Data 2. A
Access 3. D
- Unauthorized access to cellphone 4. B
- Malware - Unauthorized access to cellphone 5. D
- Malware 6. A
Integrity 7. C
What I Have Learned 8. D
- Unauthorized Internet Data Access 9. C
- Unauthorized Access to Cellphone 1. limit reactive network 10. A
- Malware troubleshooting activities 11. A
2. proactive network 12. A
troubleshooting minimizes the 13. B
14. D
occurrence of network breakdown. 15. C
Lesson 3
What’s More What’s More Assessment
Activity 4: Activity 5 Situation 1:
1. Reconnect cable Step 1. open Problem: Loosened cables
2. Try another website command line and wirings
3. Use “ipconfig /release” and “ipconfig window Solution: Connect and
/renew” in the command prompt Step 2. perform disconnect cables, Trace
4. Temporarily disable firewalls to “ipconfig loosened wirings
diagnose the problem, then uninstall /release” Situation 2:
upgrade if it is the cause. command Problem: Bad weather
5. Look for location that captures Step 3. perform condition
stronger signal “ipconfig /renew” Solution: Contact ISP for
6. Confirm Wi-Fi Channel number and command advice
encryption keys
7.
8.
9.
10.
_________________________________________________________________________________
Answer Key
53
Lesson 4
What I Know What I Can Do
1. A Helen must perform the system
2. C functionality tests on each of her system.
3. B
4. A
5. E Assessment
1. A
What I Have Learned 2. C
(any two of the following) 3. B
ensure the reliability and stability of 4. A
your system 5. E
individual tests of the capabilities of
the system
reveal any problems or defects within
a system
test signals the system to shut down
and restart
_________________________________________________________________________________
Answer Key
References

“A Plus 220-1001 - Exam Objective 5.1.” CertBlaster. Available from:


https://www.certblaster.com/a-plus-220-1001-exam-objective-5-1/ [Accessed 22
August 2020].

“Basic Network Troubleshooting Steps and Tools.” Software Testing Help.


Available from: https://www.softwaretestinghelp.com/network-troubleshooting-
steps-tools/ [Accessed 2 August 2020].

“Basic Troubleshooting Strategies Worksheet - Basic Electricity.” All About


Circuits, May 25, 2017. Available from:
https://www.allaboutcircuits.com/worksheets/basic-troubleshooting-strategies/.

Bay Networks, Inc. , 1995. Introduction to Network Management. Billerica,


Massachusetts: Bay Networks, Inc.

Bay Networks, Inc., 1995. Network Management with Optivity for Windows.
Billerica, Massachusetts: Bay Networks, Inc.

Becta, 2003. Preventive Maintenance. ICT Advice. Updated last March 2004.
Available from: http://www.becta.org.uk/tsas.

Borysowich, Craig. “Defining a Network Contingency Plan.” Toolbox, November


30, 2001. Available from: https://www.toolbox.com/tech/enterprise-
software/blogs/defining-a-net work-contingency-plan-040408/.

C, Published: by Kate, and Kate C. “Creating Windows Server 2008 System


Restore Point.” MSP360 Blog, November 14, 2018. Available from:
https://www.msp360.com/resources/blog/windows-server-2008-system-restore-
point/ [Accessed 15 June 2020].

“Cisco Press.” > Objectives | Cisco Press, March 12, 2012. Available from:
https:// www.ciscopress.com/articles/article.asp?p=2086239&seqNum=4 IT
[Accessed 12 June 2020].

Craft, Melissa, Poplar, Mark A., Watts, David V. and Willis, Will, 1999. Network +.
Scottsdale, Arizona: The Coriolis Group, LLC.

Groth, David, Bergensen, Ben and Catura-Houser, Tim, 1999. Network+ Study
Guide. Alameda, California: Sybex Inc.

54
“How to Maintain Your Server.” Boost IT, May 15, 2020. Available from:
https://www.boostitco.com/how-to-maintain-your-server/ [Accessed 12 June
2020].

Jain, Minakshi. “Corrective Maintenance: Definition, Objective and Limitations.”


Your Article Library. Available from: https://www.yourarticlelibrary.com/maint
enance-management/corrective-maintenance-definition-objectives-and-limitations
/90694 [Accessed 12 June 2020].

Lammle, Todd., 2009. CompTIA Network ® Deluxe Study Guide. Indianapolis,


Indiana: Wiley Publishing, Inc.

“Network Maintenance.” NetworkLessons.com, February 13, 2020. Available


from: https://networklessons.com/cisco/ccie-routing-switching-written/network-
maintena nce [Accessed 15 June 2020].

“Network Maintenance Fundamentals Overview.” wwwhowtonetworkorg.


Available from: https://www.howtonetwork.org/tshoot/module-1/network-
maintenance-fundamentals-overview/ [Accessed 12 June 2020].

“Network Troubleshooting: Steps, Techniques, & Best Practices.” DNSstuff,


September 16, 2019. Available from: https://www.dnsstuff.com/network-
troubleshooting-steps.

Occupational Safety and Health Center, Department of Labor and Employment,


Republic of Philippines. “BOSH Manual Narrative Handout.” Basic Occupational
Safety and Health Training - Let's go for ZAP, n.d., 1–254. Available from:
http://oshc.dole.gov.ph/images/OSHTrainingAnnouncement/BOSH-Manual_Narr
ative-Handout .pdf.

Palmer, Michael J. Ph.D,, 1998. Hands-On Networking Essentials with Projects.


Cambridge, Massachusetts: Course Technology.

Parnell & Null, 1999. Network Administrator’s Reference. Berkeley, California:


Osborne/McGraw-Hill.

Peralta, Fren Marlon, 2020. Protecting the Organization, Module 4 – Introduction


to Cybersecurity, MIT 315 IT Specialization. Xavier University-Ateneo de
Cagayan, Faber Hall. Available from: XU eLearn http://elearn.xu.edu.ph/.

“Repair vs Rectify - What's the Difference?” WikiDiff, August 17, 2020. Available
from: https://wiki diff.com/repair/rectify.

55
Sheldon, Tom, 1998. LANTIMES Encyclopedia of Networking, Electronic Edition.
Berkeley, Califoria: Osborne/McGraw-Hill.

Sommer, Reena. “What is Preventive Maintenance? I 6 Step Preventive


Maintenance Program.“ Easy CMMS for All Maintenance I Hippo CMMS. Last
modified January 13, 2020. Available from: https://www.hippocmms.com
/blog/preventive-maintenance-program-in-six-steps#

SuperTechman. “Server and Network Maintenance Checklist.” SuperTechman,


December 27, 2019. Available from: https://supertechman.com.au/server-and-
network-maintenance-checklist/.

Teaching Commons I Teaching Commons. Available from:


https://teachingcommons.lakeheadu.ca/sites/default/files/inline-files/journal
%20writing%20rubric.pdf [Accessed 11 June 2020].

TESDA Online Program: Log in to the site. Available from: https:// www.e-
tesda.gov.ph/course/view.php?id=73 [Accessed 16 August 2020].

“TSHOOT: Troubleshooting and Maintaining Cisco IP Networks.” TSHOOT_


WB01.pdf, n.d. [Accessed June 17, 2020].

“TLE ICT GRADE 10 LM.” Academia.edu – Share Research. Available from:


https://www. academia.edu//38068598/TLE_ICT_GRADE_10_LM.

“Types of Maintenance: The 9 Different Strategies Explained.” ROAD to


RELIABILITY™. Available from: https://roadtoreliability.com/types-of-
maintenance/#Preventive_Maintenance_vs_Corrective_Maintenance [Accessed
18 June 2020].

Viloria, Leah and Reyes, Clint, 2020. Analysis and Design of Cybersecurity for
Salawagan National High School, Technical Report, MIT 315 IT Specialization.
Xavier University-Ateneo de Cagayan, Faber Hall.

wikiHow. “How to Stress Test a Computer.” wikiHow. wikiHow, August 10, 2018.
Available from: https:// www. wiki how .com/Stress-Test-a-Computer.

Windows-Driver-Content. “Server Testing Overview.” Microsoft Docs. Available


from: https://docs.microsoft.com/en-us/windows-hardware/test/hlk/test ref/server-
testing-overview [Accessed 10 June 2020].

For inquiries and feedback, please write or call:

Department of Education - Division of Bukidnon


Office Address: Fortich Street, Sumpong, Malaybalay City, Bukidnon
Telefax: (088) 813-3634
E-mail Address: bukidnon@deped.gov.ph
Website: depedbukidnon.net.ph

56

You might also like