You are on page 1of 73

COMPETENCY-BASED LEARNING MATERIALS

SECTOR:
ELECTRONICS
QUALIFICATION:
COMPUTER SERVICING NC II
UNIT OF COMEPETENCY:
Set-Up Computer Networks
MODULE TITLE:
Setting-Up Computer Networks
PREPARED BY: VENCENT P. BUELLA
Polytechnic Institute of Tabaco
100 Panal, Tabaco City
COMPUTER SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Install and configure Installing and


computer systems configuring computer ELC724331
1.
systems

Set-up Computer Setting-up Computer ELC724332


2. Networks Networks

Set-up Computer Setting-up Computer ELC724333


3. Servers Servers

Maintain and Repair Maintaining and


Computer Systems Repairing Computer ELC724334
4.
and Networks Systems and Networks
HOW TO USE THIS COMPETENCY- BASED LEARNING
MATERIALS

Welcome!
The unit of competency, “Set-up Computer Networks”, is one of the
competencies of COMPUTER SERVICING NC II, a course which comprises
the knowledge, skills and attitudes required for a TVET trainer to possess.
The module, Setting-up Computer Networks, contains training materials and
activities related to identifying learner’s requirements, preparing session
plan, preparing basic instructional materials and organizing learning and
teaching activities for you to complete. In this module, you are required to
go through a series of learning activities in order to complete each learning
outcome. In each learning outcome are Information Sheets, Self-Checks,
Task Sheets and Job Sheets. Follow and perform the activities on your own.
If you have questions, do not hesitate to ask for assistance from your
facilitator.

Remember to:

 Read information sheets and complete theself-checks. Suggested


references are included to supplement the materials provided in this
module.

 Perform the Task Sheets and Job Sheets until you are confident that your
outputs conform to the Performance Criteria Checklist that follows the
sheets.

 Submit outputs of the Task Sheets and Job Sheets to your facilitator for
evaluation and recording in the Accomplishment Chart. Outputs shall
serve as your portfolio during the Institutional Competency Evaluation.
When you feel confident that you have had sufficient practice, ask your
trainer to evaluate you. The results of your assessment will be recorded in
your Progress Chart and Accomplishment Chart. You must pass the
Institutional Competency Evaluation for this competency before moving to
another competency. A Certificate of Achievement will be awarded to you
after passing the evaluation. You need to complete this module before you
can perform the module on Setting-up Computer Servers.
MODULE CONTENT

UNIT OF COMPETENCY: SET-UP COMPUTER NETWORKS

MODULE TITLE: SETTING-UP COMPUTER NETWORKS

MODULE DESCRIPTOR: This module covers the outcomes required in


setting-up computers networks for LANs and
small-office home-office (SOHO) systems.

NOMINAL DURATION: 54

LEARNING OUTCOMES:
At the end of this module you MUST be able to:
 LO1. Install network cables
 LO2. Set network configuration
 LO3. Set router/Wi-Fi/ wireless access point/repeater
configuration
 LO4. Inspect and test the configured computer networks

ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network
design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies
and procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program. Network connectivity of
each terminal is checked in accordance with network design.
10. Any fault or problem in the network system is diagnosed and remedied
in line with the standard operating procedures.
11. Network interface card (NIC) settings are configured in accordance with
network design.
12. Communication checking between terminals are carried out in
accordance with OS network configuration guides
13. Unplanned events or conditions are responded to in accordance with
established procedures
14. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
15. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
16. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
17. Wireless settings are configured in accordance manufacturers’
instructions, network design and end-user preferences
18. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end-user preferences
19. Final inspections are undertaken to ensure that the configuration done
on the computer networks conforms with the manufacturer’s
instruction/manual
20. Computer networks are checked to ensure safe operation.
21. Reports are prepared/completed according to company requirements.
LEARNING OUTCOME NO. 1
INSTALL NETWORK CABLES
Contents:

1. Computer network concepts


2. Network design
3. Network materials
4. Network cable splicing and cable testing
5. Network cable installation

Assessment Criteria

1. Cable routes are determined and planned in accordance with network


design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies
and procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program

Conditions

The participants will have access to:

1. Personal Protective equipment ( ex. protective eyewear, anti


static wrist wrap)
2. Electronic laboratory hand tools (assorted pliers, assorted
screw drivers)
3. LAN tester
4. Crimping tools
5. RS 232 pin exertion/ extraction tool
6. Device drivers , operating system
7. Appropriate software application programs
8. Diagnostic software or utilities
9. Hand-outs

Assessment Method:

1. Hands-on
2. Direct observation
3. Practical demonstration
Learning Experiences
Learning Outcome 1
INSTALL NETWORK CABLES

Learning Activities Special Instructions


Read Information Sheet 2.1-1 in Remember and understand the
Computer Network Concepts concepts in computer networking
Answer Self-Check 2.1-1 in Try to answer self-check without
Computer Network Concepts looking at the answer key
Compare answer using Answer Key Double Check the answer in case
2.1-1 you forgot to answer correctly using
self-check
View Multimedia Presentation in Ask your trainer the available video
Computer network concepts and power point presentation
Read Information Sheet 2.1-2 in Memorize and understand the set-
Network design up of the network
Answer Self-Check 2.1-2 in Network Try to answer self-check without
design looking at the answer key
Compare answer using Answer Key Double Check the answer in case
2.1-2 you forgot to answer correctly using
self-check
Read Information Sheet 2.1-3 in Try to memorize and be familiar
Network materials with the network materials
Answer Self-Check 2.1-3 in Network Try to answer self-check without
materials looking at the answer key
Compare answer using Answer Key Double Check the answer in case
2.1-3 you forgot to answer correctly using
self-check
Read Information Sheet 2.1-4 in Remember and memorize the steps
Cable splicing and testing or procedures in splicing and
testing of network cables
Answer Self-Check 2.1-4 in Cable Try to answer self-check without
splicing and testing looking at the answer key
Compare answer using Answer Key Double Check the answer in case
2.1-4 you forgot to answer correctly using
self-check
Perform Task Sheet 2.1-4 on Cable Always use the proper tools and
splicing and testing equipment
Rate your own performance using Repeat the task if you fail to
Performance Criteria Checklist 2.1-4 achieve the criteria
Read Information Sheet 2.1-5 in Memorize and remember the
Network cable installation procedures
Answer Self-Check 2.1-5 in Try to answer self-check without
Computer Network Concepts looking at the answer key
Compare answer using Answer Key Double Check the answer in case
2.1-5 you forgot to answer correctly using
self-check
Perform Task Sheet 2.1-5 on Wear PPE and use proper tools
Network cable installation
Rate your own performance using Repeat the task if you fail to
Performance Criteria Checklist 2.1-5 achieve the criteria
Information Sheet 2.1-1
Computer network concepts

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the different types of network topologies.
2. Classify networks by geography and by component roles.

This information sheet will cover the basic concept of networking,


classification of network and different network topologies. This will also
cover their functions and differences.

BASIC NETWORK CONCEPTS


COMPUTER NETWORKS

A computer network consists of two or more computing devices that


are connected in order to share the components of your network (its
resources) and the information you store there. The most basic
computer network (which consists of just two connected computers)
can expand and become more usable when additional computers
join and add their resources to those being shared.

A computer network can be as simple as two or more computers


communicating

NETWORK CLASSIFICATIONS

 Networks by Their Geography

Networks are frequently classified according to the geographical


boundaries the network spans..
 Local Area Network (LAN)

If the network is contained within a relatively small area, such


as a classroom, school, or single building it is commonly
referred to as a local area network (LAN). This type of
network has the lowest cost and least overall capability of the
three geographic classifications. Because the pieces of
equipment in a LAN are in relatively close proximity, LANs are
inexpensive to install. Despite their decreased capability,
however, their closeness and resultant low costs typically
result in the use of the fastest technology on a LAN. Thus, this
network classification usually has the highest speed
components and fastest communications equipment before the
other network classifications see such equipment using the
same speeds. This is because it takes less overall investment
to get the smaller network running the faster equipment.
LANs, therefore, are commonly considered the building blocks
for creating larger networks.

A LAN covers a relatively small distance.

 Metropolitan Area Network (MAN)

As the computers get further apart, a LAN becomes more


difficult to install, and additional measures such as additional
communications equipment may need to be employed. When
the network spans the distance of a typical metropolitan city it
can be referred to as a metropolitan area network (MAN).
Although this term is beginning to lose its popular use, the
concept of the network outgrowing its local confines and
requiring additional resources still applies. Much of the same
technology, such as the fast networking components and
communications equipment used in LANs, can be used in
MANs, but more are required, so this classification is not quite
as technologically advanced as are LANs. Although the speeds
achieved in a MAN are typically as high as in a LAN, it requires
high-speed connections, such as fiber optics. Increasing the
distance and the technology levels increases the relative
installation and operation costs of MANs.
The MAN covers a somewhat wider area than a LAN.

 Wide Area Network (WAN)

The MAN outgrows its usefulness when the network must


expand beyond the confines of the typical metropolitan area.
When the network spans a larger area it is classified as a wide
area network (WAN). Because of the extensive distances over
which WANs communicate, they use long-distance
telecommunications networks for their connections, which
increase the costs of the network. The Internet is just a giant
WAN.

The WAN covers an extremely wide area and involves


numerous transmission technologies

 Networks by Component Roles

Another method used to classify networks focuses on the roles the


networked computers play in the network’s operation, and more
specifically on which computer controls that operation.

 Peer-to-Peer Networks

A peer is considered an equal. All computers on a peer-to-


peer network can be considered equals. That is to say, no one
computer is in charge of the network’s operation. Each
computer controls its own information and is capable of
functioning as either a client or a server depending on which is
needed at the time. Peer-to-peer networks are popular as
home networks and for use in small companies because they
are inexpensive and easy to install. Most operating systems
(the software that runs the basic computer functionality) come
with peer-to-peer networking capability built in.

Peer-to-peer networks have no centralized control.

 Server-Based Networks

Unlike peer-to-peer networks that operate without central


control and are difficult to secure, a server-based network
offers centralized control and is designed for secured
operations, as shown in Figure 1.10. While there are still both
clients and servers on a server-based network, a dedicated
server controls the network. A dedicated server is one that,
for all practical purposes, operates solely as a server. A
dedicated server on a server-based network services its
network clients by storing data, applications, and other
resources, and then providing access to those resources when
called for by a client. When a client requests a resource such
as a document, the server sends the whole resource (the
document) over the network to the client, where it is processed
and later returned to the server for continued storage.

Server-based networks involve centralized control.


 Client-Based Networks

Client-based networks are a further refinement to the


concept of a server based network that relieves the heavy
burden on the network’s capacity resulting from frequent
server-performed transactions. A client-based network takes
better advantage of the server’s powerful processors and of the
increasingly powerful computers used in typical workstations.
A client based network utilizes a client workstation’s power in
processing some functions locally while requesting additional
processing from a server whenever it is needed for increased
speed. Client-based network servers process requests from
clients and return just the results, rather than sending the
original resource to the client to be processed and returned
after computations are complete. Client-based networks,
therefore, take advantage of the powerful processing
capabilities of both the client and the server. This type of
arrangement may include application servers (where entire
computer programs are shared from the server) and
communications servers (where e-mail and other
communications media are operated).

A client-based network takes advantage of the power of both


the server and the client alike.

NETWORK TOPOLOGIES

Topology defines the structure of the network. There are two parts
to the topology definition, the physical topology, which is the actual
layout of the wire (media), and the logical topology, which defines
how the media is accessed by the hosts. The physical topologies that
are commonly used are the Bus, Ring, Star, Extended Star,
Hierarchical, and Mesh.

 BUS Topology

This topology connects all stations to one circuit running


through the entire network. Data is being broadcast to the
entire network therefore it pass directly from one computer to
another, or it may be routed through a head end controller
and then sends it back down the cable in opposite direction.

 Star Topology

In this topology all stations are connected or wired into a


central wiring connector or network device that route message
to the appropriate computer. Each computer is linked by a
separate point to point circuit through the central
concentration point. Like BUS topology, data are broadcasted
from one station to another station they are repeated in all
port.

HOST

 RING Topology

A method of communication wherein all computers are


connected in a closed loop. Each device connected in a closed
loop. Each HOST
device connected to the network, receives data in a
circular fashion. Normally a token is passed between each
node to give each node to give each node attached to the
network a turn.

HOST

 NET or MESH Topology

In this topology every computer in a network is connected to


every other computer by its own point communication circuit.
This kind of topology is seldom used because of extremely high
cost.
 TREE Topology

The Tree topology is a structure containing zero or more nodes


that are linked together in a hierarchical fashion. The top most
devices is called root. That root can have zero or more child
nodes connected by edges or link. The root is the parent node
to its children. Each node can in turn zero or more children
nodes of its own. The nodes sharing the same parents are
called siblings.

 IRREGULAR Topology

The irregular topology in another type that falls under point to


point networks. With the loss of computer cables connected
directly to each other in a net or mesh topology, it becomes a
irregular topology.
Self- Check 2.1-1

Multiple Choice: Select the letter that corresponds to the correct answer.

1. In this topology every computer in a network is connected to every


other computer by its own point communication circuit.
a. BUS Topology
b. NET or MESH Topology
c. RING Topology
d. TREE Topology
2. In this network each computer controls its own information and is
capable of functioning as either a client or a server depending on
which is needed at the time.
a. Client-Based Network
b. Local Area Network
c. Metropolitan Area Network
d. Peer-to-Peer Network
3. This network is contained within a relatively small area, such as a
classroom, school, or single building
a. Client-Based Network
b. Local Area Network
c. Peer-to-Peer Network
d. Wide Area Network

.
ANSWER KEY 2.1-1

1. B

2. D

3. B

Information Sheet 2.1-2


Network Design

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:

1. List the factors to be considered in designing networks.


2. Recognize the network diagrams based on the pictures and the
equipments connected on it.

This information sheet will cover the factors in designing networks and the
different types of network diagrams or lay-out.

 Network design involves evaluating, understanding and scoping the


network to be implemented. The whole network design is usually
represented as a network diagram that serves as the blueprint for
implementing the network physically.

STEP-BY-STEP: DESIGNING A WIRELESS NETWORK

Step 1: Determine Your Needs and Set Your Goals

Wireless networking equipment is not all created equal, in part


because different users have different needs. Think of a wireless
network as having three primary personality traits:  speed, range
and security. Depending on your situation, you may want a
network with all three or you may need a network strong in only
one or two.
Consider these hypothetical scenarios:

A typical city dweller. You simply want to surf the Web and
check e-mail using your portable computer around your
apartment in the city. In this scenario, neither speed nor range
need be best in class, but security is important because you are
close to neighbors whose computers could pick up your signal.

A typical country dweller. You also just browse Web sites and
log in to e-mail but your house is large, you have lots of land,
and your neighbors are spread far and wide. You want Internet
access from the backyard so range is important, but you may
not need the most speed or the strongest security.

A business. You may need it all – speed for moving large


documents around your network quickly, good range for
providing access to users spread throughout several rooms or
floors, and strong security to lock down your communications
and prevent sensitive information from being compromised.
As you might expect, there is some correlation between price and
performance when it comes to wireless networking equipment.
Although prices continue to fall, considering your needs first will
not only help you choose the right gear, but perhaps save you
some money in the process.

Step 2: Choose Your Speed


Faster is better, right? It can be, and more speed certainly can’t
hurt. But, like pumping premium octane fuel into a budget car,
buying more wireless speed may mean paying extra for
something you don’t really need.
There are two official wireless technologies you will typically find
walking into any major name electronics depot: 802.11b and
802.11g. Often these are simply referred to as “b” and “g”
respectively.

Wireless “b” gear is rated to 11Mbps while “g” gear is rated to


54Mbps. You may see these figures promoted on the packaging.
Newer technology is being added to wireless equipment to
support even higher speeds such as 108Mbps and, most
recently, 300Mbps. But these premium-priced devices are not
yet based on official standards, meaning they may be compatible
only with specific models from the same vendor, and future
compatibility is unknown.

Don’t Be Fooled By Marketing Claims:


- The top speed your wireless network will achieve is half the
advertised speed rating. A “b” network tops out at 5.5Mbps, a “g”
network at about 27Mbps, and so on. Your real world speeds
may be even lower due to wireless interference.
- “Mbps” does not mean “megabytes per second” but rather
“megabits per second.” In real world terms, 1Mbps equals
approximately a 122 Kilobytes/sec data transfer rate.
- A faster wireless network will not necessarily improve your
Internet experience. You will be able to share files between your
own computers as fast as your wireless network will allow, but
your Internet download speed is limited by your broadband
service. Most broadband service available in the U.S. today
ranges from 0.5-10Mbps, or faster in some exceptional cases.

Step 3: Know Your Range

A strong wireless signal will let you achieve the fastest speeds
your wireless network supports. As the signal weakens due to
interference or distance, your speed will slow down accordingly.
The typical advertised range for most wireless network gear is
300 feet. In practice you could achieve significantly less range
depending where you use the equipment. Dense obstacles such
as walls, steel and trees will reduce your range. Interference from
certain cordless phones and microwave ovens can also affect
wireless network performance.
Significant improvements in wireless range are now available
with higher-priced MIMO technology, which is used in model
names including XR, RangeMax, and RangeBooster. These
devices use multiple antennas (some hidden inside) to achieve
greater range but performance can be unreliable if you mix and
match hardware from different vendors.

Step 4: Evaluate Your Security Needs

Wireless network security is a hot topic in the media and for


good reason – too often people leave their networks vulnerable.
Because wireless data is just that – wireless – there can be ample
opportunity for outsiders to sneak onto your network. Their
actions may be harmless if they simply ride your Internet
connection to check their e-mail, or they could attempt to steal
passwords and other sensitive data.
Later we’ll setup wireless security, but first you need to decide
how strong your hardware needs to be. The best forms of
security rely on encryption so that if someone does intercept
your data, they can’t make heads or tails of it. But some
encryption is better than others – there are four degrees of
encryption security available in wireless hardware today:
1. WEP: The oldest and least secure data encryption. All
wireless gear supports WEP, though, so it’s useful when you
need at least some kind of encryption to be compatible with older
wireless hardware.
2. WPA: A more secure upgrade to WEP. Designed so that
many older devices which included only WEP can be upgraded to
support WPA.
3. WPA2: A significantly more secure upgrade to either WEP
or WPA. Cannot upgrade older hardware to WPA2, but many new
wireless devices support WPA2.
4. VPN: Short for “Virtual Private Networking,” this
technology is not specifically a form of wireless network security.
But you can use VPN on your wireless technology if you want the
highest form of security possible. Wireless routers with VPN
technology tend to be among the more expensive options.
Typically you’d use WPA (or WEP as a last resort) when your
wireless security needs to be compatible with users who may
have older wireless hardware. WPA2 support is the best choice
when buying all-new wireless hardware, and VPN is more often
found in high-security business environments.

Step 5: Choose Your Hardware

It takes two to tango, not only on the dance floor, but with your
wireless network. Any wireless network is comprised of at least
two devices: a wireless access point, which transmits the signal,
and a client (your portable or other computer), which receives
the signal.

5a. Wireless Access Point


The wireless access point transmits the networking data your
computers will receive. These days, most wireless access points
are actually built-in to "wireless broadband routers," devices that
let you share a high-speed Internet connection among several
computers and provide security defense. Readily available at
major electronics retailers, you can easily identify a broadband
router with a wireless access point because it has at least one
antenna, although some have two or more.
Some broadband providers, such as Verizon, may include a
wireless router with your service — so you might already have
one. If not, current prices for routers with wireless access points
range from as low as $25 to as high as several hundred
depending on features, particularly the big three: speed, range,
and security.
 
 

5b. Wireless Client


The wireless client is hardware, which “sees” the wireless
networking data being transmitted by your access point. Most
new portable computers include wireless client hardware already
built-in. If you have an older portable computer without wireless
support, or a desktop PC, you can add wireless client hardware.
You have three choices:

A wireless card (for portable computers). Wireless cards look


like credit cards, but slightly larger, often with a bump on one
end. These slide into one of the card slots often found on the side
of your portable computer.

A USB peripheral. USB wireless clients come in a few shapes


and sizes. One is a small box with a cable that plugs into one of
your USB ports. Another is a “stick” shape which simply
protrudes from a USB port. You can use a USB wireless client
with most portable or desktop PC’s. Portable computer owners
often prefer wireless cards instead because they slip almost
completely Winto the machine. For desktop PC’s, a USB wireless
client is the easiest solution to install.
A PCI card (for desktop PC’s). A PCI wireless client is a circuit
board that is installed inside your desktop PC. It will probably
have a small antenna that sticks up outside your PC case. Some
PC owners prefer a PCI wireless client for its “cleaner” installed
look, and a wider range of models with different price/feature
points than USB devices. However, installing a PCI card requires
some work inside the PC case or else paying extra and hauling
your PC to the electronics store.

TYPES OF NETWORK DIAGRAMS

Wireless Network Diagram

WAN Diagram
Lab Network Diagram

Home Network Diagram


Hotel Network Topology

Mobile Network Diagram


Self- Check 2.1-2

Multiple Choice : Select the letter that corresponds to the correct answer.

1. Under what step you will find the discussions of WPE, WPA, WPA2
and VPN which pertains to the security you are going to choose in
your design?
a. Step 1
b. Step 2
c. Step 3
d. Step 4
2. What are two official wireless technologies you will typically find
walking into any major name electronics depot?
a. 802.11a and 802.11f
b. 802.11b and 802.11g
c. 802.11c and 802.11h
d. 802.11d and 802.11i
3. Identify what diagram is this?

a. Home Network Diagram


b. Hotel Network Topology
c. Lab Network Diagram
d. WAN Diagram
ANSWER KEY 2.1-2

1. C

2. B

3. A

Information Sheet 2.1-3


Network Materials
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Name the different materials in networking.
2. Explain their functions.

This information sheet will cover the materials needed in networking as well
as their functions.

MATERIALS:

 Cat 6 cables
Cat-6 network cabling is used as the cabling infrastructure for
networks. Cat 6 cables consist of four unshielded twisted pairs
(UTP) of copper wire terminated by RJ45connectors. 

 Single Gang Retrofit Boxes


Gang box is a colloquial term utilized in the construction industry,
referring to a toolbox or workbox that can be accessed by multiple
workers. Gang box is also a term in the electrical industry used to
indicate a box, usually metal, which houses installed electrical
componentry.

 RJ45 Jacks and plates


These connectors feature a unique tool-less termination on the back
allowing for quick termination of cables. Each jack is color coded for
both the EIA/TIA568 A and B standards making for a quick and
painless installation. Each connector is gated to prevent unwanted
and accidental disconnects.
 RJ45 plugs
RJ45 plug is the plastic connector attached to the end of the network
cable to provide a connection to a network interface (ex. network card,
network switch or socket).

 Plastic grommet
A grommet is a ring or edge strip inserted into a hole through thin
material, typically a sheet of textile fabric, sheet metal and or
composite of carbon fiber, wood or honeycomb. They may be used to
prevent tearing or abrasion of the pierced material or protection from
abrasion of the insulation on the wire, cable, line being routed
through the penetration, and to cover sharp edges of the piercing, or
all of the above.

 Patch panel
A patch panel, patch bay, patch field or jack field is a device or
unit featuring a number of jacks, usually of the same or similar type,
for the use of connecting and routing circuits for monitoring,
interconnecting, and testing circuits in a convenient, flexible manner.
Patch panels are commonly used in computer networking, recording
studios, and radio and television.
 Ethernet switch
A network switch (also called switching hub, bridging hub,
officially MAC bridge) is a computer networking device that connects
devices together on a computer network, by using packet switching to
receive, process and forward data to the destination device

 Router
A router is a networking device that forwards data
packets between computer networks. Routers perform the "traffic
directing" functions on the Internet. A data packet is typically
forwarded from one router to another through the networks that
constitute the internetwork until it reaches its destination node.

 Access Point/Repeater
Access point is a device connected with cable (Cat5) to your
main router/modem/internet, and serving clients wirelessly.
Repeater is a wireless network device that repeats wireless signals to
extend range without being connected with cable to either
your router/modem, or your clients. Many routers/access points can
be configured in "repeater" mode.
 Plastic Cable Raceway
Routes and protects unshielded twisted pair, shielded twisted pair,
coaxial, fiber optic, and other cables.

Self- Check 2.1-3

Multiple Choice: Select the letter that corresponds to the correct answer.
1. A plastic connector attached to the end of the network cable to provide
a connection to a network interface.
a. Cat 6 cables
b. RJ45 Jacks and plates
c. RJ45 plugs
d. Single Gang Retrofit Boxes
2. A computer networking device that connects devices together on
a computer network, by using packet switching to receive, process
and forward data to the destination device.
a. Cat 6 cables
b. Ethernet Switch
c. Patch Panel
d. RJ45 plugs
3. Protects unshielded twisted pair, shielded twisted pair, coaxial, fiber
optic, and other cables.
a. Cat 6 cables
b. Plastic Cable Raceway
c. Plastic Grommet
d. RJ45 plugs
ANSWER KEY 2.1-3

1. C

2. B

3. B
Information Sheet 2.1-4
Cable splicing and testing

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Memorize the standard color code and procedures in building
network cables.
2. Identify what type of network cable to create according to its use.

This information sheet will cover the standard color code for network cables
as well as the procedures in cable splicing and testing.

WIRING STANDARD COLOR CODE of ETHERNET CABLE


TIA 568B Color Combination
Pin Wire Color
1 White Orange
2 Solid Orange
3 White Green
4 Solid Blue
5 White Blue
6 Solid Green
7 White Brown
8 Solid Brown

TIA 568A Color Combination


Pin Wire Color
1 White Green
2 Solid Green
3 White Orange
4 Solid Blue
5 White Blue
6 Solid Orange
7 White Brown
8 Solid Brown
To create a straight-through cable, you'll have to use either T-568A
or T-568B on both ends of the cable. The diagram depicted on the left
and right shows clip of the RJ-45 connector down.
To create a cross-over cable, you'll wire T-568A on one end and T-
568B on the other end of the cable.
The straight-through cables are used when connecting Data
Terminating Equipment (DTE) to Data Communications Equipment
(DCE), such as computers and routers to modems (gateways) or hubs
(Ethernet Switches). The cross-over cables are used when connecting
DTE to DTE, or DCE to DCE equipment; such as computer to
computer, computer to router; or gateway to hub connections. The
DTE equipment terminates the signal, while DCE equipment do not.

PROCEDURE IN CABLE SPLICING AND TESTING

1. Cut a length of Cable


2. Strip off the Jacket

3. Separate the Wires


4. Untwist the Wires

5. Organize and Flatten Wires

6. Prepare Wires for RJ45 plug


7. Insert Wires into RJ45 plug

8. Push the Wires in


9. Inspect the Color Codes

10. Crimp down the Wires


11. Inspect Both Ends

12. Test the Quality of Cable

NETWORK CABLE TESTER


In its simplest form, a network cable tester relies on the simple fact that
network cables transmit data electronically. Because electricity requires a
continuous physical connection, any breaks in the wiring inside the
network cable prevent it from functioning. The other problem cables can
face is that of cross-wiring, where some of the internal wires make the
wrong connections, causing a short-circuit.
 Using a Network Cable Tester
Never connect a cable tester to a live circuit. Always remove the cable
from both the computer and router or modem before connecting the
tester. The majority of testers consist of two main components: the
tester itself and the remote. Most testers have either two or three
connectors: RJ-45 for Ethernet, RJ-11 for telephone cable, and BNC
for coaxial cable.. The smaller remote has two connectors, one each
for RJ-11 and RJ-45. If the network cable tester supports coaxial
cable networking, it comes with a terminator.. Users simply plug the
network cable into the appropriate port on the cable tester itself, and
then connect the remote to the other end of the cable.

 Running a Network Cable Test


Once the cable is connected to both the tester and the remote, users
should turn the tester on to send a signal up the cable, which lights
up the LEDs on both the tester and remote. It not only works as a
continuity tester, but more importantly, shows the user exactly what
kind of network cable they have and indicates any potential problem,
leaving no need for guesswork. The tester distinguishes
between straight through patch and crossover cable,, as well as
showing both shorts and open circuits. Note that this is only
necessary for twisted pair, such as Category 5 Ethernet cable, as a
coaxial network cable only needs a continuity tester.

 Reading a Network Cable Tester


The standard network cable tester has a row of 10 LEDs on the body
and 9 LEDs on the remote to match up with the standard connector
pinouts. The tester sends a signal down each pair in turn, lighting the
LEDs up. The order in which they either light or do not light indicates
the cable type and whether or not it is working.
Self- Check 2.1-4

Multiple Choice : Select the letter that corresponds to the correct answer.
1. What are the two standard color codes of Ehernet cable?
a. T-558 A and T-558 B
b. T-568 A and T-568 B
c. T-578 A and T-578 B
d. T-588 A and T-588 B
2. What is the next step after inserting the wires into RJ45 plug?
a. Cut a length of Cable
b. Crimp down the Wires
c. Inspect Both Ends
d. Push the wires
3. The type of network cable you will create if you will connect a
computer to computer in a network.
a. Straight Through Cable
b. Cross-Over Cable
c. Over-Heads Cable
d. Underground
ANSWER KEY 2.1-4

1. B

2. D

3. B
TASK SHEET 2.1-4
Title: Cable Splicing and Testing

Performance Objective: Given required supplies and materials you


should be able to perform in appropriate time:
1. Demonstrate the correct procedure in cable splicing and testing.
2. Identify the type of network cable created.
3. Write the color combination of T-568 A and T-568 B wiring standard.

Supplies/Materials : RJ45 plugs, UTP cable (CAT6)

Equipment : LAN cable tester

Steps/Procedure:
1. Ask your trainer to provide you with needed tools and
equipment.
2. Using blank sheet of paper write down the color combination of
T-568 A and T-568 B.
3. Identify the network cable assigned to you.
4. Submit to your trainer for evaluation.

Assessment Method:
Written exam
Observation
Interview
Performance Criteria Checklist 2.1-4

CRITERIA
YES NO
Did you….
1. Perform the proper procedure in cable splicing and
testing?
2. List the correct color combination in the blank
sheet?
3. Identify the network cable created?
4. Is the cable functional?
5. Complete the task in appropriate time?
Information Sheet 2.1-5
Network Cable Installation

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the proper procedure in network cable installation.
2. Repeat the steps with mastery.

This information sheet will cover the proper procedure in network cable
installation including mounting of devices and equipments.

PROCEDURES IN CABLE INSTALLATION


1. Required Tools and Materials

Get the required materials and tools needed.

2. Mount the Wall


Plates
Once you've decided where to mount the box, you need to draw the
lines on the wall to fit the new box and cut the hold with the pointed
hand saw. The pointed saw should be able to push through the dry
wall pretty easily without the need to drill starter holes.

Once you have the hole cut in the wall, you can put the single gang
box into the hole and screw the clamps with hold it in place by
clamping to the back of the dry wall. Repeat this for each location
that you want to run to.

At this time you'll also want to cut a hole in the wall in the
distribution room. Here you want to cut a hole that the plastic
grommet will fit into.

3. Connect the Wires to the Jacks and Patch Panel


Now we've got the cables run we can punch down the cables to the
patch panel and the to jacks. You can take the raw cable directly out
of the wall, put a RJ-45 plug on it, and plug directly into the switch.
But for permanent installation.

Most patch panels and jacks have diagrams with wire color diagrams
for the common T568A and T568B wiring standards.

UTP Installation Do's And Don'ts.

Run all cables in a Star Configuration so that all network links


are distributed from, or homerun to, one central hub. Visualize
Do
a wagon wheel where all of the spokes start from on central
point, known as the hub of the wheel.
Keep Each cable run must be kept to a maximum of 295 feet
(90 meters), so that with patch cords, the entire channel is no
Do
more than 328 feet (100 meters). This is a requirement of the
standard.
Maintain the twists of the pairs as close as possible to the point
Do
of termination, or no more than 0.5"(one half inch) untwisted.
Do Not Skin off more than 1" of jacket when terminating UTP
Make only gradual bends in the cable where necessary to
maintain the minimum bend radius of 4 times the cable
Do
diameter or approximately 1" radius (about the roundness of a
half-dollar).
Allow the cable to be sharply bent, twisted, or kinked at any
Do Not time. This can cause permanent damage to the geometry of the
cable and cause transmission failures.
Dress the cables neatly with Velcro cable ties, using low to
Do
moderate pressure.
Do Not Over tighten cable ties or use plastic ties.
Cross-connect cables (where necessary), using appropriately
Do
rated punch blocks and components.
Splice or bridge UTP cable at any point. There should never be
Do Not
multiple appearances of cable.
Use low to moderate force when pulling cable. The standard
Do
calls for a maximum of 25 lbf (pounds of force).
Do Not Use excessive force when pulling cable.
Use cable pulling lubricant for cable runs that may otherwise
Do require great force to install. (You will be amazed at what a
difference the cable lubricant will make)
Use oil or any other lubricant not specifically designed for UTP
Do Not network cable pulling as they can infiltrate the cable jacket,
causing damage to the insulation.
Keep UTP cables as far away from potential sources of EMI
(electrical cables, transformers, light fixtures, etc.) as possible.
Do
Cables should maintain a 12-inch separation from power
cables.
Tie cables to electrical conduits, or lay cables on electrical
Do Not
fixtures.
Do Install proper cable supports, spaced no more than 5 feet apart.
Install cable that is supported by the ceiling tiles. This is
Do Not
unsafe, and is a violation of the building codes.
Always label every termination point at both ends. Use a unique
number for each network link. This will make moves, adds,
Do changes, and troubleshooting as simple as possible. The TIA-
606A administration standard provides guidance for properly
labeling an installation.
Always test every installed segment with a cable tester. "Toning"
Do alone is not an acceptable test.. "Toning" alone, is not an
acceptable test.
Always install jacks in such a way as to prevent dust and other
contaminants from settling on the contacts. The contacts (pins)
Do
of the jack should face up on flush mounted plates, or left,
right, or down (never up) on surface mount boxes.
Always leave extra slack neatly coiled up in the ceiling or
nearest concealed place. It is recommended that you leave at
Do
least 5 feet of slack at the work outlet end, and 10 feet of slack
at the patch panel end.
Never install cables taught. A good installation should have the
Do Not
cables loose, but never sagging.
Always use grommets to protect cable when passing through
Do
metal studs or anything that can possibly cause damage.
Choose either 568A or 568B wiring scheme before you begin
Do your project. Wire all jacks and patch panels for the same
wiring scheme (A or B).
Do Not Mix 568A and 568B wiring on the same installation.
Use staples on UTP cable that crimp the cable tightly. The
Do Not common T-18 and T-25 cable staples are not recommended for
(1 UTP cable. However, the T-59 insulated staple gun is ideal for
exception) fastening both UTP and fiber optic cabling, as it does not put
any excess pressure on the cable.
Always obey all local and national fire and building codes. Be
Do sure to firestop all cables that penetrate a firewall. Use plenum
rated cable where it is mandated.
Once you have all the cables connected, you can mount the patch
panel to the wall and click the jacks into their respective wall plates
on the other ends. You can also screw the wall plates into the gang
boxes.

4. Test Your Connection

Before you start connecting most of the network components, you


want to test all of the connections to be sure things are working. This
can be done a number of ways. If you actually have a network tester,
then you probably know what you're doing.
The
next step is to take another patch cable and a laptop and plug it into
each port in each room. Check the switch after each port and verify
the "link" indicator is on. Being able to establish a link tests the
physical layer (i.e. no broken wires, all tight crimps, no crossed
wires), as well as the data link layer (i.e. negotiation between network
card and switch port). No IP addressing or anything needed for
testing.

Pictured above: Neat and clean labels for each port actually go where
they say they do. MB = Master Bedroom, SB = Second Bedroom, etc.
Self- Check 2.1-5

Multiple Choice : Select the letter that corresponds to the correct answer.

1. What is the next step after mounting the wall plates?


a. Draw the lines on the wall to fit the new box
b. Put the single gang box into the hole and screw the clamps
c. Punch down the cables to the patch panel and the to jacks
d. Mount the patch panel to the wall

2. What is the last step in network cable installation?


a. Mount the patch panel to the wall
b. Mount the wall plates
c. Punch down the cables to the patch panel and the to jacks
d. Test the connection

3. This is one of the DO’s in the UTP cable installation


a. Allow the cable to be sharply bent, twisted, or kinked at any time.
This can cause permanent damage to the geometry of the cable and
cause transmission failures. Put the single gang box into the hole
and screw the clamps
b. Maintain the twists of the pairs as close as possible to the point of
termination, or no more than 0.5"(one half inch) untwisted.
c. Over tighten cable ties or use plastic ties.
d. Splice or bridge UTP cable at any point. There should never be
multiple appearances of cable
ANSWER KEY 2.1-5

1. A

2. D

3. B
TASK SHEET 2.1-5
Title: Install Network Cable

Performance Objective: Given required supplies and materials you


should be able to perform in appropriate time:
1. Demonstrate the steps in network cable installation.
2. Apply the DO’s and DONT’s in UTP installation.

Supplies/Materials : RJ45 plugs, UTP cable (CAT6), Modular


box (RJ45)

Equipment : Computer, Patch panel, router,


ap/repeater, LAN cable tester, switch or hub

Steps/Procedure:
1. Ask your trainer to provide you with needed materials and
equipment.
2. Perform the procedures correctly.
3. Ask your trainer to check your work.

Assessment Method:
Observation
Interview
Performance Criteria Checklist 2.1-5

CRITERIA
YES NO
Did you….
1. Apply the right procedure in cable installation?
2. General policies were followed?
3. Cable routing is properly done?
4. Complete the task in appropriate time?
Evidence Plan

Competency
Computer System Servicing NC II
standard:
Unit of Set-Up Computer Networks
competency:
Ways in which evidence will be collected:

Demonstration & Questioning


Observation & Questioning
[tick the column]

Third party Report

Portfolio

Written
The evidence must show that the trainee…
1. Cable routes are determined and planned
in accordance with network design and 
actual installation site.
2. Network materials necessary to complete
the work are identified and obtained in
accordance with established procedures   
and checked against systems
requirements
3. Tools, equipment and testing devices
needed to carry out the installation work
are obtained in accordance with 
 
established procedures and checked for
correct operation and safety
4. Appropriate personal protective equipment
is used and OHS policies and procedures   
are followed
5. Copper cable splicing is performed based
on Electronic Industries  
Alliance/Telecommunications Industry
Association (EIA/TIA) standards
6. Network cables and cable raceway are
installed in accordance with established   
procedures and installation requirements
7. Installation work is performed and is
checked to ensure no unnecessary   
damage has occurred and complies with
requirements
8. OHS standards and 5S principles are
followed according to enterprise   
requirements
9. Excess components and materials are
disposed of based on WEEE directives and  
3Rs waste management program
NOTE: *Critical aspects of competency
TABLE OF SPECIFICATION

Percentage of
Objectives/Content area/Topics Knowledge Comprehension Application
test

1. Computer network
concepts 10% 10% 20%

2. Network design 5% 5% 10%

3. Network materials 5% 5% 10%

4. Network cable splicing


and cable testing 5% 25% 30%

5. Network cable
5% 25% 30%
installation

TOTAL 25% 25% 50% 100%

ITEM ANALYSIS

Objectives/Content Knowledge Comprehension Application # of


test
area/Topics
item

1. Computer network
concepts 2 2 4

2. Network design 1 1 2

3. Network materials 1 1 2

4. Network cable
splicing and cable 1 5 6
testing

5. Network cable
1 5 6
installation

20
TOTAL 5 5 10
Items
Written Test
Name:___________________________ Date:_________________ Score:___________
I. True or False
Direction: Write T if the statement is TRUE and F if the statement is
False.
_____1. A computer network consists of two or more computing devices
that are connected in order to share the components of your
network (its resources) and the information you store there.
_____2. Physical topology defines how the media is accessed by the
hosts.
_____3. WPA is the oldest and least secure data encryption.
_____4. Access Point is a wireless network device that repeats wireless
signals to extend range without being connected with cable to
either your router/modem, or your clients.
_____5. The straight-through cables are used when connecting Data
Terminating Equipment (DTE) to Data Communications
Equipment (DCE), such as computers and routers to modems
(gateways) or hubs (Ethernet Switches).
_____6. After stripping off the jacket of the cable you have to untwist the
wires.
_____7. Before we test the quality of the cable we have to inspect first
both ends.
_____8. After inspecting the color codes we have to crimp down the
wires using crimping tool.
_____9. Do not over tighten cable ties or use plastic ties.
_____10. Do not cross-connect cables (where necessary), using
appropriately rated punch blocks and components.

II. Multiple Choice


Direction: Select the letter of the best answer.
1. A method of communication wherein all computers are connected in
a closed loop
a. BUS Topology
b. IRREGULAR Topology
c. RING Topology
d. STAR Topology
2. Another type of topology that falls under point to point networks.
a. BUS Topology
b. IRREGULAR Topology
c. MESH Topology
d. TREE Topology
3. Involves evaluating, understanding and scoping the network to be
implemented.
a. Network Design
b. Network Range
c. Network Set-Up
d. Network Topology
4. A ring or edge strip inserted into a hole through thin material,
typically a sheet of textile fabric, sheet metal and or composite of
carbon fiber, wood or honeycomb.
a. CAT 6 cables
b. Ethernet Switch
c. Plastic grommet
d. RJ45 plugs
5. Being able to establish a link tests for the physical layer means that
(i.e. no broken wires, all tight crimps, no crossed wires)
a. No broken wires
b. All tight crimps
c. No crossed wires
d. All of the above
6. After mounting the wall plates what is the next step?
a. Draw the lines on the wall to fit the new box
b. Put the single gang box into the hole and screw the clamps
c. Punch down the cables to the patch panel and the to jacks
d. Mount the patch panel to the wall
7. What is the last step in network cable installation?
a. Mount the patch panel to the wall
b. Mount the wall plates
c. Punch down the cables to the patch panel and the to jacks
d. Test the connection
8. In creating cross-over cable one end is T-568 A and the other end
must be
a. T-568 A
b. T-578 A
c. T-568 B
d. T-578 B
9. The modular box should be installed how many inches from the
ground.
a. 5 inches
b. 8 inches
c. 10 inches
d. 12 inches
10. What is the first step in network cable installation?
a. Connect the wires to jacks and patch panels
b. Get the required tools and materials
c. Mount the wall plates
d. Test the connections

Answer Key

I.

1. T

2. F

3. F

4. F

5. T

6. F
7. T

8. T

9. T

10. F

II.

1. C

2. B

3. A

4. C

5. D

6. A

7. D

8. C

9. D

10. B

Performance Test

Specific Instruction for the Candidate

Qualification Computer System Servicing NC II

Unit of Competency Set-Up Computer Networks

General Instruction: Interpret and demonstrate network cable


installation.

Specific Instruction:

1. Ask your trainer for the materials, tools and equipment.

2. Observe the critical aspects of the installation.

3. Ask your trainer to check your work.


List of Tools:

Crimping tool, screw driver (flat and cross), wire cutter and stripper

List of Equipment:

Computers, Router, AP/Repeater, Hub or Ethernet Switch, Patch panel, LAN


cable tester

List of Materials:

RJ45 plugs, UTP (Cat 6) cable, Plastic cable raceway, modular box, RJ45
jacks and plates
Performance Criteria Checklist for Performance Test

Name:______________________ Date of Assessment:____________

CRITERIA
YES NO
Did you….
1. Identify what type of network cable to be used?
2. Demonstrate the procedures correctly?
3. Use the right tools in performing the task?
4. Cable raceways are properly installed in
accordance with the lay-out assign?
5. Identify the needed materials and equipment?
6. Follow the safety rules and regulations?
7. Complete the task with the appropriate time?

QUESTIONING TOOL
Satisfactory
Questions to probe the candidate’s underpinning knowledge
response
Extension/Reflection Questions Yes No
1. Why do we need to make bootable disk like flash drives?  
2. What is the benefit of designing first a network before setting
it up?  
Safety Questions
3. Why it is necessary to use appropriate hand tools in  
performing a task?
4. Why do we need to keep on practicing the safety regulations  
in accordance to industry standards?
Contingency Questions
5. How will you react if one of your co-trainees suddenly  
experiences an electric shock?
6. What will you do if you damage one of the devices or  
equipments but there is no one witness?
Job Role/Environment Questions  
7. How can you contribute in saving energy?  
8. How will you lessen land pollution?  
Rules and Regulations  
9. Why do you need to use cable tester in testing network  
cables?
10. Why do we need to disable first the DHCP of the Router  
before installing the DHCP environment in the server?
The candidate’s underpinning  Satisfactory  Not
knowledge was: Satisfactory
Expected Answer for Questioning Tool
Satisfactory
Questions to probe the candidate’s underpinning knowledge
response
Extension/Reflection Questions Yes No
1. Because nowadays some of the netbook computer don’t have
cd/dvd rom drive. And it is not economical to buy an
external drive just for installing OS and other software  
applications where in you have an option not to do so.
2. So that the network we want to create will be efficient and we
will be satisfied by its services based on our needs.  
Safety Questions
3. To ensure a safe and efficient working environment.  
4. So that if we are already connected with one of the industry  
it is easier for us to cope up with the environment. Because we
already master it.
Contingency Questions
5. Don’t panic. Find the main power supply and turn it off. Call  
for a physician or person who has knowledge in first aid.
6. Tell the truth to your trainer, make an apology and be  
responsible for what have you done.
Job Role/Environment Questions  
7. Turn off equipments that are not in used.  
8. Proper waste segregation and proper waste disposal.  
Rules and Regulations  
9. To ensure the quality of the cable, if it is functional and  
identify what type of network cable is created.
10. To make sure that there will be no conflict in the  
assignment of IP Address.
The candidate’s underpinning  Satisfactory  Not
knowledge was: Satisfactory

Inventory of Training Resources


Qualification Title: COMPUTER SYSTEM SERVICING NC II
Resources for Skills practice of Competency # 2 Set-Up Computer Network
(good for 10 students)
 Supplies and Materials As per TR As per Remarks
Inventory
RJ 45 400 pcs. 160 pcs. Complete
Modular box (RJ45) 25 pcs. 10 pcs. Complete
Raceway or Slotted PVC 1.5” x 1.5” x 20 pcs. 5 pcs. Complete
48”
UTP cable 1 box 40 meters Complete
Contact cleaner 1 can 1 can Complete
Whiteboard 1 piece 1 piece Complete
Fastener 1 lot 1 lot Complete
Filler (lead-free) 1 spool N/A N/A
Fiber optic cable 2 meters 8 pcs N/A N/A
(terminated)
 Tools As per TR As per Remarks
Inventory
Screwdriver (standard) 10 pieces 5 pieces Complete
Screwdriver (Philips) 10 pieces 5 pieces Complete
Long nose pliers 10 pieces 5 pieces Complete
Mechanical pliers 10 pieces 5 pieces Complete
Allen wrench 10 sets 5 sets Complete
Crimping tools 10 pieces 5 pieces Complete
Soldering iron 10 pieces 5 pieces Complete
Solder sucker 10 pieces 5 pieces Complete
Wire stripper 5 pieces 5 pieces Complete
Portable electric hand drill 1 unit 1 unit Complete
Drill bit 1 set 1 set Complete
Precision screw drivers 5 sets 2 sets Complete
Anti-static devices 10 pcs 5 pcs Complete
Flash light/Head mounted light 5 pcs 2 pcs Complete
 Equipment As per TR As per Remarks
Inventory
Desktop Computer 26 units 10 Complete
Laptop computer/Netbook 10 5 Complete
Computers for server 10 5 Complete
Server cabinet/Frame 10 5 Complete
Patch panel (48-ports) 20 pcs 10 pcs Complete
Working tables 10 sets 5 sets Complete
Internet subscription (at least 2 1 unit 1 unit Complete
MBPS)
Uninterruptible Power Supply (UPS) 10 units 5 units Complete
Hub / Switch 10 unit 5 unit Complete
Managed switch 2 units 1 unit Complete
Network controller 1 1 Complete
ADSL Router with Wi-Fi 11 5 Complete
Wireless Access Point 10 5 Complete
PC Video camera 1 unit N/A N/A
External optical drive 2 units 1 unit Complete
USB External HD 1 unit 1 unit Complete
Network External HD 1 unit 1 unit Complete
Scanner 1 unit N/A N/A
USB printer 1 unit 1 unit Complete
Network printer 1 unit 1 unit Complete
Flash disk / Memory stick 11 pieces 5 pieces Complete
Electronic tester VOM 10 units 5 units Complete
LAN Cable tester 5 units 5 units For
Replenish
ment
Note: In the remarks section, remarks may include for repair, for
replenishment, for reproduction, for maintenance etc.

Prepared By: Vencent P. Buella


WORKSHOP LAYOUT
92 square meters

PRACTICAL WORK AREA /INSTITUTIONAL DISTANCE LEARNING AREA


ASSESSMENT AREA

Multimedia
C Devices
A
B
I
T
N
O
E
O
T
L
S

C C
O O
M M
P P
U U
T T
E E
R R
S S

LEARNING RESOURCE AREA/


White Board
COMPUTER LABORATORY

You might also like