You are on page 1of 91

COMPETENCY-BASED LEARNING MATERIAL

COMPUTER SYSTEMS SERVICING NCII

Sector : ELECTRONIC SECTOR

COMPUTER SYSTEMS
Qualification : SERVICING NCII

Unit of
Competency : SET-UP COMPUTER NETWORKS

SETTING-UP COMPUTER
Module Title : NETWORKS
HOW TO USE THIS COMPETENCY –BASED LEARNING MATERIAL

Welcome!

The unit of competency, Setting up Computer Networks“”,


is one of competencies of Computer Systems Servicing NCII, a course which comprises
the knowledge, skills and attitudes in logging/recording business transactions
in an and Configuring Firewall with Advance Settings.

In this module, you are required to go through a series of learning activities in


order to complete each learning outcome. In each learning outcome are
Information Sheets, Self-Checks, Operation Sheets and Task/Job Sheets.
Follow and perform the activities on your own. If you have questions, do not
hesitate to ask for assistance from you facilitator.

Remember to:

Work through all the information and complete the activities in each
section.

Read information sheets and complete the self-check. Suggested


references are included to supplement the materials provided in this
module.

Most probably, your trainer will also be your supervisor or manager.


He is there to support you and show you the correct way of doing
things.
You will be given plenty of opportunities to ask questions and
practice on the job. Make sure you practice your new skills during
regular work shifts. This way you will improve you speed, memory
and your confidence.

Use the Self-Checks, Operation Sheets or Task or Job Sheets at the


end of each section to test your own progress. Use the Performance
Criteria Checklist located after the sheet to check your own
performance.

When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.

You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Install and configure Installing and configuring ELC724331


1.
computer systems computer systems

Set-up Computer Setting up Computer ELC724332


2.
Networks Networks

Set-up Computer Setting up Computer ELC724333


3.
Servers Servers

Maintain and Repair Maintaining and


4. Computer Systems and Repairing Computer ELC724334
Networks Systems and Networks
MODULE CONTENT

UNIT OF COMPETENCY SET UP COMPUTER NETWORK

MODULE TITLE Setting up Computer Network

MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.

NOMINAL DURATION: 40 HOURS

LEARNING OUTCOMES:
At the end of this module you MUST be able to:

1. Install Ethernet cables

2. Set network configuration

3.Inspect and test the configured computer networks

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with network


design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Ethernet cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.
10. Network connectivity of each terminal is checked in accordance with
network design.
11. Any fault or problem in the network system is diagnosed and remedied in
line with the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance
with network design.
13. Communication checking between terminals are carried out in accordance
with OS network configuration guides
14. Unplanned events or conditions are responded to in accordance with
established procedures
15. Client Device systems settings are configured in accordance with
manufacturers’ instructions-user preferences and end
16. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network des
17. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network des
18. Wireless settings are configured in accordance manufacturers’ instructions, network
design and end-user preferences
19. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions-user preferences and end
20. Final inspections are undertaken to ensure that the configuration done on
The computer networks conforms with the man instruction/manual

21. Computer networks are checked to ensure safe operation.


22. Reports are prepared/completed according to company requirements.
UNIT OF COMPETENCY SET UP COMPUTER NETWORK

MODULE TITLE Setting up Computer Network

MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.

 LEARNING OUTCOME NO.1

 INSTALLING ETHERNET CABLES

CONTENTS:

1. NETWORK MATERIALS,TOOLS AND EQUIPMENT

2. CREATING A NETWORK CABLE DEVICE

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and obtained
in accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work
are obtained in accordance with established procedures and checked for correct
operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage
has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
Excess components and materials are disposed of based on WEEE directives and 3Rs waste
management program

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the network materials,tools and equipments

2. Identify the network materials,tools and equipments

Network equipment and cables

An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
 Cables and connectors. These link together the computers, printers, servers
and other equipment on your network.
 A router. This manages network traffic, ensuring devices can communicate
with each other via both wired and wireless connections, and provides internet
connectivity.
 A wireless access point (optional). This will extend your wireless network if
the router is incapable of offering coverage in certain parts of the building.
 An internet connection. This could be a faster fibre connection or dedicated
leased line.
 A hardware firewall. This creates a secure barrier between your network and
the internet, blocking security threats. Networks sometimes include an on-
site network server which runs central applications, acts as an email server and
provides file storage.
Network hardware building blocks
Some businesses still build their network with cables because they're very reliable
and fast. The most common type is Ethernet cable, which is rated for speed. Cat 6
cables can carry data fast enough for any business purpose.
When building their network most businesses install network sockets at convenient
locations in their premises, so computers and other devices can be plugged into the
network. The sockets cost about £3 each.

The router: a vital network component


The router acts as a signpost, indicating where data on your network should go and
enables devices to communicate with one another.
Routers also connect directly to the internet and share the connection via cable or
Wi-Fi with devices on the network.
A basic router with four wired connections will cost from £70. A more advanced
model, with 24 connections, could cost £150 or more.

Going wireless
Routers also include Wi-Fi capability, enabling people to connect
laptops, smartphones, tablets and other devices to the network wirelessly.
Wi-Fi is ideal for providing network access to staff with mobile devices and in meeting
rooms or common areas. It's also useful for offering internet access to visitors, with
many routers including a separate 'guest' network for the purpose. Wireless routers
start at around £70.

Network equipment speeds


Most network equipment complies with common standards, so you can combine
routers, cables and firewalls from different manufacturers. However, the speed of
your network might be governed by the slowest element. For example, if all your
cables and computers are rated to Cat 6, make sure your router is rated to Cat 6 too.
There are a number of wireless networking standards to take into account, although
the majority of modern devices will include support for the latest versions. Try to get
a wireless router or access point rated to 'Wireless n' or '802.11n'; it's the fastest type
available, but will still work with older wireless equipment, too.

What are the Equipment, tools and materials needed in Connecting


two computers using wired connection ?

RJ45
RJ means Registered jack. This is a
standard physical Network Interface
used for connecting telecommunications
equipment commonly, a computer networking equipment

UTP CABLE
The cheapest cable use in computer in
networking is the UTP
(Unshielded Twisted Pair) cable.
Other use the STP (Shielded Twisted Pair)
cable which is cost much than UTP but more reliable.

CRIMPER
Crimping tool is used to join the
RJ-45 and RJ-11 connectors to
the both ends of either phone
or CAT5 cable.

WIRE STRIPPER

A tool designed to remove the protective


covering (jacket) off of a cable to expose
the inner wires. Because different wires
come in different shapes, there are dozens
of different wire strippers available.

LAN TESTER
A cable tester is a device that
is used to test the strength and
connectivity of a particular
type of cable or other wired assemblies.

NETWORK INTERFACE CARD

Short for Network Interface Card,


the NIC is also referred to as an
Ethernet card and network adapter.
It is an expansion card that enables
a computer to connect to a network;

ROUTER

A router is a networking device that forwards data


packets between computer networks.
A packet is typically forwarded from one router to
another router through the networks that
constitute an internetwork (e.g. the Internet)
until it reaches its destination node.

SWITCH HUB
A network switch (also called switching hub,
bridging hub, and by the IEEE MAC bridge)
is networking hardware that connects devices
on a computer network by using packet 
switching to receive and forward data
to the destination device.

BAY RACK

A rack, in an IT (information technology)


context, is a supporting framework that holds
hardware modules. In this context, racks
typically contain servers, hard disk
drives and other computing equipment.
Racks make it possible to contain a lot of
equipment in a small physical footprint
without requiring shelving.

PATCH PANEL

a board in a switchboard, computer,


or other device with a number of
electric sockets that may be
connected
in various combinations.
Modular box
A modular PC is a computer that has
individually-housed components,
which are interconnected but separately
removable for service or upgrading. .
While Piston is upgradable, modules
 are not actually individually housed,
making them more similar to the way
typical desktops are modular, with bare
PCB-based parts.
2 COMPUTER DESKTOP

an electronic device for storing and processing data,


typically in binary form, according to instructions
given to it in a variable program.

RACEWAY or SLOTTED

Slotted PVC cable raceways are very


convenient for cable laying of
on-wall installations in offices,
laboratories, workshops etc.
Raceways are made of very hard,
self-extinguishing PVC,
with temperature resistance to 70 Co.

COMPUTER TABLE

a flat surface, usually supported by
four legs, used for putting things on

UNINTERRUPTIBLE POWER SUPPLY

An uninterruptible power supply (UPS)


is a device that allows a computer to
keep running for at least a short time.

SELF-CHECK 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT

Fill the blank : Write the correct answer in the blank

_______________1. Its is a network switch (also called switching hub,


bridging hub, and by the IEEE MAC bridge) is networking hardware that
connects deviceson a computer network by using packet 
switching to receive and forward datato the destination device.

_______________2. Its is a board in a switchboard, computer,


or other device with a number of electric sockets that may be
connectedin various combinations.

_______________3. is a networking device that forwards data


packets between computer networks. A packet is typically forwarded
from one router toanother router through the networks thatconstitute an
internetwork (e.g. the Internet) until it reaches its destination node.

_______________4. A cable tester is a device that


is used to test the strength andconnectivity of a particular type of cable
or other wired assemblies.

________________5. is a standard physical Network Interface


used for connecting telecommunications equipment commonly, a
computer networking equipment.

Enumeration: write in your whole sheet of pad paper

1.what are the Equipment, tools and materials needed in Connecting two
computers using wired connection?

2. what is to build a network you will need a range of equipment?

TASK SHEET 1.1-1


NETWORK MATERIALS,TOOLS AND EQUIPMENT

Performance Objective: given necessary tools,equipment and materials,


you should be able to networking material,tools, and equipment ff.
Standard operating procedures within 1 hour

Supplies/Materials and Equipment:


Rj45 , crimper ,utp cable, lan tester ,router ,switch hub,bay rack
2 computer systems unit,table, etc.

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


Memories and familiar of the networking material,tools, and equipment
.

Assessment Method:
Demonstration
INFORMATION SHEET 1.1-2
CREATING A NETWORK CABLE DEVICE

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the netwok cable device

2. Identify to creating a network cable device

What is a network cable device?

Networking cables  are networking hardware used to connect one network device to


other network devices or to connect two or more computers to share printers,
scanners etc.Electrical connections using twisted pair or coaxial cable are used
within a building.

Different Types Of Network Cabling

Four Types Of Network Cabling


Network cable acts like a medium
through which information travels
from one network device to the other. The
type of cable selected for a network
depends on the network’s size,
topology, and procedure. The various
types of network cables act as the
backbone of the network
infrastructure.
Selecting the correct type of network
cabling can effect various business functions because enterprise network admins
employ new technologies. The type of network cable used in any network
infrastructure is one of the most vital aspect of networking in various industries.
Coaxial Cable
It has a single copper conductor in the middle. A
plastic layer provides insulation between the
braided metal shield and center conductor. The
metal shield blocks outer interference from motors,
fluorescent lights, and other computers.
Coaxial cabling is extremely resistant to signal
obstruction though it is complex to install. It can
handle great cable lengths between network
devices than the twisted pair cable. The two types of
coaxial cables are thin coaxial and thick coaxial.

Shielded Twisted Pair (STP) Cable

It is a special kind of copper telephone wiring used


in business installations. An external shield which
functions as a ground is added to the normal
twisted pair telephone wires. Shielded twisted pair
may be the answer if you want to place the cable in an
area with potential interference and risk to the
electrical current in the UTP. Shielded cables can also
help in expanding the distance between the
cables.

Fiber Optic Cable


Fiber optic cabling consists of a center glass
core surrounded by many layers of
protective materials. It removes the
problem of electrical obstruction by
transmitting light rather than electronic
signals. This makes them perfect for
certain atmospheres which contain huge
amount of electrical interference. It has
become the standard for connecting
networks between buildings because of its
resistance to lighting and moisture.
Ensure your system establishment is 100% consistent and converse with
Dimtech today.

Unshielded Twisted Pair

It is the most admired type of network


cable in the world. UTP cable is used for both
conventional telephone and computer
networking.
The various wiring schemes for UTP are:
 CAT1 which is used for telephone
wire. CAT2 supports speeds up to 4 Mbps and used frequently for token ring
networks.
 CAT3 and CAT4 are both used for Token Ring networks for higher network
speeds.
 CAT5 wire is now replaced by the CAT5e designs providing an enhanced
crosstalk specification allowing it to support speeds up to 1 Gbps. It is the most used
network cabling specification in the world.
 CAT6 support speeds of 1 Gbps for length up to 100 meters and 10 Gbps up to
55 meters. Organizations using CAT6 cabling should use a specialized cable analyzer
to request a complete test report, to ensure that the the CAT6 guidelines and
standards have been followed during the installation.
 The CAT7 is a fresh copper cable pattern which can support speeds of 10Gbps
and length up to 100 meters.
For the development of a successful network in an organization, understanding the
different types of cable and how they affect other aspects of a network is vital.
Network Cabling in Perth

RJ45 and CAT 6 are the most widely recognized innovations out there with regards to
organize cabling. As system cabling masters, Dimtech comprehends the significance
of utilising the right cabling.
Our network cabling work consents to all statutes, directions, and models. This is
vital on the grounds that numerous suppliers will utilise shabby, substandard
cabling which does not follow national norms. Ensure your system establishment is
100% consistent and converse with Dimtech today.

STEPS IN CREATING A NETWORK CABLE

STRAIGHT THROUGH

TYPE A TYPE B

CROSS OVER COLOR CODE


NOTED:
Memorize the color code combination before doing this activity.
Above, you could see the color
assigned for each pin.

Creating of a STRAIGHT THROUGH network cable

Materials Needed:

2 RJ45
1 meter Network Cable – UTP cable

Tools Needed:

Crimping Tool
Wire Stripper
LAN Tester
Equipment Needed:
2 Working computers with Network Adapter (LAN port)

STEP BY STEP TO STRAIGHT THROUGH CABLE

Cut the cable insulator to show all the eight wires


Strip off the insulator

Separate all eight wires

Position all eight wires according to its assigned pins in the RJ45
Position all wires. Make sure that all are in proper pin assignment

Cut the wires

Make sure that the cut is even and small enough for the RJ45
Put all wires inside the RJ45.

Make sure all wires reach the pins


HOW TO TEST YOUR NETWORK CABLE?

A LAN TESTER is a hand held electronic device. It is used to verify electrical


connections in a cable network. Signal strength, particularly in a computer networks,
is crucial for data transmission.

A LAN TESTER can come in one of many shapes &


sizes, and may have multiple functions. A hand held
battery-powered tester checks for insulation losses and
crossed wiring, and is generally easy to use. Most
testers are designed with two parts – the tester itself
and a remote. Testers typically have different testing
ports to test today’s most popular media including
ports for RJ-45, RJ-11, USB and BNC.

WHEN TO USE A LAN TESTER:


Once you are ready to check if a cable is set up properly to achieve a strong
connection between source and destination. That time is, typically, after
installation / set up is complete. It is good practice to test the system once all
components are connected in order to assure the job has been done properly. If the
test shows connectivity troubleshoots, you can address the issue(s) and retest.

POSSIBLE ISSUES:
Connection between server and computer(s) is weak
Outside interference causing data loss or decreased signal strength
Faulty cable

HOW TO USE A LAN TESTER:


1. Select the cable to be tested and
make sure it is not plugged to any
electrical power and free of any
packaging or tangled with other
cables, to prevent false reading.
2. Visually inspect the cable for
damage. If cable is broken or torn it
should be replaced.
3. Plug the network cable into the
appropriate port on the cable
tester, and then connect the
other end of the cable to the
remote.
4. Switch the tester on to test
your cable. The tester will
show results, and if
applicable, will indicate what
the potential problem is
PC to PC Networking
Requirements:
1. Two Computers with compatible O.S. and Ethernet adapter.
2. Cross Over Cable

1.Plug the both End of cross over network cable on


two ethernet port of
two computers as
shown above.

2.Assign the following on both


computers: IP Address,
Subnet Mask, Gateway,
Computer Name and
Workgroup Name.

To Assign IP address on computer, follow these steps:


SELF-CHECK 1.1-2

CREATING A NETWORK CABLE DEVICE

ENUMERATION: Write the correct answer in your whole sheet of pad paper

1.What is the color coding of straight through?

2.What is the color coding of cross over?

3. What is the network cable devices?

4. Four Types Of Network Cable?

5. How to test Network Cable?


TASK SHEET 1.1-2

CREATING A NETWORK CABLE DEVICE

Performance Objective: given necessary tools,equipment and materials,


you should be able to creating a network cable device ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, etc.

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


.
 Unroll the required length of network cable and add a little extra wire, just in
case.
 Carefully remove the outer jacket of the cable
 Inspect the newly revealed wires for any cuts or scrapes that expose the
 Untwist the pairs so they will lay flat between your fingers. 
 Arrange the wires based on the wiring specifications you are following.
 You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires
are switched.
 Press all the wires flat and parallel between your thumb and forefinger
 Keep the wires flat and in order as you push them into the RJ-45 plug with
the flat surface of the plug on top
 Place the wired plug into the crimping tool
 Repeat all of the above steps with the other end of the cable
 Test the cable to ensure that it will function in the field
Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 1.1-2

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Unroll the required length of network cable and add a little extra wire,
just in case.
Carefully remove the outer jacket of the cable

Inspect the newly revealed wires for any cuts or scrapes that expose the

Untwist the pairs so they will lay flat between your fingers. 

Arrange the wires based on the wiring specifications you are following.

You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which


wires are switched.
Press all the wires flat and parallel between your thumb and forefinger

Keep the wires flat and in order as you push them into the RJ-45 plug
with the flat surface of the plug on top
Place the wired plug into the crimping tool

Repeat all of the above steps with the other end of the cable
Test the cable to ensure that it will function in the field

 LEARNING OUTCOME NO.2

 SETTING NETWORK CONFIGURATION

CONTENTS:

1. CONFIGURE A WIRELESS ROUTER

2. CONFIGURE NETWORK CONNECTIVITY

ASSESSMENT CRITERIA:

1. Network connectivity of each terminal is checked in accordance with network


design.
2. Any fault or problem in the network system is diagnosed and remedied in line
with the standard operating procedures.
3. Network interface card (NIC) settings are configured in accordance with network
design.
4. Communication checking between terminals are carried out in accordance with
OS network configuration guides
5.Unplanned events or conditions are responded to in accordance with established
procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-1
CONFIGURE A WIRELESS ROUTER

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the configure a wireless router

2. Identify the configure a wireless router

Wireless Configuration (WZC),
also known as Wireless Auto
Configuration, or WLAN
AutoConfig, is a wireless connection
management utility included
with Microsoft Windows XP and
later operating systems as
a service that dynamically selects
a wireless network to connect to
based on a user's preferences and
various default settings.[1][2] This can
be used instead of, or in the
absence of, a wireless network
utility from the manufacturer of a
computer's wireless networking
device. The drivers for the wireless
adapter query the NDIS Object IDs
and pass the available network names (SSIDs) to the service. The service then lists
them in the user interface on the Wireless Networks tab in the
connection's Properties or in the Wireless Network Connection dialog box accessible
from the notification area. A checked (debug)[3] build version of the WZC service can
be used by developers to obtain additional diagnostic and tracing information
logged by the service.
SET-UP A WIRELES ROUTER
As more and more devices are able to connect to wireless networks, setting up a
wireless router has become a crucial step for virtually any home network. Setting
up a wireless network will allow your devices to connect to the internet from
practically anywhere in the house, without the need for messy wires.[1] To get
started setting your

HOW TO SET UP A WIRELESS ROUTER

Purchase a wireless router. Routers come in all shapes and sizes. Compare


features to find the router that is right for you. If you have more area that you need
to cover, or have lots of walls in your home, you’ll need a router that offers the
option of upgrading antenna(s) with high gain types - if not supplied in the box. If
more than one wireless device will be connecting at the same time at different
speeds, a MiMo type router is recommended, otherwise the speed for all devices will
drop the highest supported by all at that time.
 All modern routers should support 802.11n, or Wireless-N). This is the most
stable, offers the fastest speeds and is backwards compatible with older
standards such as 802.11g.
2.Connect your router to your modem.[2] Routers and wireless
routers enable you to share your broadband internet connection with
multiple devices. To do so, you will need to connect your broadband modem
to the router. For best results, place your router near your modem.
 Connect the router and the modem with an Ethernet cable. Most routers
come packaged with a short Ethernet cable that you can use for this.
 Connect the modem to the WAN / Internet Port on your router. It is usually
offset, and may be a different color from the LAN Ports. WAN stands for
"Wide Area Network" which is what the internet actually is. LAN stands for
"Local Area Network". The router will assign a local or "private" IP address to
any device connected to its LAN Ports or WiFi signal from a pool of private
addresses (listed further below).
3.Connect any devices you want to hard wire with CAT 5 (or better) Ethernet
cables. If you have computers that are close, or a video game console or TV, you
can connect them to the router via Ethernet.[3] This will result in a more stable
and faster connection, and doesn’t require any extra configuration.

4.Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings. You
can disconnect this computer afterwards if you want to connect wirelessly. You can
also connect your laptop wirelessly for the first time, the wifi network name and the
default password will be printed on the router's label

PART 2 SET-UP :
1.When you power on the router, it will only create its wi-fi network, and the
device will be connected to the router's wi-fi connection, not the internet. To
connect the router to the internet, with some internet providers (i.e. GTPL in India),
it is required to register router's MAC address to the internet service provider's
website.
 MAC of the router can be found printed on router or in the documents etc.

2.Go to the internet service provider's website. Type ip address Log in with the
username and password provided by the internet service provider and go to MAC
address update option. one can see their existing laptop / computers MAC address
there. Add the router's MAC address there and save it. This process means that the
router is authorized to use the internet provide by the broadband company.

PART 3 SET-UP: Configuring the Router

1.Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the
router or in the documentation.[4] If you can’t find the router’s IP address
anywhere, you can do a web search for the router model to see what the default
address is.

 IP addresses are formatted as four groups of up to three digits, separated by


periods.
 Commonly found "default" Local IP addresses for routers are 192.168.0.1,
192.168.1.1, 192.168.2.1, 10.0.0.1. Note that all the addresses in the
follow ranges: 192.168.0.0 - 192.168.255.255, 172.16.0.0 - 172.31.255.255
& 10.0.0.0 - 10.255.255.255 have been set aside for exclusive use in a LAN;
and one address in the range of any of them of them would be assigned to
the connected router.

2.Enter your username and password. In order to access the configuration page,
you will need to be on the router's IP address and enter a valid username and
password at the prompt. Most routers have a basic account set up that you will
need to use to log on. This varies from model to model, but should be printed on
the router or in the documentation.
 The most typical username is “admin”.
 The most typical passwords are “admin” and “password”.
 Many routers will only require a username and a blank password, and some
allow you to leave all fields blank.
 If you can’t figure out the correct IP address, your username or password,
search for your router model online to see what the default login is. If it has
been changed, press the Reset button on the back of the router for 10 (to
30+ seconds as dictated in the instructions for the router model) to restore
factory defaults and try again.
3.Open the Wireless Settings. When you log in to your router, you will be taken to
the router’s main menu or status screen. There will be several options to choose
from. The Internet section can usually be left at default settings, unless you
received specific instructions from your internet service provider. The Wireless
section will allow you to set up your wireless network.

4.Enter a name for your wireless network. In the Wireless section, you should
see a field labeled SSID or Name. Enter a unique name for your wireless network.
This is what other devices will see when scanning for networks.
 Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the
signal. *See the Tips section below for additional information on the SSID
setting.

3. Choose a security method. Choose from the list of available security


options. For the best security, choose WPA2-PSK as the encryption method.
This is the most difficult security to crack, and will give you the most
protection from hackers and intruders.
4. Save your
settings. 
O nce you
are
finished
naming
and
securing your wireless network, click the Apply or Save button. The changes
will be applied to your router, which may take a few moments. Once the
router has finished resetting, your wireless network will be enabled.

PART 4 SET-UP: Connecting Your Devices

1. Connect a computer, tablet, or smartphone to the wireless network. Scan


for the wireless network with the SSID you provided above. On any device that
supports wireless networks, you should see your new network as long as you are
within range of the router. Select it and you will be prompted for the passphrase.
2. Enter your wireless passphrase. Once you enter the passphrase, your device
will be automatically connected to the wireless network. The network will be stored
in your devices memory and will automatically connect whenever you are within
range.

 For detailed instructions on selecting and joining a wireless network for your
specific computer, tablet, or smartphone, follow this guide.

3.Connect your other devices. Besides other computers and tablets, you can
connect other devices as well, such as printers, game consoles, TVs and more. See
the following guides for instructions for your specific device.

SELF-CHECK 2.1-1

CONFIGURE A WIRELESS ROUTER

ENUMERATION: Write your answer in your whole sheet of pad paper

1. What is the wireles configuration?

2. HOW TO SET UP A WIRELESS ROUTER ?

TASK SHEET 2.1-1


CONFIGURE A WIRELESS ROUTER

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure a wireless router ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


computer systems unit,table, wireless router tp-link

Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


. Mentioned in this article
Step 1: Place your wireless router.
Step 2: Configure your wireless router gateway.
Step 3: Connect your gateway to your new router.
Step 4: Change your wireless router's admin password.
Step 5: Update the router's firmware.
Step 6: Establish a password for your Wi-Fi network.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-1


CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Place your wireless router

 Configure your wireless router gateway

Connect your gateway to your new router

Change your wireless router's admin password

Update the router's firmware

Establish a password for your Wi-Fi network


INFORMATION SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the configuration of network connectivity

2. Identify the configuration of network connectivity

Network Connectivity

Definition - What does Network Connectivity mean?


Network connectivity describes the extensive process of connecting various parts of
a network to one another, for example, through the use of routers, switches and
gateways, and how that process works.

What is a Network?

A network consists of two or more


computers that are linked in order
to share resources (such as printers
and CDs), exchange files, or allow
electronic communications. The
computers on a network may be
linked through cables, telephone
lines, radio waves, satellites, or
infrared light beams.

Two very common types of networks include:


 Local Area Network (LAN)
 Wide Area Network (WAN)

You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).

Local Area Network

A Local Area Network (LAN)


is a network that is confined
to a relatively small area. It is
generally limited to a
geographic area such as a
writing lab, school, or
building.

Computers connected to a
network are broadly
categorized as servers or
workstations. Servers are
generally not used by humans
directly, but rather run continuously to provide "services" to the other computers
(and their human users) on the network. Services provided can include printing
and faxing, software hosting, file storage and sharing, messaging, data storage and
retrieval, complete access control (security) for the network's resources, and many
others.

Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally
considered a desktop, consisting of a computer, keyboard, display, and mouse, or a
laptop, with with integrated keyboard, display, and touchpad. With the advent of
the tablet computer, and the touch screen devices such as iPad and iPhone, our
definition of workstation is quickly evolving to include those devices, because of
their ability to interact with the network and utilize network services.

Servers tend to be more powerful than workstations, although configurations are


guided by needs. For example, a group of servers might be located in a secure area,
away from humans, and only accessed through the network. In such cases, it
would be common for the servers to operate without a dedicated display or
keyboard. However, the size and speed of the server's processor(s), hard drive, and
main memory might add dramatically to the cost of the system. On the other hand,
a workstation might not need as much storage or working memory, but might
require an expensive display to accommodate the needs of its user. Every computer
on a network should be appropriately configured for its use.

On a single LAN, computers and servers may be connected by cables or wirelessly.


Wireless access to a wired network is made possible by wireless access points
(WAPs). These WAP devices provide a bridge between computers and networks. A
typical WAP might have the theoretical capacity to connect hundreds or even
thousands of wireless users to a network, although practical capacity might be far
less.

Nearly always servers will be connected by cables to the network, because the cable
connections remain the fastest. Workstations which are stationary (desktops) are
also usually connected by a cable to the network, although the cost of wireless
adapters has dropped to the point that, when installing workstations in an existing
facility with inadequate wiring, it can be easier and less expensive to use wireless
for a desktop.

See the Topology, Cabling, and Hardware sections of this tutorial for more


information on the configuration of a LAN.

Wide Area Network

Wide Area Networks (WANs) connect networks in larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of global network.

Using a WAN, schools in Florida can communicate with places like Tokyo in a
matter of seconds, without paying enormous phone bills. Two users a half-world
apart with workstations equipped with microphones and a webcams might
teleconference in real time. A WAN is complicated. It uses multiplexers, bridges,
and routers to connect local and metropolitan networks to global communications
networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.

DIAGRAM NETWORK CONNECTIVITY


HOW TO STEP BY STEP NETWORK CONNECTIVITY

FIRST : CONNECT CABLE MODEM TO ROUTER

SECOND: CONNECT NETWORK CABLE TO ROUTER

ROUTER
THIRD : CONNECT ROUTER TO SWITCH HUB

ROUTER

SWICTH HUB

FOURTH: CONNECT SWITCH HUB TO PATCH PANEL

PATCH PANEL

SWICTH HUB
FIFTH: CONNECT PATCH PANEL TO 2 SYSTEMS UNIT

PATCH PANEL

CLIENT SERVER WR2

Configuring Network Connections for


Windows 7 & window 2008 r2

After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each
computer on the network its own individual IP address. This process is handled
automatically if you're using a router. Think of an IP address as a mailing
address. Each computer on the network needs a unique IP address so that
information sent across the network reaches the correct destination.
CONNECT TO ASSIGN AN IP ADDRESS TO THE CLIENT:

Click Open Network and Sharing Center.


Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.

Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
Click the Use the following IP address radio button.

Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.


Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.

Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.


This is the ip address of router take note:
Click OK. This will save the settings for that computer. This computer is now
configured on your network with a unique IP address.

Network Connecting to Windows 2008 R2

CONNECT TO ASSIGN AN IP ADDRESS TO THE SERVER:

A. Click Start
B. Right-click Network and click Properties
 
C. Click Local Area Connection
D. Click Details. Make note (on a piece of paper) of the address on the
right side of IPv4 Address:

 (For our example, we are building a small network and we will just use a small
range of IP addresses. In the real world or for a large network, you would need to
actually know TCP/IP, design a range of IP addresses you plan to use, then assign
those IP addresses, or design a way to assign the IP addresses to the computers)
E. Click Close
F. In the Local Area Connection Status dialog box, click Properties
G. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)

 
Click Properties
H. Click Use the Following IP Address
I. Type the IP address you want the server to use. For our example,
and based on the above dialog box, we type 192.168.001.001
J. Press Tab
K. Type the subnet mask (normally, it should be added automatically
when you press Tab from the previous IP address text box) and
press Tab
L. Type the default gateway address (use the first and the second octets
of the IP address you had provided (such as 192.168) and use
001.001 for the other two bytes)
M.Provide the Preferred DNS server address (we use 127.0.0.1 for our
example) and the Alternate DNS Server address (we leave ours
empty)
 

N. Click Advanced to check the values that were put in the IP Settings
and DNS property pages
O. Click OK
P. Click OK
Q. Click Close
R. Click Close
INFORMATION SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY

ESSAY: write the correct definition in your whole sheet of pad paper

1.What is the LAN?

2.What is the WAN?

3. What does Network Connectivity mean?

4. Draw the network connectivity diagram?

5. How to step by step network connectivity?

6. how to configure the connection of window 7 and window 2008 r2 server


TASK SHEET 2.1-2

CONFIGURE NETWORK CONNECTIVITY

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure network connectivity ff.
standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


2 computer systems unit,table, wireless router tp-link,switch hub,patch
panel,network cable,modem internet

Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1.Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.

2.Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.

3.Click the Use the following IP address radio button.

4.Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.

5.Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.

6.Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.


o This is the ip address of router take note:

7.Click OK. This will save the settings for that computer. This computer is now
configured on your network with a unique IP address.
Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-2


CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.

Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't


uncheck it, just highlight it.Click Properties.

Click the Use the following IP address radio button.

Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.

Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.

Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.


his is the ip address of router take note:

Click OK. This will save the settings for that computer. This computer
is now configured on your network with a unique IP address.
 LEARNING OUTCOME NO.3

 INSPECT AND TEST THE COMFIGURED COMPUTER NETWORKS

CONTENTS:

1. Testing the configured computer networks

2. Secured configured computer networks

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the configuration done


on the computer networks conforms with the manufacturer’s
instruction/manual

2. Computer networks are checked to ensure safe operation.

3. Reports are prepared/completed according to company requirements.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 3.1-1


TESTING THE CONFIGURED COMPUTER NETWORKS

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the testing computer networks

2. Identify and test the computer networks

Network testing definition

What is network testing, really? Since I am not very good at explaining


things, I went to the Wikipedia article on software testing and found this:
“Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software
testing can also provide an objective, independent view of the software to allow
the business to appreciate and understand the risks of software
implementation.” – 

That sounds pretty good to me. But if we take that passage and replace
“software” with “network”, we get:

“Network testing is an
investigation conducted to provide
stakeholders with information about
the quality of the product or service
under test. Network testing can also
provide an objective, independent
view of the network to allow the
business to appreciate and
understand the risks of network
implementation.”
Couldn’t be further from the truth.
Network testing is, in the end,
making sure that your network
configuration works as designed. Network testing is very similar to software
testing, with one exception: in contrast to software testing, network testing
often has to happen in a production environment, after the configuration
change was made. In fact, it is sometimes very difficult, or almost impossible,
to model a complex system like a large enterprise network, or the Internet
itself, in a lab environment. Thus, network testing is a MUST-HAVE step in the
network implementation process.

What is Use Case in Testing?

A Use Case in Testing is a brief


description of a particular use of the
software application by an actor or
user. Use cases are made on the basis
of user actions and the response of the
software application to those user
actions. It is widely used in developing
test cases at system or acceptance
level.

Use Case Testing

Use Case Testing is a software testing technique that helps to identify test
cases that cover entire system on a transaction by transaction basis from start
to end. Test cases are the interactions between users and software application.
Use case testing helps to identify gaps in software application that might not be
found by testing individual software components.

HOW TO TEST COMPUTER NETWORKS?

1.Testing Network Connectivity


A few tools can help you determine whether the network can send data
between computers; these tools test the network protocols as well as low-level
network hardware layers.

Ping
ping is a fundamental tool for testing TCP/IP network connectivity. Because
most networks today use the Internet (TCP/IP) protocol for file and printer
sharing services, as well as for Internet access, most Windows users can use
the ping test to confirm that their network cabling, hardware, and the TCP/IP
protocol are all functioning correctly. Ping sends several data packets to a
specified computer and waits for the other computer to send the packets back.
By default, it sends four packets and prints the results of the four tests.
To see whether the network can carry data between a pair of computers, use
the ipconfig command (described previously) to find the IP address of the two
computers. Then, on one computer, open a command prompt window by
choosing Start, All Programs, Accessories, Command Prompt.
Next, type the following command:

Ping 127.0.0.1

This command tests the networking software of the computer itself by sending
packets to the special internal IP address 127.0.0.1. This test has the computer
send data to itself. It should print the following:

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

If it doesn't, the TCP/IP protocol itself is incorrectly installed or configured;


check the computer's IP address configuration, or, if that seems correct,
remove and reinstall the Internet Protocol from Local Area Connection in
Network Connections. (I have to say, in more than 10 years of working with PC
networks, I've never seen this test fail.)

If your computer can send data to itself, try another computer on your LAN.
Find its IP address by running ipconfig on that computer and then issue
the ping command again on the first computer, as in this example:
Ping 192.168.0.23

Of course, you should use the other computer's real IP address in place of
192.168.0.23. You should get four replies as before:

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

These replies indicate that you have successfully sent data to the other
machine and received it back.

If, on the other hand, the ping command returns Request timed out, the


packets either didn't make it to the other computer or they were not returned.
In either case, you have a problem with your cabling, network adapter, or the
TCP/IP protocol setup.
You can use ping to determine which computers can send to which other
computers on your LAN or across wide area networks (WANs) or the
Internet. ping works when given a computer's IP address or its network name.
NOTE

If you enter a computer name, and ping can't determine the computer's IP


address, the problem isn't necessarily a wiring problem—it could be that the
DNS or WINS name lookup systems are not working correctly. Try using an IP
address with ping in this case to help determine what the problem really is.
How to Use the Ping Command to Test Your Network
Connectivity

The ping command sends packets of data to a specific IP address on a network,


and then lets you know how long it took to transmit that data and get a
response. It’s a handy tool that you can use to quickly test various points of
your network. Here’s how to use it.

How Does Ping Work?

Ping comes from a term used in sonar technology that sends out pulses of
sound, and then listens for the echo to return. On a computer network, a ping
tool is built into most operating systems that works in much the same way.
You issue the ping command along with a specific URL or IP address. Your
computer sends several packets of information out to that device, and then
waits for a response. When it gets the response, the ping tool shows you how
long each packet took to make the round trip—or tells you there was no reply.

It sounds simple, and it is. But you can use it to good effect. You can test
whether your computer can reach another device—like your router—on your
local network, or whether it can reach a device on the Internet. This can help
you determine if a network problem is somewhere on your local network, or
somewhere beyond. The time it takes packets to return to you can help you
identify a slow connection, or if you’re experiencing packet loss.

And it pretty much doesn’t matter what operating system you’re using. Pull up
a terminal or Command Prompt window, and you can use ping on macOS,
Linux, or any version of Windows.
How to Use Ping

We’re going to use the Windows Command Prompt in our example here. But
you can also use the ping command in Windows PowerShell, or in the Terminal
app on macOS or any Linux distro. Once you get to using the actual command,
it works the same everywhere.

In Windows, hit Windows+R. In the Run window, type “cmd” into the search
box, and then hit Enter.

At the prompt, type “ping” along with the URL or IP address you want to ping,
and then hit Enter. In the image below, we’re pinging www.howtogeek.com and
getting a normal response.
That response shows the URL you’re pinging, the IP address associated with
that URL, and the size of the packets being sent on the first line. The next four
lines show the replies from each individual packet, including the time (in
milliseconds) it took for the response and the time-to-live (TTL) of the packet,
which is the amount of time that must pass before the packet is discarded.

At the bottom, you’ll see a summary that shows how many packets were sent
and received, as well as the minimum, maximum, and average response time.

And in the next image, we’re pinging the router on our local network using its
IP address. We’re also getting a normal response from it.

When the ping tool does not get a response from whatever devices you’re

pinging, it lets you know that, too.


And that’s how to use ping at its most basic. Of course, like most commands,
there are some advanced switches you can use to make it behave a bit
differently. For example, you can have it keep pinging a destination until you
stop the command, specify the number of times you want it to ping, set how
often it should ping, and more. But unless you’re doing some very specific
types of troubleshooting, you won’t need to worry much about those advanced
switches.

If you’re curious about them, though, just type “ping /?” at the Command
Prompt to see a list.
So, What Can You Do With Ping?

Now that you know how to use the command, here are some interesting things
you can do with it:

 Ping a URL (like www.howtogeek.com) or IP address to see if you can


reach an internet destination. If you get a successful response, you know
that all the networking devices between you and that destination are
working, including the network adapter in your computer, your router, and
whatever devices exist on the internet between your router and the
destination. And if you’re interested in exploring those routes further, you
can use another networking tool named tracert to do just that.
 Ping a URL to resolve its IP address. If you want know the IP address for
a particular URL, you can ping the URL. The ping tool shows you right at the
top the IP address it’s working with.
 Ping your router to see if you can reach it. If you can’t successfully ping
an internet location, you can then try pinging your router. A successful
response lets you know that your local network is working okay, and that
the problem reaching the internet location is somewhere out of your control.
 Ping your loopback address (127.0.0.1). If you can’t successfully ping
your router, but your router appears to be turned on and working, you can
try pinging what’s known as a loopback address. That address is always
127.0.0.1, and pinging it successfully lets you know that the network
adapter on your computer (and the networking software in your OS) is
working properly.

Note: You may not get a ping response from other computers on your local
network because the built-in firewalls on those devices prevent them from
responding to ping requests. If you want to be able to ping those devices, you’ll
need to turn off that setting to allow pings through the firewall.

The list above uses a kind of outside-in approach, where you ping the furthest
destination first, and then work your way in to the more local devices. Some
people like to work inside-out by pinging the loopback address first, then their
router (or another local device), and then an internet address.

And of course, what we’re talking about in this article is mostly about using
ping to perform troubleshooting on a home or small business network. On
larger networks, there’s a lot more complexity to worry about. Plus, if you’re
tasked with troubleshooting larger networks, you probably already know how
to use ping and many other networking tools.
TASK SHEET 3.1-1

TESTING THE CONFIGURED COMPUTER NETWORKS

Performance Objective: given necessary tools,equipment and materials,


you should be able to testing the configured computer networks ff.
standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


2 computer systems unit,table, wireless router tp-link,switch hub,patch
panel,network cable,modem internet,Lan tester.

Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

A.Testing Your Computer Network
1. 1.Check the physical connections. Check that the Link light — the little red
or green light next to the RJ-45 port — is lit on every computer
2.
3. 2.Verify that you can log on
4.
5. 3.Check the network configuration
6.
7. 4.This command will spit out numerous lines of information
8.
9. 5.Verify that the computers can ping each other

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-1
CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Check the physical connections. Check that the Link light — the little
red or green light next to the RJ-45 port — is lit on every computer

1. Verify that you can log on

Check the network configuration

2. This command will spit out numerous lines of information


3.

4. Verify that the computers can ping each other

INFORMATION SHEET 3.1-2


SECURED THE CONFIGURED COMPUTER NETWORKS

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine and secured the computer networks

2. Identify and secured the computer netwroks

Checking Network Configuration


If hardware isn't at fault, you may have a fundamental network configuration
problem. Often the Event Log or Device Manager gives these problems away,
but if they don't, you can use another batch of tools to check the computer's
network configuration.

ipconfig
If your computer can't communicate with others on your LAN, after you check
the Event Log and Device Manager, use the ipconfig command-line utility to
see whether your computer has a valid IP address. Check other computers on
the LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs,
Accessories, Command Prompt), type the following command:

ipconfig /all

The results should look something like this:


Windows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : mycompany.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . . : Yes

WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : Intel 21140-Based PCI Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-FF-DD-CA-5F

DHCP Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe80::ed10:dff9:693c:803d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.15.108(Preferred)

Subnet Mask . . . . . . . . . . . : 255.255.255.0


Lease Obtained. . . . . . . . . . : Friday, October 20, 2006 5:55:11 PM

Lease Expires . . . . . . . . . . : Friday, October 27, 2006 5:55:23 PM

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

DNS Servers . . . . . . . . . . . : 192.168.15.1

NetBIOS over Tcpip. . . . . . . . : Enabled

(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that
mention Tunnel adapters.)

The most important items to look for are the following:

 Host name—This should be set to the desired name for each computer.
If you can correspond with some computers but not others, be sure that
the ones that don't work are turned on and correctly named. Make sure
that you don't have two computers with the same name, and that none of
the computer names is the same as the workgroup name.
 IP address—This should be set appropriately for your network. If your
LAN uses Internet Connection Sharing, the address will be a number in the
range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for
automatic configuration, your network manager can tell you whether the IP
address is correct. Networks with cable/DSL sharing routers usually use
numbers starting with 192.168.x where x is a number from 0 to 15.

If you see a number in the range 169.254.0.1 through 169.254.255.254,


your computer is set for automatic configuration, but no DHCP server was
found, so Windows has chosen an IP address by itself. This is fine if your
LAN uses this automatic configuration system. However, if there should
have been a DHCP server, or if you use Internet Connection Sharing or a
hardware Internet Connection router, this is a problem. Restart the ICS
computer or the router, and then restart your computer and try again.

 Network mask—This usually looks like 255.255.255.0, but other


settings are possible. At the least, all computers on the same LAN should
have the same network mask.

Each computer on the same LAN should have a similar valid IP address and
the same network mask. If they don't, check your network configuration. The
built-in Windows "Repair" function may also be used to help fix problems with
DHCP-based (automatic) IP address assignment.

NOTE

To learn more about IP addressing, network masks, and configuration, visit


support.microsoft.com and search for article number 164015, which is titled
"Understanding TCP/IP Addressing and Subnetting Basics."

Computer
You can check your computer's identification and workgroup or domain
membership setup from the Computer window. To do so, click Start,
Computer. Look in the Details pane at the bottom of the screen for the
computer name and domain or workgroup name, as shown in 

On a Windows Workgroup network, the workgroup name should be the same


on all computers on your workgroup LAN. All of the computer names must be
different from each other.

NOTE

None of your computers can use the workgroup or domain name as its
computer name. For example, if your workgroup is MSHOME, you can't also
name a computer MSHOME. If you find this on one of your computers, change
that computer's name.

On a Windows domain network, you should see your computer's name


displayed as part of a Windows domain name (for example, my computer
named myvpc-hb would be called myvpc-hb.mycompany.com on a domain
network) and the domain name. Your domain name might not include .com. It
might say .local instead, or may use a different ending. In any case, be sure
that your computer is actually a domain member. If the word "workgroup"
appears instead, your computer is not a domain member and will not be able
to use domain logins or some domain resources.

Network Connections
You can manually check all installed network protocols and services and their
configuration by viewing Network Connections and viewing the properties for
Local Area Connection. To view this screen, click Start, Network. At the top of
the Network window, click Network and Sharing Center. In the left pane of that
window, click Manage Network Settings. Then, right-click your Local Area
Connection icon (or the appropriate wireless connection icon) and select
Properties.

Confirm that each required protocol is installed and correctly configured. In


general, the settings on each computer on your LAN should match, except that
the IP address differs (usually only in the last of its four dot-separated
numbers). If your LAN uses Automatic IP address configuration, you need to
use the ipconfig command, described earlier, to check the settings.

HOW TO CHECK THE SERVER AND CLIENT NETWORK?

What Is a Client-Server Network?


A client-server network is designed for end-users, called clients, to access
resources such as files, songs, video collections, or some other service from a
central computer called a server. A server's sole purpose is to do what its name
implies - serve its clients! You may have been using this configuration and not
even have known it. Have you ever played Xbox Live or used the PlayStation
Network? Your Xbox One is the client, and when it logs into the network, it
contacts the Xbox Live servers to retrieve gaming resources like updates, video,
and game demos.
How Does It Work?
Imagine a customer sitting
at a restaurant. He is
waiting for the server to
come by and take his order.
The same rules apply in a
client-server network; the
client, which can be a
laptop, desktop, a
smartphone, or pretty
much any computerized
device, can make a request
from the server.
The client uses
the network as a way to
connect with and speak to
the server. Just as the
customer speaks to his server, the client uses the network to send and receive
communications about its order, or request. The server will take the request
and make sure that the request is valid. If everything checks out okay, then the
server will fetch the request and serve the client.
The server can make a request from the client as well. It may want to check up
on the status of the client, or ask if it has received any security patches, or if it
still needs resources from the server. If not, the server will close the connection
in order to free up network traffic.
Can you imagine a server standing next to a customer who just stares at the
menu without ordering anything? After 15 minutes, it would be a good idea for
the server to leave and check on other customers. In both cases, the server
moves on to other clients as needed.

What Are the Advantages of a


Client-Server Network?
The biggest advantage to using this
setup is central management of the
server. Only one server is used to host
the resources that all the clients
request and use. This is especially
good for server administrators,
because they only have to be in one
place and can solve all the problems
in one place, as well. Having to
manually update several hundred
servers would take much more time.
One centrally managed server is the key to ease of management, and it is cost
effective, too.
Another advantage of using one physical server is that the configuration is
simple to set up and takes less time to troubleshoot. For instance, if there were
a site with multiple servers providing redundant services, and it was having
issues, it could take an extreme amount of work to effectively troubleshoot why
services are being hindered. In a single server role, all troubleshooting takes
place at one physical server, so it takes much less time.

How To Secure & check your Computer System And Network


Technology advancements have helped us improve our security and safety –
think security cameras. It has helped us increase our productivity – think
smartphones.

However, at times we technology also presents to us some potential threats


that we need to deal with. For instance, in offices as well as households, we
have wireless networks connecting all major electronic devices. This can
potentially bring about a security concern – as hackers can aim to attack your
system or network and steal your confidential information.

How Severe Is The Threat?

According to a report by Javelin Strategy and Research, the cost of recovering


from such security damage for major organizations can be as high as $7
Million. And this is just the economic loss – there is always the damage done to
brand image and reputation that is far more disastrous.

How Can You Deal With It?

So, how do you protect devices from the prying eyes of the hackers?

Here are some of the ways in which you


can secure your home or office system
and network.

1. Securing your system with


Passwords
It may seem unnecessary for having
passwords and encrypted system
altogether, but this has been among
one of the main reasons why hackers are easily able to attack to the systems
because of weak password and accessibility to access points.

All the wireless networks and secretive information should be well encrypted
with unique username and passwords making it difficult for the hackers to
break into the system. Using a WPA2 encryption is more secure way than any
other encryption protocol as it is not easily hacked into.

2. Safe and Secure Wireless Router


The wireless router allows multiple users to use the internet at the same time,
but if that is kept wide open, it can be dangerous. Any Individual with
malicious intention can use your internet for free, and can even steal your
valuable information or may use for some cyber crime. So it is always advised
to change the SSID provided by the service network and use firewall.

3. Active checking of the system


This majorly applies for the office users, as there may be some of the malicious
insiders, employees from the company who may hack into the systems. It is
comparatively easy for the employees to steal and hack the accounts, as they
are well aware of the system and networks. Such hackers are dangerous for the
organization. So a thorough screening of the employees is advised. Also, the
important files should be admin encrypted so nobody can use it whenever
required.

4. Encrypt the whole disk


This is especially true for Laptop users, as such devices can be stolen easily.
One can even lose it, and there may be some of the important files on the
laptop which can be accessible by the potential hacker or stealer.

So it is a better idea to protect your laptops or systems with whole disk


encryption. They are not very costly but gives protection to your valuable
information.

5. Updated security software


Always make sure to update the operating system, web browser and most
importantly security software. They prove good against any of the viruses or
malware. Make sure to scan any of the USBs and other external devices with
your software security scan to guard against any of the threats. It is important
to keep the software updated.

6. Keeping your in-house security out of reach


Most offices as well as households have been using CCTV cameras to keep
their home or office secure and are attached to the home or office network to
view them anytime and anywhere. But this can be dangerous at times.

If the CCTV hooked up with the system is not encrypted strongly than hackers
can easily view your updates of home or office and steal prime information.
Hackers could get all the insights of your office and household and can make a
right move at the right time.So it is very important to keep it secure with
username and password which may not be guessed. You can have an alarm
and security features if any unknown device hacks into it to keep your system
safe.

7. Beware of Spoofing and Phishing


Hackers know how and when to break into the system. They may attract the
home mobile users or office desktop users by asking them to download or
install any software to speed up the performance of the system. Upon
downloading, all lucrative information can be stolen by them.

Do not register on any untrusted websites asking for personal details or


installing any such software. Also avoid opening unknown email attachments
as they may have a virus, worms or Trojans. These emails can be sent from
trusted sources – so think before clicking.

 Secure your Computer Network

1. Enable encryption on your access point. Using 128-bit encryption or


higher makes your Wireless Network more secure. WEP and WPA are
entirely different encryption schemes. WEP has been proven insecure and
can be cracked in a few minutes using free utilities that can be downloaded
from the Internet. Using at least WPA is recommended, because it is much
more secure, but is sometimes a bit harder to set up correctly than WEP is,
and isn't completely secure.[1] [2] Some older access points or wireless
cards do not support WPA2. If you have one of these, it is recommended
that you purchase a newer one that supports WPA2, depending on how
important you consider your security. 
2. Set the router access password. Anybody who gains access to the
router configuration settings can disable the security you have set up. If
you forget the password, most routers have a hardware reset that will
restore all of the settings to factory defaults. The best option is to use a
random sequence of the maximum length of characters - you only have to
type that once, so it is not a big thing. When you connect to the router via
LAN cable while setting it up, you can copy and paste the password onto the
router and onto your local setting, so you never need to type it again.
Use a secure password. Don't use easily guessed passwords for your WPA2
or router access passwords, such as "ABC123", "Password", or a string of
numbers in order. Use something hard to guess that contains both upper
and lowercase letters as well as numbers. Special characters such as !@#$%
are not supported by some routers. The longer the key, the better, although
the WPA2 key has a minimum and maximum length. Try to make a little
mental effort -- good passwords might be hard to remember, but they are
harder to crack.
If you use a weak key then even WPA and WPA2 can be easily cracked
within a day using a combination of special precomputed tables and
dictionary attacks. The best way to generate a secure key is to use an offline
random number generator or write the entire alphabet in uppercase and
lowercase and numbers 0-9 on separate pieces of paper, mix the paper up
and randomly pick up pieces and return them, mixing them up again each
time; each character you pull out becomes a character in your key. You can
also try throwing a pair of dice and using the resulting numbers as your
password.
 
3. Disable MAC Address filtering on your Access Point or router. A MAC
(not to be confused with the computer model 'Mac') address is a code
unique to every wireless networking card in existence. MAC Address
filtering will register the hardware MAC Address of your networked devices,
and only allow devices with known MAC Addresses to connect to your
network. However, hackers can clone MAC addresses and still enter your
network, so MAC address filtering should not be used in place of proper
WPA2 encryption. 
4. Don't disable the 'SSID Broadcast'. Do not disable the 'SSID Broadcast'
feature of your Access Point or router. This seems counter-intuitive, but it is
actually a bad idea.[3] Although this would make your network invisible to
your neighbors, any determined hacker can still sniff out your SSID; and
you are implicitly forcing your computer to shout out your SSID anywhere
you are, while it is trying to connect to it. Anyone could then impersonate
your router with that SSID, and get your credentials that way. 
5. Disable remote login. The first router worm brute forces its way into the
router in this manner. Most default usernames are set to Admin. It isn't
hard for a virus/worm to crack the password if the username is known. The
good thing is that routers normally have this disabled by default. Be sure to
confirm that it is disabled when you first set up your router and periodically
thereafter. If you need to update your router setting remotely, only set up
access for the time you are going to be connected. 
6. Disable wireless administrating. Finally, change the setting that allows
administrating the router through a wireless connection to 'off' (meaning
that you need to connect with a LAN cable for administration). This disables
any wireless hacking into the router.
7. Update your software regularly. Regular software updates are one of
the most effective steps you can take to improve the overall cybersecurity
posture of your home networks and systems. Besides adding new features
and functionality, software updates often include critical patches and
security fixes for newly discovered threats and vulnerabilities. Most modern
software applications will automatically check for newly released updates. If
automated updates are not available, consider purchasing a software
program that identifies and centrally manages all installed software
updates. (See Understanding Patches and Software Updates.)
8. Remove unnecessary services and software. Disable all unnecessary
services to reduce the attack surface of your network and devices, including
your router. Unused or unwanted services and software can create security
holes on a device’s system, which could lead to an increased attack surface
of your network environment. This is especially true with new computer
systems on which vendors will often pre-install a large number of trial
software and applications—referred to as “bloatware”—that users may not
find useful. The Cybersecurity and Infrastructure Security Agency (CISA)
recommends that you research and remove any software or services that are
not being used regularly.
9. Adjust factory-default configurations on software and
hardware. Many software and hardware products come “out of the box”
with overly permissive factory-default configurations intended to make them
user-friendly and reduce the troubleshooting time for customer service.
Unfortunately, these default configurations are not geared towards security.
Leaving them enabled after the installation may create more avenues for an
attacker to exploit. Users should take steps to harden the default
configuration parameters to reduce vulnerabilities and protect against
intrusions.
10. Change default log-in passwords and usernames. Most network
devices are pre-configured with default administrator passwords to simplify
setup. These default credentials are not secure—they may be readily
available on the internet, or may even be physically labeled on the device
itself. Leaving these unchanged creates opportunities for malicious cyber
actors to gain unauthorized access to information, install malicious
software, and cause other problems.
11. Use strong and unique passwords. Choose strong passwords to help
secure your devices. Additionally, do not use the same password with
multiple accounts. This way, if one of your accounts is compromised, the
attacker will not be able to breach any other of your accounts. (See
Choosing and Protecting Passwords for more information.)
12. Run up-to-date antivirus software. A reputable antivirus software
application is an important protective measure against known malicious
threats. It can automatically detect, quarantine, and remove various types
of malware, such as viruses, worms, and ransomware. Many antivirus
solutions are extremely easy to install and intuitive to use. CISA
recommends that all computers and mobile devices on your home network
run antivirus software. Additionally, be sure to enable automatic virus
definition updates to ensure maximum protection against the latest threats.
Note: because detection relies on signatures—known patterns that can
identify code as malware—even the best antivirus will not provide adequate
protections against new and advanced threats, such as zero-day exploits
and polymorphic viruses.
13. Install a network firewall. Install a firewall at the boundary of your
home network to defend against external threats. A firewall can block
malicious traffic from entering your home network and alert you to
potentially dangerous activity. When properly configured, it can also serve
as a barrier for internal threats, preventing unwanted or malicious software
from reaching out to the internet. Most wireless routers come with a
configurable, built-in network firewall that includes additional features—
such as access controls, web-filtering, and denial-of-service (DoS) defense—
that you can tailor to fit your networking environment. Keep in mind that
some firewall features, including the firewall itself, may be turned off by
default. Ensuring that your firewall is on and all the settings are properly
configured will strengthen the network security of your network. Note: your
internet service provider (ISP) may be able to help you determine whether
your firewall has the most appropriate settings for your particular
equipment and environment.
14. Install firewalls on network devices. In addition to a network firewall,
consider installing a firewall on all computers connected to your network.
Often referred to as host- or software-based, these firewalls inspect and
filter a computer’s inbound and outbound network traffic based on a
predetermined policy or set of rules. Most modern Windows and Linux
operating systems come with a built-in, customizable, and feature-rich
firewall. Additionally, most vendors bundle their antivirus software with
additional security features such as parental controls, email protection, and
malicious websites blocking.
15. Regularly back up your data. Make and store—using either external
media or a cloud-based service—regular backup copies of all valuable
information residing on your device. Consider using a third-party backup
application, which can simplify and automate the process. Be sure to
encrypt your backup to protect the confidentiality and integrity of your
information. Data backups are crucial to minimize the impact if that data is
lost, corrupted, infected, or stolen.
16. Increase wireless security. Follow the steps below to increase the
security of your wireless router. Note: consult your router’s instruction
manual or contact your ISP for specific instructions on how to change a
particular setting on your device.
17. Use the strongest encryption protocol available. CISA recommends
using the Wi-Fi Protected Access 3 (WPA3) Personal Advanced Encryption
Standard (AES) and Temporary Key Integrity Protocol (TKIP), which is
currently the most secure router configuration available for home use. It
incorporates AES and is capable of using cryptographic keys of 128, 192,
and 256 bits. This standard has been approved by the National Institute of
Standards and Technology (NIST).
18. Change the default service set identifier (SSID). Sometimes referred to
as the “network name,” an SSID is a unique name that identifies a
particular wireless local area network (WLAN). All wireless devices on a
Wireless Local Area Network (WLAN) must use the same SSID to
communicate with each other. Because the device’s default SSID typically
identifies the manufacturer or the actual device, an attacker can use this to
identify the device and exploit any of its known vulnerabilities. Make your
SSID unique and not tied to your identity or location, which would make it
easier for the attacker to identify your home network.
19. Disable Wi-Fi Protected Setup (WPS). WPS provides simplified
mechanisms for a wireless device to join a Wi-Fi network without the need
to enter the wireless network password. However, a design flaw in the WPS
specification for PIN authentication significantly reduces the time required
for a cyberattacker to brute force an entire PIN, because it informs them
when the first half of the eight-digit PIN is correct. Many routers lack a
proper lockout policy after a certain number of failed attempts to guess the
PIN, making a brute-force attack much more likely to occur. See Brute
Force Attacks Conducted by Cyber Actors.
20. Reduce wireless signal strength. Your Wi-Fi signal frequently
propagates beyond the perimeters of your home. This extended emission
allows eavesdropping by intruders outside your network perimeter.
Therefore, carefully consider antenna placement, antenna type, and
transmission power levels. By experimenting with your router placement
and signal strength levels, you can decrease the transmitting coverage of
your Wi-Fi network, thus reducing this risk of compromise. Note: while this
reduces your risk, a motivated attacker may still be able to intercept a
signal that has limited coverage.
21. Turn the network off when not in use. While it may be impractical to
turn the Wi-Fi signal off and on frequently, consider disabling it during
travel or extended periods when you will not need to be online. Additionally,
many routers offer the option to configure a wireless schedule that will
automatically disable the Wi-Fi at specified times. When your Wi-Fi is
disabled, you prevent outside attackers from being able to exploit your
home network.
22. Disable Universal Plug and Plan (UPnP) when not needed. UPnP is a
handy feature that allows networked devices to seamlessly discover and
establish communication with each other on the network. However, though
the UPnP feature eases initial network configuration, it is also a security
risk. Recent large-scale network attacks prove that malware within your
network can use UPnP to bypass your router’s firewall, allow attackers to
take control of your devices remotely, and spread malware to other devices.
You should therefore disable UPnP unless you have a specific need for it.
23. Upgrade firmware. Check your router manufacturer’s website to ensure
you are running the latest firmware version. Firmware updates enhance
product performance, fix flaws, and address security vulnerabilities. Note:
some routers have the option to turn on automatic updates.
24. Disable remote management. Most routers offer the option to view and
modify their settings over the internet. Turn this feature off to guard against
unauthorized individuals accessing and changing your router’s
configuration.
25. Monitor for unknown device connections. Use your router
manufacturer’s website to monitor for unauthorized devices joining or
attempting to join your network. Also see the manufacturer’s website for
tips on how to prevent unauthorized devices from connecting to your
network.
26. Mitigate Email Threats. Phishing emails continue to be one of the most
common initial attack vectors employed by for malware delivery and
credential harvesting. Attacking the human element—considered the
weakest component in every network—continues to be extremely effective.
To infect a system, the attacker simply has to persuade a user to click on a
link or open an attachment. The good news is that there are many
indicators that you can use to quickly identify a phishing email. The best
defense against these attacks is to become an educated and cautious user
and familiarize yourself with the most common elements of a phishing
attack.  
27. Use a security-focused DNS service provider.  By default, your router
will be configured to forward Domain Name System (DNS) requests to your
ISP, which means you have to trust your ISP to maintain a secure DNS
lookup service. Since DNS acts as the internet’s phone book, locating the IP
addresses of the websites you want to visit, hackers commonly target it to
direct users to malicious websites in a way that’s typically hard to spot.
Companies like Google, Cloudflare, OpenDNS (Cisco) and others offer
publicly available DNS resolvers that are security-focused and even have
encrypted versions.

SELF-CHECK 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS

Fill the blank: write the correct answer

--------------------------1. Its is a wireless router allows multiple users to use the


internet at the same time, but if that is kept wide open, it can be dangerous.

____________________2. Its is a reputable antivirus software application is an


important protective measure against known malicious threats. It can
automatically detect, quarantine, and remove various types of malware, such
as viruses, worms, and ransomware. Many antivirus solutions are extremely
easy to install and intuitive to use.

____________________3. Its is a Anybody who gains access to the router


configuration settings can disable the security you have set up. If you forget
the password, most routers have a hardware reset that will restore all of the
settings to factory defaults.

_____________________4.its is a while it may be impractical to turn the Wi-Fi


signal off and on frequently, consider disabling it during travel or extended
periods when you will not need to be online.

____________________5. Its is a regular software updates are one of the most


effective steps you can take to improve the overall cybersecurity posture of your
home networks and systems.

Enumeration: write the answer in your whole sheet pad paper

1. Gives the secure your computer network?

2. Gives the Secure & check your Computer System And Network?

TASK SHEET 3.1-2

SECURED THE CONFIGURED COMPUTER NETWORKS

Performance Objective: given necessary tools,equipment and materials,


you should be able to secured the configured computer networks ff.
Standard operating procedures within 2 half hour
Supplies/Materials and Equipment:
Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, etc.

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4. Follow the steps / procedures below:


1. Put In And Monitor Firewall Performance. A firewall is a
piece or set of software or hardware designed to block unauthorized access
to computers and networks
2. Update Passwords At Least Every Quarter
3. Maintain Your Anti-Virus Software
4. Create A Virtual Private Network (VPN)
5. Training Your Employees
6. Ask for Help

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-2


CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation


Gather the necessary materrials and equipment

Put In And Monitor Firewall Performance. A firewall is a piece or set of


software or hardware designed to block unauthorized access
to computers and networks
Update Passwords At Least Every Quarter

Maintain Your Anti-Virus Software

Create A Virtual Private Network (VPN)

Training Your Employees

Ask for Help

You might also like