You are on page 1of 35

EXPECTED LEARNING OUTCOMES

At the end of the module, you should be able to:

LO1. configure client device systems settings in accordance with


manufacturer’s instructions and end user preferences;
LO2. configure LAN in accordance with manufacturer’s
instructions and network design;
LO3. configure WAN in accordance with manufacturer’s
instructions and network design
set router/Wi-fi/wireless access point/repeater
configuration;
LO4. configure wireless settings in accordance with
manufacturer’s instructions, network design, and end-user
preferences; and
LO5. configure security/firewall/advanced settings in accordance
with manufacturers instruction and end-user preferences
PRE-ASSESSMENT
Let us determine how much you already know about installing
mechatronic devices. Read and analyze each statement carefully.
Choose the best answer and write only the letter of your answer on
your answer sheet.

1. This term comes from the Greek word that means “air, wind or
breath, and movement.”
a. hydraulic
b. motor control
c. pneumatic
d. programmable logic control

2. This is a mechatronics system that deals with the study of liquids


in motion and pressure in pipes and cylinders.
a.actuator
b.hydraulic
c.motor control
d.pneumatic

3. This is a component of the pneumatic system used to control the


direction, flow rate, and pressure of compressed air.
a. air filter
b. pressure switch
c. reservoir
d. valve

4. This is a combination of mechanisms and electronics.


a. auto mechanics
b. electronics
c. mechanics
b. mechatronics
Lesson 2: Set router/Wi-fi/Wireless access
point/repeater configuration

 Configure client device systems settings in accordance with


manufacturer’s instructions and end user preference

 Configure LAN in accordance with manufacturer’s


instructions and network design

 Configure WAN in accordance with manufacturer’s


instructions and network design

 Configure wireless settings in accordance with


manufacturer’s instructions, network design, and end-user
preferences

 Configure security/firewall/advanced settings in accordance


with manufacturers instruction and end-user preferences

DEFINITION OF TECHNICAL TERMS


Access points. Station that transmits and receives data
(sometimes referred to as a transceiver)

Cloud Computing. The use of various services, such as


software development platforms, servers, storage and
software, over the internet, often referred to as the "cloud."

Gateways. Node (router) in a computer network, a key stopping


point for data on its way to or from other networks.

Routers. Device that analyzes the contents of data packets


transmitted within a network or to another network.
LESSON INFORMATION 2.1
Wireless Network

A wireless network is a computer network that uses wireless data


connections between network nodes.

Wireless networking is a method by which


homes, telecommunications networks and business installations
avoid the costly process of introducing cables into a building, or as a
connection between various equipment locations.

 Wireless telecommunications networks are generally implemented


and administered using radio communication. This implementation
takes place at the physical level (layer) of the OSI model network
structure.

Examples of wireless networks include cell phone networks, wireless


local area networks (WLANs), wireless sensor networks, satellite
communication networks, and terrestrial microwave networks.

Wireless PAN
Wireless personal area
networks (WPANs) connect devices
within a relatively small area, that is
generally within a person's reach. For
example, both Bluetooth radio and
invisible infrared light provides a WPAN
for interconnecting a headset to a
laptop. ZigBee also supports WPAN
applications. Wi-Fi PANs are becoming
commonplace (2010) as equipment
designers start to integrate Wi-Fi into a
variety of consumer electronic
devices. Intel "My WiFi" and Windows
7 "virtual Wi-Fi" capabilities have made
Wi-Fi PANs simpler and easier to set up
and configure.

Wireless LAN
Wireless LANs are often used for connecting to local resources and to
the Internet

A wireless local area network (WLAN) links two or more devices over a
short distance using a wireless distribution method, usually providing
a connection through an access point for internet access. The use
of spread-spectrum or OFDM technologies may allow users to move
around within a local coverage area, and still remain connected to the
network.
Products using the IEEE 802.11 WLAN standards are marketed under
the Wi-Fi brand name . Fixed wireless technology implements point-
to-point links between computers or networks at two distant
locations, often using dedicated microwave or modulated laser
light beams over line of sight paths. It is often used in cities to
connect networks in two or more buildings without installing a wired
link. To connect to Wi-Fi, sometimes are used devices like a router or
connecting HotSpot using mobile smartphones.

Wireless ad hoc network


A wireless ad hoc network, also known as a wireless mesh
network or mobile ad hoc network (MANET), is a wireless network
made up of radio nodes organized in a mesh topology. Each node
forwards messages on behalf of the other nodes and each node
performs routing. Ad hoc networks can "self-heal", automatically re-
routing around a node that has lost power. Various network layer
protocols are needed to realize ad hoc mobile networks, such
as Distance Sequenced Distance Vector routing, Associativity-Based
Routing, Ad hoc on-demand Distance Vector routing, and Dynamic
source routing.

Wireless MAN
Wireless metropolitan area networks are a type of wireless network
that connects several wireless LANs.

WiMAX is a type of Wireless MAN and is described by the IEEE


802.16 standard
Benefits of a wireless network
Convenience Access your network resources from any location
within your wireless network's coverage area or
from any Wi-Fi hotspot.

Mobility You're not tied to your desk, as you are with a


wired connection. You and your employees can go
online in conference room meetings, for example.

Productivity Wireless access to the Internet and to your


company's key applications and resources helps
your staff get the job done and encourages
collaboration.
Easy setup You don't have to string cables, so installation can
be quick and cost effective.

Expandability You can easily expand wireless networks with


existing equipment, whereas a wired network
might require additional wiring.

Security Advances in wireless networks provide robust


security protections

Cost Because wireless networks eliminate or reduce


wiring expenses, they can cost less to operate than
wired networks.

Gateway

A gateway is a node (router) in a computer network, a key stopping


point for data on its way to or from other networks. Thanks to
gateways, we are able to communicate and send data back and forth.
The Internet wouldn't be any use to us without gateways (as well as a
lot of other hardware and software).
In a workplace, the gateway is the computer that routes traffic from a
workstation to the outside network that is serving up the Web pages.
For basic Internet connections at home, the gateway is the Internet
Service Provider that gives you access to the entire Internet.
A node is simply a physical place where the data stops for either
transporting or reading/using. (A computer or modem is a node; a
computer cable isn't.) Here are a few node notes:
On the Internet, the node that's a stopping point can be a gateway or
a host node.
A computer that controls the traffic your Internet Service Provider
(ISP) receives is a node.
If you have a wireless network at home that gives your entire family
access to the Internet, your gateway is the modem (or modem-router
combo) your ISP provides so you can connect to their network. On the
other end, the computer that controls all of the data traffic your
Internet Service Provider (ISP) takes and sends out is itself a node.
When a computer-server acts as a gateway, it also operates as a
firewall and a proxy server. A firewall keeps out unwanted traffic and
outsiders off a private network. A proxy server is software that "sits"
between programs on your computer that you use (such as a Web
browser) and a computer server—the computer that serves your
network. The proxy server's task is to make sure the real server can
handle your online data requests.
Routers can be gateways because a router can control the path
through which information is sent in and out. It does so by using
built-in headers and forwarding tables to figure out where packets of
data need to be sent. Those packets of data carry your emails,
transactions, online activity and so on.
A gateway is one of the many ways our data is moved over the Web for
us. The gateway gives us entry into different networks so we can send
email, look at Web pages, buy things online, and more. You can easily
say that gateways deliver the freedom, information and convenience
we enjoy online.
Firewall
A firewall is a system designed to prevent unauthorized access to or
from a private network. You can implement a firewall in either
hardware or software form, or a combination of both. Firewalls
prevent unauthorized internetusers from accessing private networks
connected to the internet, especially intranets. All messages entering
or leaving the intranet (the local network to which you are connected)
must pass through the firewall, which examines each message and
blocks those that do not meet the specified security criteria.
Several types of firewalls exist:

 Packet filtering: The system examines each packet entering or


leaving the network and accepts or rejects it based on user-
defined rules. Packet filtering is fairly effective and transparent
to users, but it is difficult to configure. In addition, it is
susceptible to IP spoofing.

 Circuit-level gateway implementation: This process applies


security mechanisms when a TCP or UDP connection is
established. Once the connection has been made, packets can
flow between the hosts without further checking.
 Acting as a proxy server: A proxy server is a type of gateway
that hides the true network address of the computer(s)
connecting through it. A proxy server connects to the internet,
makes the requests for pages, connections to servers, etc., and
receives the data on behalf of the computer(s) behind it. The
firewall capabilities lie in the fact that a proxy can be configured
to allow only certain types of traffic to pass (for
example, HTTP files, or web pages). A proxy server has the
potential drawback of slowing network performance, since it has
to actively analyze and manipulate traffic passing through it.

 Web application firewall: A web application firewall is a


hardware appliance, server plug-in, or some other software filter
that applies a set of rules to a HTTP conversation. Such rules
are generally customized to the application so that many
attacks can be identified and blocked.

In Windows and macOS, firewalls are built into the operating system.

Third-party firewall packages also exist, such as Zone Alarm, Norton


Personal Firewall, Tiny, Black Ice Protection, and McAfee Personal
Firewall. Many of these offer free versions or trials of their commercial
versions.

In addition, many home and small office broadband routers have


rudimentary firewall capabilities built in. These tend to be simply
port/protocol filters, although models with much finer control are
available.

Enabling Windows 7 Firewall.


One of the security features that Microsoft provides to keep your
information private is the Windows Firewall. By enabling the Windows
Firewall and keeping Windows 7 up to date, you can keep your
computer safe from outsiders and avoid several kinds of attacks on
your data. The Windows Firewall is designed to keep your computer
safe from outsiders by preventing any program from entering or
exiting your computer via the Internet.

1. Choose Start→Control Panel→System and Security→Windows


Firewall.
2. Click the Turn Windows Firewall On or Off link in the left pane
of the window. The Windows Firewall Customize Settings
window opens.
3. Select the Turn on Windows Firewall radio button for one or
both of the network locations. Click OK.
4. You can choose to impose a different level of security on each of
the network types: Home or Work (Private) Network Location
Settings and Public Network Location Settings.
5. Click the Close button to close Windows Security Center and
the Control Panel.
Cloud Computing
Cloud computing is the use of various services, such as software
development platforms, servers, storage and software, over the
internet, often referred to as the "cloud."
In general, there are three cloud computing characteristics that are
common among all cloud-computing vendors:
1. The back-end of the application (especially hardware) is
completely managed by a cloud vendor.
2. A user only pays for services used (memory, processing time
and bandwidth, etc.).

3. Services are scalable

Many cloud computing advancements are closely related to


virtualization. The ability to pay on demand and scale quickly is
largely a result of cloud computing vendors being able to pool
resources that may be divided among multiple clients.
Testing Network Connectivity
A few tools can help you determine whether the network can send
data between computers; these tools test the network protocols as well
as low-level network hardware layers.
ping
ping is a fundamental tool for testing TCP/IP network connectivity.
Because most networks today use the Internet (TCP/IP) protocol for
file and printer sharing services, as well as for Internet access, most
Windows users can use the ping test to confirm that their network
cabling, hardware, and the TCP/IP protocol are all functioning
correctly. Ping sends several data packets to a specified computer and
waits for the other computer to send the packets back.

Assigning IP Addresses (No Router)

Self Check 1.4


Direction: Enumerate at least 5 Benefits of a wireless network
1. _________________________

2. _________________________

3. _________________________

4. _________________________

5. _________________________
LEARNING ACTIVITY 1.1

Firewall Configuration
TASK TITLE:

Given the necessary tools and equipment,


OBJECTIVES:
you should be able to configure firewall
and network security.

LABORATORY WORK: Materials:

1. List down the Computers


available security feature
found on Windows Windows 7 as Operating Systems
Operating System

2. Perform the securing


firewalls

EVALUATION: The student will be assessed according to the


performance criteria.

Performance Criteria 1.1

Did you…. Yes No

1. Recognize the available security feature of Windows OS.

2. Determine the use of firewalls

3. Explain when to turn on/off security feature.

4. Successfully turns on the firewall.


LESSON INFORMATION 2.1
Wireless Configuration
Router
A router is a device that analyzes the contents of data packets
transmitted within a network or to another network. Routers
determine whether the source and destination are on the same
network or whether data must be transferred from one network type
to another, which requires encapsulating the data packet with routing
protocol header information for the new network type.

Router Configuration
1. Connect the LAN cable to the router to computer servers

2. Open any computer browser, like google chrome, and type its
default IP address(most of the IP address is located at the bottom
of the device) e.g. 192.168.0.1
3. Enter user credentials.
Eg. By default Username: admin Password: admin

4. On the Graphical User Interface(GUI) of the router, click on


system tools menu and hit Restore.
5. The router will restore to its original setting.

6. On the menu, select Wireless -> Wireless Settings. To change


Wireless Network Name also known as SSID.
7. To secure the wireless connection, click Wireless Security. Type
the desired wireless password.

8. To disable routers DHCP, click on DHCP tab, hit DHCP Settings,


and select Disabled.
9. The router will automatically restart after disabling the routers
DHCP.

Configure Local Network Area


It is virtually impossible to find a business that does not have a local
area network in place. If you work in an office setup that has a local
area connection and would like to setup your PC to the LAN to
connect to the Internet, then look no further.
1. Attach the RJ-45 connector to the Ethernet network port on
your PC.
2. Right click on ‘My Network Places’ icons located on the desktop and
in the popup menu. Click on Properties

Alternatively, click ‘Start’ from the taskbar and right click on


‘My Network Places’ option from the popup menu. In the menu that
appears select ‘Properties’

3. Right-click on ‘Local Area Connection’ in the new Window that


appears (under the LAN or High-Speed internet section).
4. Click Properties in the popup menu that appears.

5. Scroll down and select ‘Internet Protocol (TCP/IP) and click on


‘Properties' in the Local Area Connection dialog box that appears
under the connection box.
6. Opt for obtaining the configuration settings automatically or
manually. To obtain the settings automatically, select ‘Obtain an IP
Address Automatically’. However, to use this option, you will need to
have a DHCP server that will function in allocating and managing IP
address to ensure that there are no conflicts.

7. Configure your PC to the network manually, if you modem isn't


connected that with the options mentioned above.
Click the option ‘Use the following IP Address’.
Enter the IP address to use. It is important that you consult your
network administrator on the IP to use so as to avoid conflicts
occurring in the network, i.e. a situation where two PCs have similar
IP addresses.

Enter the Subnet Mask and Default gateway. The subnet mask is
used to identify the network level you are in while the default gateway
identifies the router connection
8. Check connection. This will enable you to know if the local area
connection is connected or disconnected.

Dynamic means "constantly changing." The


prefix dyna means power; however, dynamic IP addresses aren't more
powerful, but they can change (or be changed).
Static means staying the same. Static. Stand. Stable. Yes, static IP
addresses don't change.

Most IP addresses assigned today by Internet Service Providers are


dynamic IP addresses. It's more cost effective for the ISP and you.

How to share your laptop wireless internet connection to another


computer 

If you have an internet connection on your laptop by means of your


Wireless adapter, or a USB Modem, you could share this to other
computer, and here it what it takes:

Step 1: Create a cross over cable. How to create a cross over


cable? click here

Step 2: Connect the first end to your laptop LAN port,

Step 3: Connect the other other end to your computer without a


wireless LAN

Step 4: Go to Network sharing center. 


Step 5: Click Change adapter settings

Step 6: Right click on your wireless adapter (the one connected on the
internet) then click properties
Step 7: Click Sharing tab and choose allow other user to connect
through this computer's internet connection, then choose the LAN
adapter where you connect your cross over cable.

Note: your wireless adapter or the network device that you shared will
become the gateway and will serve as a gateway for other computers
connected on it.

Also, choose obtain IP address automatically option if your internet


connection is a dynamic type, If static, you will be required to
configure this correctly.
CONFIGURE N ROUTER AS A WIRELESS ACCESS POINT
The main router will be connected to the TP-Link N router via LAN port (as seen
below).  The WAN port is not used for this configuration.

                     Main Router                                                     Access Point

Step 1

Connect your computer to a second LAN port on your TP-Link N router using an
Ethernet cable.* Login to the TP-Link web interface through the IP address listed
on the label on the bottom of your TP-Link N router (see below link for
assistance):

Note: Though possible, it is not recommended to attempt this process over Wi-Fi

 Step 2

Go to Network>LAN on the side menu and change the LAN IP address of your


TP-Link N router to an IP address on the same segment of the main router. This
IP address should be outside the main router’s DHCP range.

 Example: if the DHCP of your main router is 192.168.2.100 – 192.168.2.199


then you can set the IP of the TP-Link N router to 192.168.2.X (X should be
outside your main router's DHCP range), like 192.168.2.11.

Note:  After changing the LAN IP address a reboot will be required and you will
need to log into the TP-Link N router with the new IP address.

Step 3

Go to Wireless>Wireless Settings and configure the SSID (Network name)which


can be the same or different from the main router’s. Select Save.
 Step 4

Go to Wireless>Wireless Security and configure the wireless


security. WPA/WPA2-Personal is recommended as the most secure option. 
Once configured, click Save.

Note: If using a dual band router, repeat this process for the 5GHz band as well.

 Step 5

Go to DHCP>DHCP Settings and select Disable the DHCP Server. Select Save.


Step 6

Go to System Tools>Reboot and select Reboot to reboot the device.

 Step 7

Use an Ethernet cable to connect the main router to your TP-Link N router
through their LAN ports (any LAN ports may be used). All other LAN ports on
your TP-Link N router will now grant devices Internet access. Alternatively, any
Wi-Fi device can now access the Internet through your TP-Link N router by
using the SSID and Password set up in the above steps.
SELF-CHECK 1.1
Choose the correct answer to the question. Write only the letter of the
answer on your answer sheet.

1. Device that analyzes the contents of data packets transmitted


within a network or to another network
a. Access point
b. Repeater
c. Router
d. Switch

2. Dynamic means "constantly changing." The


prefix dyna means __________; however, dynamic IP addresses
aren't more powerful, but they can change (or be changed).
a. active
b. force
c. multiple
d. power

3. These are systems that are mainly used for precise control of larger
forces.
a. hydraulic
b. pneumatic
c. plc
d. motor
4. He was the senior engineer who coined the term mechatronics.
a. Tesuros Mori
b. Tetsuro Mori
c. Tetsuro Moris
d. Teturo Mori

5. These elements are used to interface electromechanical sensors


and actuators to the control interface/computing hardware
element.
a. computer element
b. electromechanical
c. electrical/electronic
d. cylinders
LEARNING ACTIVITY 1.1
Draw the symbol of the following components on your answer sheet.
1. Plunger actuator
2. Roller actuator
3. Solenoid actuator
4. Two-position valve
5. Three-way valve
POST-ASSESSMENT

Let us determine how much you already know about installing


mechatronic devices. Read and analyze each statement carefully.
Choose the best answer and write only the letter of your answer on
your answer sheet.

1. This term comes from the Greek word that means “air, wind or
breath, and movement.”
a. hydraulic
b. motor control
c. pneumatic
d. programmable logic control

2. This is a mechatronics system that deals with the study of liquids


in motion and pressure in pipes and cylinders.
a. hydraulic
b. motor control
c. pneumatic
d. programmable logic control

3. This is a component of the pneumatic system used to control the


direction, flow rate, and pressure of compressed air.
a. hydraulic
b. motor control
c. pneumatic
d. programmable logic control

4. This is a combination of mechanisms and electronics.


a. hydraulic
b. motor control
c. pneumatic
d. programmable logic control

Refer to the Answer Key.


ANSWER KEY
Area of Specialization: MECHATRONICS SERVICING NC II

Module Title: MODULE I (INSTALLING MECHATRONICS DEVICES)

Preassessment Self-Check 1.1 Self-Check 2.1

1. C 16. A I. 1. A
6. D
2. C
2. B 17. D 1. B
7. C 3. D
3. D 18. C 2. C
4. D
8. C
4. D 19. C 3. A 5. C
9. A
6. D
5. A 20. C 4. B
10. D 7. C
6. C 21. A 5. C
8. B
7. D 22. C 9. A
II.
10.B
8.C 23. B

9. B 24. A

10. C 25. D

11. D 26. C

12. A 27. B

13. A 28. C

14. C 29. B

15. A 30. A
Self-Check 2.2 Self-Check 3.1 Post-Assessment

1. A 1. Air reservoir 1. A 16. D

2. A 2. 3-2 hand valve 2. C 17. D

3. C 3. Regulator 3. C 18. C

4. A 4. Single acting pneumatic 4. C 19. A

5. B cylinder 5. B 20. A

6. B 5. Solenoid valve (normally 6. D 21. C

7. C closed) 7. D 22. C

8. B 6. Flow control valve 8.C 23. B

9. C 9. B 24. A

10. D 10. D 25. A

11. A 26. B

12. D 27. C

13. A 28. B

14. B 29. B

15. C 30. D
REFERENCES
(OJO Ed: Please style entries following the Chicago Manual of Style)

Agricultural Arts for Secondary. 2012


Agricultural Arts (T.H.E., SEDP, NSEC series) by Ramon G.
Asuncion et.al.
Asuncion, Jr. Ramon G. 1983. Elementary Agriculture: Saint Mary’s
publishing.
Asuncion, Jr. Ramon G. 1976. Introduction to Tropical Crop Production:
First Edition: Saint Mary’s publishing.
Asuncion, Jr. Ramon G. et.al. 1992. Technology and Home
Economics 2: Agricultural Arts: First Edition: Abiva
Publishing House, Inc. Quezon City.
Biggs, Tony. Growing Vegetables. p.6 – 7.
CBLM Horticulture. 2009.
Ferrer, Ederlinda V. 2012. TESDA CBLM in Agri - Crops
Instructions:

Choose your leader from each group.

The leader will be responsible for the output of the group.

Distribute competency / learning outcome to each member of the group.

Each member including the leader must create content (original).

Leader to monitor the phasing / output of each member

You might also like