You are on page 1of 43

10

Technology and Livelihood


Education
Information and Communications Technology
(Computer System Servicing)
Quarter 2 - Module 1
Configuring Computer System and Network

Department of Education ● Republic of the Philippines


Technology and Livelihood Education – Information and Communications Technology
(Computer System Servicing) – Grade 10
Alternative Delivery Mode
Quarter 2 – Module 1: Configuring Computer System and Network
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Published by the Department of Education
Development Team of the Module
Author: Giovanni Ryan A. Derequito
Editors: Emmanuel Yap
Grace T. Palahang
Reviewers: Mary Jane R. Cardente, PhD
Illustrator/Lay-out Artist: Giovanni Ryan A. Derequito
Management Team:
Chairperson:
Arturo B. Bayocot, PhD, CESO III
Regional Director
Co-Chairpersons:
Victor G. De Gracia Jr., PhD, CESO V
Assistant Regional Director

Randolph B. Tortola, PhD, CESO IV


Schools Division Superintendent

Shambaeh A. Usman, PhD


Assistant Schools Division Superintendent

Mala Epra B. Magnaong, Chief ES, CLMD


Neil A. Improgo, PhD, EPS-LRMS
Bienvenido U. Tagolimot, Jr., EPS-ADM

Members: Elbert R. Francisco, PhD, Chief ES, CID


Mary Jane R.Cardente, PhD, EPS in Tech. and Livelihood Educ.
Rejynne Mary L. Ruiz, PhD, LRMDS Manager
Jeny B. Timbal, PDO II
Shella O. Bolasco, Division Librarian II
Printed in the Philippines by
Department of Education – Division of Bukidnon
Office Address: Fortich Street, Sumpong, Malaybalay City
Telefax: (088)813-3634
E-mail Address: bukidnon@deped.gov.ph
Website: depedbukidnon.net.ph
10
Technology and Livelihood
Education
Information and Communications Technology
(Computer System Servicing)
Quarter 2 - Module 1
Configuring Computer System and Network

This instructional material was collaboratively developed and reviewed


by educators from public schools. We encourage teachers and other education
stakeholders to email their feedback, comments, and recommendations to the
Department of Education at action@ deped.gov.ph.

We value your feedback and recommendations.

Department of Education ● Republic of the Philippines


TABLE OF CONTENTS

COVER PAGE Page


COPYRIGHT PAGE
TITLE PAGE
INTRODUCTORY MESSAGE
TABLE OF CONTENTS
Lesson 1. Safety Precautions Related to Networks 1
What I Need to Know 1
What I Know 2
What’s In 2
What’s New 3
What Is It 3
What’s More 5
What I have Learned 6
What I Can Do 6
Assessment 6
Additional Activities 7
Lesson 2. Networking Devices, Media and Connector 8
What I Need to Know 8
What I Know 8
What’s In 10
What’s New 10
What Is It 10
What’s More 12
What I have Learned 13
What I Can Do 14
Assessment 15
Additional Activities 16
Lesson 3. Internet Protocols 17
What I Need to Know 17
What I Know 17
What’s In 18
What’s New 18
What Is It 19
What’s More 20
What I have Learned 20
What I Can Do 21
Assessment 21
Additional Activities 22
Lesson 4. Peer-to-Peer Network 23
What I Need to Know 23
What I Know 23
What’s In 24
What’s New 24
What Is It 24
What’s More 28
What I have Learned 28
What I Can Do 29
Assessment 30
Additional Activities 31
Answer Key 32
References 34
Introductory Message
For the Facilitator:
Welcome to the Technology and Livelihood Education-Information and
Communications Technology – (Computer System Servicing) Grade 10 Alternative
Delivery Mode (ADM) Module on Configuring Computer Systems and Networks!
This module was collaboratively designed, developed and reviewed by
educators both from public and private institutions to assist you, the teacher or
facilitator in helping the learners meet the standards set by the K to 12 Curriculum
while overcoming their personal, social, and economic constraints in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this also aims
to help learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body
of the module:

Notes to the Teacher


This contains helpful tips or
strategies that will help you in guiding the
learners.

As a facilitator you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.

For the Learner:


Welcome to the Technology and Livelihood Education- Information and
Communications Technology – (Computer Systems Servicing) Grade 10 Alternative
Delivery Mode (ADM) Module on Configuring Computer Systems and Networks!
The hand is one of the most symbolized part of the human body. It is often used
to depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a learner
is capable and empowered to successfully achieve the relevant competencies and
skills at your own pace and time. Your academic success lies in your own hands!
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be enabled
to process the contents of the learning resource while being an active learner.
This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in the
module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This is a brief drill or review to help you link


the current lesson with the previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such as
story, song, poem, problem opener, activity or
situation.

What Is It This section provides a brief discussion of the


lesson. This aims to help you discover and
understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the answers
to the exercises using the Answer Key at the
end of the module.

What I Have Learned This includes questions or blank


sentence/paragraph to be filled in to process
what you learned from the lesson.

What I Can Do This section provides an activity which will


help you transfer your new knowledge or skill
into real life situations or concerns.

Assessment This is a task which aims to evaluate your


level of mastery in achieving the learning
competency.

Additional Activities In this portion, another activity will be given to


you to enrich your knowledge or skill of the
lesson learned. This also tends retention of
learned concepts.
Answer Key This contains answers to all activities in the
module.

At the end of this module you will also find:

References This is a list of all sources used in developing


this module.

The following are some reminders in using this module:


1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate
to consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!
Lesson
Safety Precautions Related
1 to Networks

This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.

What I Need to Know

This module was designed and written with you in mind. It is here to help you
master configuring computer systems and networks. The scope of this module permits
it to be used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

The module is designed to give you the proper procedures used in configuring
computer systems and networks.

After going through this module, you are expected to:


1. Inspect networking device and connectors;
2. create cross-over and straight-through cables;
3. assign IP address to clients and servers;
4. configure the assigned IP address to clients and servers;
5. create a peer-to-peer network

1
What I Know
Pre-Test
True or False
Directions: Write TRUE if the statement is correct and FALSE otherwise.

_____1. Installing network cables, whether copper or fiber optic, can be


dangerous.
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass that can penetrate your eyes.
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14.Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.

What’s In
When you install a new device or program, you sometimes need to configure,
which means that you need to set various switches and jumpers (for hardware) and to
define values of parameters (for software). Thanks to technological advancements,
such as plug-and-play, much of this configuration is now performed automatically.

2
What’s New
You are now ready to explore configuring computer system and networks but
first you need to bear in mind the safety procedures related to networks. Your
understanding on the basic safety procedures below will help you better understand
the safety precautions in configuring computer system and network.
Mark asterisk * is the statement suggest a safety measures and if does not.
___1. Wear safety googles while working on computer cables and wire.
___2. Do not bring any food inside the workplace.
___3. Do not follow safety guidelines inside the working area.

What is It
Safety Precautions Related to Networks
Installation of network cables, whether copper or fiber-optic, can be dangerous.
You should wear clothing such as long pants, a long-sleeved shirt, sturdy shoes that
cover your feet, and gloves to protect you from those toxic materials. Most importantly,
wear safety glasses. If possible, ask building management, or someone responsible
for the building, if there are any dangerous materials or obstacles that you need to be
aware of before entering the ceiling area.

Safety precautions when using a ladder:

• Read the labels on the ladder, and follow any safety instructions written on it.
• Never stand on the top rung of the ladder. You could easily lose your balance
and fall.
• Make sure that people in the area know you will be working there. Cordon off
the area with caution tape or safety cones.
• When you are using a ladder that leans up against a wall, follow the instructions
written on the ladder, and have someone hold the ladder to help keep it steady.
The tools required to install copper and fiber-optic cable may cause danger
through improper use. When working with cables, strictly follow these safety rules:

✓ Make sure that the tools you are using are in good working condition.
✓ Watch what you are doing, and take your time.
✓ Make sure that you do not cut yourself or place anyone in danger.
✓ Always wear safety glasses when cutting, stripping, or splicing cables of any
kind. Tiny fragments can injure your eyes.
✓ Wear gloves whenever possible, and dispose any waste properly.
✓ Use common sense when installing cables and fixing network problems. Call
for assistance for tasks that you cannot do on your own.

3
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain
hazards:

• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm

Chemicals
The solvents and glues used with fiber optics are dangerous. You should
handle them with extreme care. Read the instructions on the label, and follow them
carefully. Also, read the material safety data sheet (MSDS) that accompanies the
chemicals to know how to treat someone in case of emergency.

Tools
When working with any tool, safety should always be your first priority. Any
compromise in safety could result in serious injury or even death. The tools used for
working with fiber optics have sharp cutting surfaces that are used to scribe glass.

Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can
produce tiny fragments of glass or plastic that can penetrate your eyes or skin and
cause severe irritation. The fibers can be extremely difficult to see on your skin
because they are clear and small.

Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands.
The light is a color that humans cannot see. It can damage your eyes before you can
feel it.

4
What’s More

Activity 1. True or False


Directions: Identify whether each statement is True or False. If False, write its effects.
True or False Effects
1. A safe workplace is clean,
organized and well-lit.
2. Watch what you are doing, and
take your time.
3. Wear your safety glasses
sometimes when cutting,
stripping or splicing cables.
4. It is best practice that a fire
extinguisher and first aid kit be
available.
5. Wear gloves whenever possible
and dispose any waste properly.
6.Do not read on labels on the
ladder, and follow any safety
instructions written on it.
7.Never stand on the top rung of the
ladder, and follow any safety
instructions on it.
8.Make sure that people in the area
don’t have the idea that you will be
working there.
9.Cordon off the area with caution
tape or safety cones.
10.Make sure that the tools you are
using are in good condition.

5
What I Have Learned
1. Installing network cables, whether copper or fiber optic, can be dangerous.
2. A safe work space is clean, organized and well-lit.
3. Follow basic safety guidelines to prevent cuts, burns, electrical shock and
damage to eyesight.
4. Follow safety guidelines to protect equipment and lives.

What I Can Do
Directions: Cite of a scenario that an accident will likely to happened in a workplace.
Prepare action plan on how to prevent the occurrence of such accident .

1. ______________________________________
2. ______________________________________
3. ______________________________________
4. ______________________________________
5. ______________________________________

Assessment
Post Test
True or False
Direction: Write T if the statement is correct and F if otherwise.

_____1. Installing network cables, whether copper or fiber optic, can be


dangerous.
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass that can penetrate your eyes.
_____12. You should keep the work area full of clutter.

6
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14.Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.

Additional Activities.
Directions: List down activities at home that needs safety precautions.
1. ______________________________________
2. ______________________________________
3. ______________________________________
4. ______________________________________
5. ______________________________________

7
Lesson
Networking Devices, Media
2 and Connector

What I Need to Know


After dealing with the safety precautions related to networks, you can now
proceed with the next session of this module which is networking devices, media and
connector.

What I Know
Pre Test
Multiple Choice
Directions. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. Which of the following type of cable that is used for telephone communications
and Ethernet networks
a. coaxial cable
b. twisted pair
c. fiber optic cable
d. multimode cable
2. What type of cable that has a thicker core than single-mode cable.
a. multimode
b. single-mode
c. twisted pair
d. untwisted pair
3. Which of the following is not a coaxial cable type?
a. thicknet (10Base5)
b. RG-59
c. RG-6
d. Cat3
4. What type of cable that has two or four pairs of wires?
a. coaxial
b. unshielded twisted pair/UTP
c. shielded twisted pair/STP
d. fiber optic
5. What type of UTP cable in which wiring is used for telephone systems and
Ethernet LAN?
a. Cat5
b. Cat5e
c. Cat3

8
d. Cat6
6. Which of the following where each of wire is wrapped in metallic foil to better
shield the wires from noise.
a. coaxial
b. fiber optic
c. UTP
d. STP
7. It is a coaxial cable used in networks operating at 10Mbps, with a maximum
length of 185 meters.
a. RG-59
b. RG-6
c. thinnet
d. thicknet
8. What type of cable which is made of glass or plastic conductor that transmit
information using light?
a. fiber optic
b. coaxial
c. twisted pair
d. shielded twisted pair
9. It is mostly used for cable television in U.S.?
a. RG-59
b. RG-6
c. thinnet(10BASE2)
d. thicknet(10BASE5)

10. What type of coaxial cable with more than bandwidth and less susceptibility to
interference?
a. thicknet
b. thinnet
c. RG-6
d. RG-59
11. Which type of cable that has a very thin core?
a. multimode
b. single-mode
c. RG-59
d. RG-6
12. Which of the following are examples of twisted pair cable?
a. RG-59 and RG-6
b. Cat5e and Cat3
c. UTP and STP
d. multimode and single mode

9
What’s In
You have already discussed in your Grade 9 CHS class the different devices
used in networking and which provides you the knowledge on the common networking
cables that are essential in putting up a network. You are now ready to proceed. Good
luck and enjoy!

What’s New
To make data transmission more extensible and efficient than a simple peer-
to-peer network, network designers use specialized network devices such as hubs,
switches, routers, and wireless access points to send data between devices.

What is It
Common Network Cables

A wide variety of networking cables are available. Coaxial and twisted-pair


cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit
data.
Twisted pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a circuit that
transmit data.

Source: https://medium.com/@bilby_yang/compasion-between-utp-and-stp-27f7ac1d61aa
Figure 1. UTP and STP cable
Two basic types of twisted pair cables:
• Unshielded twisted pair (UTP) is the cable that has two or four pairs of
wires. This type of cable relies solely on the cancellation effect produced
by the twisted-wire pairs that limits signal degradation caused by
electromagnetic interface (EMI) and radio frequency interference (RFI).
• Shielded twisted pair (STP), each pair of wire is wrapped in metallic
foil to better shield the wires from noise. Four pairs of wires are then

10
wrapped in an overall metallic braid or foil. STP reduces electrical noise
from within the cable
Category Rating
UTP comes in several categories that are based on two factors:
▪ The number of wires in the cable
▪ The number of twists in those wires
• Category 3 is the wiring used for telephone systems and Ethernet LAN
at 10 Mega byte per second (Mbps).
• Category 3 has four pairs of wires.
• Category 5 and Category 5e have four pairs of wires with a transmission
rate of 100 Mbps.
• Category 5 and Category 5e is the most common network cables used.
• Category 5e has more twists per foot than Category 5 wiring.

Coaxial cable is a copper-cored cable surrounded by a heavy shielding.


Coaxial cable is used to connect the computers to the rest of the network.
Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet

Source: https://ph.rs-online.com/mobile/p/coaxial-cable/0822901/
Figure 2. Coaxial Cable
NeillConcelman” connectors, at the ends of the cables to make the connection.
Several types of coaxial cable exist:

• Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps,


with a maximum length of 500 meters.
• Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps,
with a maximum length of 185 meters.
• RG-59 is most commonly used for cable television in the U.S.
• RG-6 is higher-quality cable than RG-59, with more bandwidth and less
susceptibility to interference.

11
Fiber optic cable has one or more optical fibers enclosed in a sheath or jacket.
Because it is made of glass, fiber-optic cable is not affected by EMI or RFI.

Source: www.indiamart.com
Figure 3. Fiber Optic cable
These are the two types of glass fiber-optic cable:
1. Multimode is the cable that has a thicker core than single-mode
cable. It is easier to make, can use simpler light sources such as Light
Emitting Diodes (LEDs), and works well over distances of a few
kilometers or less.
2. Single-mode is the cable that has a very thin core. It is harder to
make, uses lasers as a light source, and can transmit signals dozens
of kilometers with ease.

What’s More

Activity 1.1 Cable Wire Grouping


Direction: Complete the diagram of various type of cable wire
Twisted Pair Coaxial Cable Fiber Optic Cable

1. ____________ 1._______________
1. ____________
2. ____________ 2. ____________ 2._______________
3. ____________
4. ____________

Category of UTP cable

1. ____________
2. ____________
3. ____________
4. ____________

12
What I Have Learned
Matching Type.
Direction: Match the cable type in column A with their meaning in column B.
Write the letter of the correct answer on separate sheet of paper.

A B

___1. Twisted pair a. A cable that has two or four pairs


of wire.
___2. Coaxial cable b. Each pair of wire is wrapped in

metallic foil.
___3. Fiber optic cable c. A copper-cored cable surrounded
by a heavy shielding.

___4. UTP cable d. Is a type of copper cabling that is


used for telephone communications.
___5. STP cable e. A glass or plastic conductor that

transmits information using light.

13
What I Can Do
Direction: List down equipment’s/materials made of cable in your house and identify
its type.

Materials/Equipment Type of Cable

1.

2.

3.

4.

5.

14
Assessment
Post Test
Multiple Choice
Direction: Choose the letter of the correct answer. Write the chosen letter on a
separate sheet of paper.

1. Which of the following type of cable that is used for telephone communications
and Ethernet networks
a. coaxial cable
b. twisted pair
c. fiber optic cable
d. multimode cable

2. What type of cable that has a thicker core than single-mode cable.
a. multimode
b. single-mode
c. twisted pair
d. untwisted pair
3. Which of the following is not a coaxial cable type?
a. thicknet (10Base5)
b. RG-59
c. RG-6
d. Cat3
4. What type of cable that has two or four pairs of wires?
a. coaxial
b. unshielded twisted pair/UTP
c. shielded twisted pair/STP
d. fiber optic
5. What type of UTP cable in which wiring is used for telephone systems and
Ethernet LAN?
a. Cat5
b. Cat5e
c. Cat3
d. Cat6
6. Which of the following where each of wire is wrapped in metallic foil to better
shield the wires from noise.
a. coaxial
b. fiber optic
c. UTP
d. STP
7. It is a coaxial cable used in networks operating at 10Mbps, with a maximum
length of 185 meters.
a. RG-59
b. RG-6
c. thinnet
d. thicknet

15
8. What type of cable which is made of glass or plastic conductor that transmit
information using light?
a. fiber optic
b. coaxial
c. twisted pair
d. shielded twisted pair
9. It is mostly used for cable television in U.S.?
a. RG-59
b. RG-6
c. thinnet(10BASE2)
d. thicknet(10BASE5)

10. What type of coaxial cable with more than bandwidth and less susceptibility to
interference?
a. thicknet
b. thinnet
c. RG-6
d. RG-59
11. Which type of cable that has a very thin core?
a. multimode
b. single-mode
c. RG-59
d. RG-6
12. Which of the following are examples of twisted pair cable?
a. RG-59 and RG-6
b. Cat5e and Cat3
c. UTP and STP
d. multimode and single mode

Additional Activities
1. What are the different types of fiber connectors? Cite their advantages and
disadvantages.
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________.

2. List down the different types of connectors.


_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________.

3. What are the characteristics of UTP, STP and coaxial cable?


___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________.

16
Lesson

3 Internet Protocols

Protocols require messages to arrive within a certain amount of time so that


computers do not wait indefinitely for messages that they may have been lost.
Protocols also initiate alternative actions if the network does not meet the timing rules.

What I Need to Know


How was your experience in discovering network devices, media and
connector? I hope you gain valuable learnings. To learn more and deepen your
understanding on networking, we will discover internet protocols in this module.

What I Know
Direction: Determine the type of internet protocol is being described below. Write
your answer in a separate sheet of paper

1
10 2

9 3

Internet
Protocol

8 4

7 5
6

17
1. It is a protocol used primarily on small windows NT networks.
2. The protocol used suit originally developed by Novell Corporations network
operating system.
3. Governs how files such as text, graphics, sound and video are echanged on
the World Wide Web.
4. Used securely connect to a remote computer
5. Suite of protocols has become the dominant standard for internetworking.
6. Is used to send email to a remote e-mail-server
7. It is an application used to connect to a remote computer that lacks security
features.
8. Is used to download e-mail from a remote mail server.
9. Is also used to download email from a mail server.
10.Provides services for file transfer and manipulation.

What’s In
To understand how networks and the Internet work, you must be familiar with
the commonly used protocols. These protocols are used to browse the web, send and
receive e-mails, and transfer data files.

What’s New

A protocol is a set of rules. A letter sent through the postal system also uses
protocols. Part of the protocol specifies where on the envelope the deliver address
needs to be written. If the delivery address is written in the wrong place, the letter
cannot be delivered. Internet protocol works in the similar way.

The main functions of protocols are:


• Identifying errors
• Compressing the data
• Deciding how the data should be sent
• Addressing the data
• Deciding how to announce sent and received data

18
What is It
You will encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described below:

• TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP)


suite of protocols has become the dominant standard for internetworking.
TCP/IP represents a set of public standards that specify how packets of
information are exchanged between computers over one or more networks
Keep your workspace clean and free of clutter.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is
the protocol suite originally employed by Novell Corporation’s network
operating system, NetWare.
• NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on
small Windows NT networks. NetBEUI cannot be routed or used by routers
to talk to each other on a large network.

TCP/IP

HTTP IPX/SPX

Apple
NetBEUI
Talk

Internet
Protocol

IMAP FTP

SSH TelNet

SMTP

Figure 1. Commonly Used Internet Protocol

• AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers.


It is composed of a comprehensive set of protocols that span the seven layers
of the Open Systems Interconnection (OSI) reference model.
• HTTP: Hypertext Transfer Protocol governs how files such as text, graphics,
sound, and video are exchanged on the World Wide Web (WWW).
• FTP: File Transfer Protocol provides services for file transfer and manipulation.
FTP allows multiple simultaneous connections to remote file systems.

19
• SSH: Secure Shell is used to securely connect to a remote computer. Telnet:
It is an application used to connect to a remote computer that lacks security
features.
• POP3: Post Office Protocol is used to download e-mail from a remote mail
server.
• IMAP: Internet Message Access Protocol is also used to download e-mail from
a remote mail server.
• SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail
server.

What’s More

Direction: Write the name of the protocol for each protocol define on the table below.
Protocol Definition Protocol
1 Provides connections to computers over a
TCP/IP network
2.Sends e-mail over a TCP/IP network
3.Translates URLs to IP address
4. Automates assignment of IP address on a
network
5.Securely transports Web pages over a
TCP/IP network
6.Transport files over a TCP/IP network

What I Have Learned


1. A protocol is a set of rules that requires messages to arrive within a certain
amount of time so that computers do not wait independently.
2. These are common protocols:
- TCP/IP -Telnet
- IPX/SPX -POP3
- NetBEUI -IMAP
- Apple Talk -SMTP
- HTTP -HTTP
- FTP -SSH

20
What I Can Do
ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. HTTP 6.POP
2. TCP/IP 7.WWW
3. FTP 8.IPX/SPX
4. IMAP 9. NetBEUI
5. SSH 10.LAN

Assessment
Direction: Determine the type of internet protocol is being described below.

1
10 2

9 3

Internet
Protocol

8 4

7 5
6

1. It is a protocol used primarily on small windows NT networks.


2. The protocol used suit originally developed by Novell Corporations network
operating system.
3. Governs how files such as text, graphics, sound and video are exchanged on
the World Wide Web.
4. Used securely connect to a remote computer
5. Suite of protocols has become the dominant standard for internetworking.
6. Is used to send email to a remote e-mail-server

21
7. It is an application used to connect to a remote computer that lacks security
features.
8. Is used to download e-mail from a remote mail server.
9. Is also used to download email from a mail server.
10.Provides services for file transfer and manipulation.

Additional Activities
To deepen your understanding with regard to the Internet Protocols, IP Address
and subnetting, utilize the Internet and the website www.professormesser.com,
watch and learn from the video presentations. Use the URLs below:

1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
Reflection on the video presentations
Direction: Answer the essential questions below based on the video presentations
you watched. Write your answer on a clean sheet of paper.
1. What are the procedures involved in calculating IP address and the procedures
in converting IP address to binary and vice versa?
________________________________________________________
________________________________________________________
________________________________________________________

2. What are the different IP Classes? Discuss each briefly and give examples.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________

22
Lesson

4 PEER-TO-PEER NETWORK

What I Need to Know


The following topic will help you familiarize with the tasks involved in
networking. All you need to do is to carefully read the topic and apply the skills you
have gained through the distinct activities. Good luck and have fun while learning.

What I Know

Pre Test
Filling the Blanks
Directions: Identify whether each statement describes a Peer-to-peer network or
Client/Server network. If the statement describes a peer-to-peer, write
PP and if the statement describes client/server, write CS. Write your
answer on the space provided each number.

_______1. Each device has equivalent capabilities and responsibilities.


______ 2. Server provides the requested information or service to the client.
______ 3. Perform some of the processing work for client machines such as
sorting though a database before delivering only the records
requested by the client.
______ 4. It allows certain files and folders to be shared with everyone or with
selected users.
______ 5. The servers are maintained by network administrator.
______ 6. Files and folders can be configured to allow network users to copy
them but not alter them in their original location.
______ 7. Data backups and security measures are implemented by the
administrators.
______ 8. All the data on the network is stored on a centralized file server.
______ 9. Common in small offices that do not use a dedicated file server.
______10. Shared printers on the network are managed by a centralized file
server.
______11. Network users with the proper permissions can access both the data
and shared printers.
______12. Devices are connected directly to each other without any additional
networking devices between them.
______13. Each user must provide an authorized username and password to
access to network resources.
______14. Administrator performs a routine back up of all the files on the
servers.

23
______15. If computer crashes, or data is lost, the administrator can easily
recover the data from a recent back up.

What’s In
Now that you have completed your lesson in internet protocols, you are ready
to proceed on the next lesson on peer to peer network, This will help you understand
the types of network.

What’s New

Computer networks are the basis of communication in Information Technology.


They are used in a huge variety of ways and include many different types of network.

What is It
Peer-to-Peer-Network
In a peer-to-peer network, devices are connected directly to each other
without any additional networking devices between them. In this type of network, each
device has equivalent capabilities and responsibilities. Individual users are
responsible for their own resources and can decide which data and devices to share.
Because of that, the network has no central point of control or administration

Source: www.itrelease.com
Figure 4. Peer-to-Peer Network

24
Setting up a peer-to-peer network in Windows XP

The steps described below are provided as a general guide that will work
for most home networking situations. However, it may not work for all scenarios.
Do the following steps to set up your own inclusive home network:

1. Make sure both systems have Network Interface Cards (NICs) installed and
are using the proper cables.

NOTE: For a direct network cable connection between two PCs (not with a
hub, switch or router), you need to have a cross-over cable.

2. For PCs with Windows XP, the home networking wizard can be used to set
up Windows for your network.
a. Click Start, and then Control Panel.
b. Select Network and internet connections.
c. Double-click Network setup wizard and follow the on-screen
instructions.

NOTE: If the Network setup wizard is unsuccessful, continue with the steps
below.

3.Click Start, Control Panel, Network and Internet Connections, and then
Network Connections. At Network Connection Windows, you will see the Local Area
Connection Icon, Right click it and select Properties. Local Area Connection window
appears.

4.Click on the General tab.


5.A device name should appear under "connect using." If not, there is a
hardware issue and Windows is not recognizing the network hardware. This
issue must be fixed before continuing.
a) At the General Tab, Put a check mark at the following:
- Client for Microsoft Network
-File and Printer Sharing for Microsoft Network
- Internet Protocol (TCP/IP)
b. Put a check mark saying Show icon in notification area when
connected.
c. Select the Internet Protocol (TCP/IP) and click the Properties button

25
NOTE: If any of the above component is not installed, install them by selecting
Add or Install, and then selecting the missing component, and clicking Add.

d. At the IP Address tab, select Specify IP Address.


e. Enter 192.168.0.1 as the unique IP Address for the first machine.
For each other PC add one to the last number in the IP address. For
example,
o KIDSPC1 = 192.168.0.1 ,
o MOMSPC2 = 192.168.0.2 ,
o and WORKPC3 = 192.168.0.3

NOTE: 192.168.0.x is an IP Address reserved for private networks and is not


routable to the Internet.

6. In the Subnet mask field enter: 255.255.255.0 All PCs on the same
network use the same subnet mask. Click the Ok button to finish configuration
and to close the Local Area Connection Properties windows.

NOTE: The Domain Name System (DNS) is optional. If you have a DNS system
and your connected to ISP you can input an IP address which came from the
DNS server

7. Click the Computer Name tab and click the Change button.
8. Enter a name that describes the PC in the Computer Description field.
For example, KIDSPC1, MOMSPC2, or WORKPC3.
9. Enter the workgroup name for your network. Use the same workgroup
name for all PCs on the network. Spelling is important in this step.
10. Repeat these steps for each PC on the network.
11. Wait two minutes after Windows opens on all PCs, and then double-click
the Network Neighborhood icon on the desktop. If all went well, you
should see all the PC names on the network when files and folders are
being shared. If you do not see them, press F5 to refresh the screen.
12. If after refreshing the network window, the other PCs still do not appear,
check the firewall settings that may be interfering with the
communication.

Setting up a Peer-to-Peer network in Windows 7


If you are going to work with Windows 7 operating system, the following
procedures are used to set up a peer-to-peer network:
1. On Desktop ==> Select My Computer ==> Right Click ==> Select
properties.
2. Select Change Setting (administrative permission will be required in this
procedure).
3. Click or select Change
4. Change computer name and workgroup name. Then, click OK.
5. Save the change (A Reboot will be required)

26
6. After Reboot ==>Right Click on My Network Place ==> Properties
7. Turn on Network discovery, File sharing, Printer Sharing
8. Click on Mange network connections
9. Select Local Area Connection ==> Properties
10. Select Internet Protocol version 4 (TCP/IPv4) ==>properties
11. Now enter the assigned IP address and then click OK.
12. Now open My network place ==> Click to change then select Turn on
network discovery and file sharing.
13. If you could see all computers in My Network place, you have successfully
configured a workgroup.

Client-Server Network
In a client/server network, the server provides the requested information or
service to the client. Servers on a client/server network commonly perform some of
the processing work for client machines, such as sorting through a database before
delivering specific the records requested by the client

Figure 5. Client-Server Network


In a client/server model, the servers are maintained by network administrators.
Data backups and security measures are implemented by the network administrator.
The network administrator also controls user access to the network resources

27
What’s More

Direction: Using the table below, cite the features of peer-to-peer and client-server
network.
Peer-to-peer Network Client/Server Network
1.

2.

3.

4.

5.

6.

What I Have Learned


1. In a peer-to-peer network, devices are connected directly to each
other without any additional networking devices between them. It
allows certain files and folders to be shared with everyone or with
selected users. Peer-to-peer networks are quite common in small
offices that do not use a dedicated file server.
2. In a client/server network, the server provides the requested
information or service to the client. Servers on a client/server
network commonly perform some of the processing work for client
machines, such as sorting through a database before delivering only
the records requested by the client.

28
What I Can Do
Peer-to-Peer Study
Direction: Using different references available such as articles, books, internet and
publications, investigate and search for the advantages and
disadvantages of peer-to-peer network.

Advantages Disadvantages
1

5.

29
Assessment
Post Test
Filling in the Blanks
Direction: Identify whether each statement describes a Peer-to-peer network or
Client/Server network. If the statement describes a peer-to-peer, write
PP and if the statement describes client/server, write CS. Write your
answer on the space provided each number.

______1. Each device has equivalent capabilities and responsibilities.


______2. Server provides the requested information or service to the client.
______3. Perform some of the processing work for client machines such as
sorting though a database before delivering only the records
requested by the client.
______4. It allows certain files and folders to be shared with everyone or with
selected users.
______5. The servers are maintained by network administrator.
______6. Files and folders can be configured to allow network users to copy
them but not alter them in their original location.
______7. Data backups and security measures are implemented by the
administrators.
______8. All the data on the network is stored on a centralized file server.
______9. Common in small offices that do not use a dedicated file server.
______10. Shared printers on the network are managed by a centralized file
server.
______11. Network users with the proper permissions can access both the data
and shared printers.
______12. Devices are connected directly to each other without any additional
networking devices between them.
______13. Each user must provide an authorized username and password to
access to network resources.
______14. Administrator performs a routine back up of all the files on the
servers.
______15. If computer crashes, or data is lost, the administrator can easily
recover the data from a recent back up.

30
Additional Activities
Comparison
Direction: Using table below, cite the features of peer-to-peer and client/server
network in the table below.

Peer-to-peer Network Client/Server Network


1.

2.

3.

4.

5.

31
32
What I Know What's More Assessment
1. B 1. UTP 1. B
2. A 2. STP 2. A
3. D 3. Thicknet 3. D
4. B 4. Thinnet 4. B
5. C 5. RG-59 5. C
6. D 6. RG-6 6. D
7. C 7. Multimode 7. C
8. A 8. Single mode 8. A
9. B 9. Cat3 9. B
10. C 10.Cat5 10. C
11.B 11.Cat5e 11.B
12.C 12.Cat6 12.C
Lesson 2. Networking, Devices, Media and Connector
What I Know What's More Assessment
1. T 1. T 1. T
2. F 2. T 2. F
3. T 3. F 3. T
4. T 4. T 4. T
5. T 5. T 5. T
6. F 6. F 6. F
7. T 7. T 7. T
8. T 8. F 8. T
9. T 9. T 9. T
10.T 10.T 10.T
11.F 11.F
12.T 12.T
13.T 13.T
14.T 14.T
15.T 15.T
Lesson 1. Safety Precautions Related to Networks
Answer Key
33
What I Know What's More Assessment
1. PP 1. PP
2. CS 2. CS
3. CS 3. CS
4. PP 4. PP
5. CS 5. CS
6. PP 6. PP
7. CS 7. CS
8. CS 8. CS
9. PP 9. PP
10.CS 10.CS
11.CS 11.CS
12.PP 12.PP
13.CS 13.CS
14.CS 14.CS
15.CS 15.CS
15.CS
Lesson 4. Peer to Peer Network
What I Know What's More Assessment
1. NetBEUI 1. TCP/IP 1. NetBEUI
2. IPX/SPX 2. SMTP 2. IPX/SPX
3. HTTP 3. NetBEUI 3. HTTP
4. SSH 4. HTTP 4. SSH
5. TCP 5. IPX/SPX 5. TCP
6. SMTP 6. SSH 6. SMTP
7. Telnet 7. FTP 7. Telnet
8. POP3 8. POP3
9. IMAP 9. IMAP
10.FTP 10.FTP
Lesson 3. Internet Protocols
References

Books and Articles and Printed Materials:


Rosalie P. Lucero et al, Basic Education Curriculum, Technology and
Livelihood Education Grade 10 “Computer Hardware Servicing”
Learners Materials

Electronic Resources:
“Definition of Configuration” Retrieved from
http://www.webopedia.com/TERM/C/configuration.html

“File Sharing” Retrieved from


http://www.techopedia.com/definition/16256/file-sharing

“Fundamentals of PC repair” Retrieved from


http://www.ustudy.in/ce/hard/u1

“Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best


Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 | Networking
Tips | UNIX and LINUX Usability | Installation Procedure Of Various Operating
Systems | computer repair | computer problems” Retrieved from http://101-
computer- troubleshooting.blogspot.com/2009/09/directx-diagnostic-
tooldxdiag.html-
“Occupational Safety Precautions” Retrieved from

“peer to peer networking” Retrieved from


http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en
&docname=bph05694-
www.itrelease.com

“twisted pair cable” Retrieved from


https://medium.com/@bilby_yang/comparison-between-utp-and-stp-
27f7ac1d61aa

“coaxial cable” Retrieved from


https://ph.rs-online.com/mobile/p/coaxial-cable/0822901

“fiber optic cable” Retrieved from


www.indiamart.com

34
For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

DepEd Division Office


Fortich Street, Sumpong, Malaybalay City

Telefax: (088)813-3634

Email Address: bukidnon@deped.gov.ph


Website: depedbukidnon.net.ph

You might also like