You are on page 1of 51

Grade 12

Computer Systems
Servicing 6
Quarter 1
Set Up Computer Network (SUCN) Part 2

DO_Q1_CSS6_Lesson1-4
Personal Development
Alternative Delivery Mode
Quarter 1 –Set Up Computer Network (SUCN)
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writers: Jasper Allan P. Bok, Jose B. Pedreña Jr. (Valenzuela National
High School)
Maria Consuelo C. Sorra (Sitero Francisco Memorial National High
School)
Editors: Juliet V. Tadios (Language), Bignay National High School

Reviewers: Remedios Santos


Illustrator: Alexander A. Baria (Bignay National High School)
Layout Artist: Alexander A. Baria (Bignay National High School), Jerus I. De
Jesus
Management Team: Meliton P. Zurbano, SDS
Filmore R. Caballero, CID - Chief Education Supervisor
Remedios Santos, EPS- TLE/EPP, SHS TVL, Child Protection
Jean A. Tropel, EPS-LRMDS

Printed in the Philippines by: ________________________________________

Division of City School Valenzuela – Curriculum Implementation Division


Learning Resource Management Section (SDO Valenzuela – CID LRMS)

Office Address: Pio Valenzuela Street Marulas, Valenzuela City, Philippines 1440
Telefax: (02) 292 3247
E-mail Address: sdovalenzuela2015@gmail.com

ii
Grade 12

Computer Systems
Servicing
Quarter 1
Set Up Computer Network (SUCN) Part 2
Introductory Message

For the facilitator:

Welcome to the Computer Systems Servicing NCII – Grade 12 Alternative Delivery


Mode (ADM) Module on Set Up Computer Network.

The unit of competency Set Up Computer Network contains knowledge, skills and attitudes
required for Computer Systems Servicing course.

As a parent/guardian you are encouraged to guide the learners in using this module.
Please keep track of the learners' progress while allowing them to manage their own learning
and assist them as they do the tasks included in this module.

For the Learners


You are required to go through a series of learning activities in each learning
competency. Follow and perform the activities on your own. If you have questions, do not
hesitate to ask assistance from your teacher or guardian. Always bear in mind that you are not
alone.
The following are some reminders in using this module:
• Work through all the information and complete the activities in each section.
• Read all the information if necessary, memorize in acquisition of knowledge, practice
your new skills in a real-life situation, answer self-assessment and use self-checks at
the end of each section to test your own progress.
• You can also do the suggested activities such as video viewing for skills
demonstration through online or offline platforms if the materials and equipment are
available in your home.
• You will be given one week to complete this module.
• Finish the task before proceeding to the next.
We hope that through this material, you will experience meaningful learning and gain
deep understanding of the relevant competencies. You can

iii
Table of Contents

Lesson 1: Network Interface Card, Static


and Dynamic IP/APIPA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 - 10

Lesson 2: Router, Access Point and


Wi-Fi Configuration. . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . 11 - 22

Lesson 3: Network Switch, Firewall,


Cloud Computing and LAN Configuration. . . . . . . . .. . . . . . . 23 - 33

Lesson 4: Client Device Configuration/ Inspection


Checklist/ Designing Network Diagram. . . . . . . . . . . . . . . . . 34 - 45

References: ……………………………………………………………… 45

iv
Quarter 1 Network Interface Card,
Lesson 1
Static and Dynamic IP/APIPA

What I Need to Know

This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course
LO2: Set network configuration TLE_IACSS9- 12SUCN-Ia-e-34.

After going through this module, the learners shall be able to:
1. configure Network Interface Card (NIC) in accordance with the network
design;

2. carry out communication checks between terminals in accordance with


operating systems network configuration guides; and
3. respond to unplanned events or conditions in accordance with established
procedures.

What I Know

Directions: Select the letter of the correct answer. Write it on your notebook.

1. Which of the following devices is BEST to use when designing a SOHO network
to ensure the least amount of collisions?
A. Access Point C. Hub
B. Bridge D. Switch
2. A technician needs to know why he cannot connect through the internet. What
is the first thing he should do to determine its connectivity?
A. Check network cable C. Check router connectivity
B. Check network driver D. All of the above
3. Which of the following is a public IP address?
A. 10.45.xxx.xxx C. 169.254.xxx.xxx
B. 173.16.xxx.xxx D. 192.168.xxx.xxx

1
4. APIPA usually starts with an IP of
A. 169.254.xxx.xxx C. 192.168.xxx.xxx
B. 172.16.xxx.xxx D. 10.0.xxx.xxx
5. It makes the client’s computer or devices communicate in the other network
or web page.
A. Default Gateway C. Dynamic
B. Domain Name D. Static

What’s In

Directions: Complete the following statements based on your understanding of the


topic. Write your answer on a separate sheet of paper.

1. Based on topologies I have learned from the previous modules, NIC is


commonly used in these topologies because
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

2. Enabling DHCP on router makes my network configured because


__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

What’s New

Network Interface Card, short as NIC, is an important hardware component


used to provide network connections. With its wide applications, there are various
types of network interface cards emerging in the market like Peripheral Component
Interconnect Express Card (PCIe) and Server Network Card (SNC). In this lesson, we
will have a full exploration of this hardware component from what is a network
interface card to its function, components, and types.

2
What Is It

NETWORK INTERFACE CARD


NIC used to connect your computer on a local data network or the internet. It
converts digital into electrical signal that passes through communication cable, and
networking device and back to digital information to its end user so computer can
exchange information.

With its wide application, Network Interface Card (NIC) has various types
emerging in a market like PCI card, PCIe card and server network card, and with this
we can configure the hardware components from its meaning, function and types.

Network Interface Card (NIC) / Network Adapter / Local Area Network Card
(LAN Card)/ Ethernet card is a very important hardware component used to connect
a computer over a network through wireless and wired communication. This provides
a dedicated network connection through a network. This NIC configures depending
on a network design such as Static IP and Dynamic IP used in communication.
NIC functions as a middleman between computers on a computer network. In
TCP/IP layer working as an interface which transmits signal pass through coaxial
cable, fiber cable, UTP cable depending of what types of cable are used, and convert
it into data packets at a network layer which is your networking device and back
again to digital information so computers will have a reliable communication.

Network interface card can be classified into two types based on its
transmission speed and application fields. They are the Internal Network Card and
External Network Card.

Two Types of Network Interface Card

1. Internal Network Card – The Internal card has two types. First is the Industry
Standard Architecture (ISA) and the second one is the Peripheral Component
Interface Card. Computers nowadays include network capability (ISA type)
which is already built-in the mother board because of its nearly use of
universal internet. Ethernet is standard for a computer that describes
communication technology, a separate network card is not needed unless you
need to connect it into other type of network. The other type of internal card
is the PCI type inserted in your PCI slot in your mother board, also the PCIe
type needs a UTP cable to connect through a network.

2. External Network Card – Desktop and laptop that do not have internal NIC
use external card. Most of the laptops use wireless network or USB network
that is inserted in your motherboard and do not require a network cable to
connect to the internet. Advantages of this is you can carry your laptop
anywhere you go and you can easily connect through Wi-Fi connectivity.

3
NIC has a Bus Interfaces Based Classification (BIBC), it has the Industry
Standard Architecture (ISA); Peripheral Component Interconnect (PCI); Peripheral
Component Interconnect Extended (PCI-X); Peripheral Component Interconnect
Express (PCIe); and the Universal Serial Bus Network Interface Card (USB-NIC).
Some of these are no longer recognized nowadays and are hard to find in the market.
PCI is standard for a 32 bit-133 MB/s and a 64-bit 266 MB/s transmission of data.
PCI-X is a 64-bit MB/s that is capable of transmission of data up to 1064 MB/s.
PCIe is the latest release of NIC and it is widely used for computers and servers. USB-
NIC is an external bus standard designed for Wi-Fi connection.

NIC also has its transmission speed-based classification, the faster the speed the
more reliable the internet connection is. It ranges from 10/100 MB/s up to 1GB/s
speed to communicate with other computers on a network.

Configuring Network Interface Card affects data transmission whether you are
using static IP address and Dynamic IP address, cable used on a network, networking
device. We can see different types of IP address in configuring NIC depends on how
you configure it on a network or in a server network.

Static IP Address and Dynamic IP Address

Static IP address
It is an IP address that manually configures for a device instead of one that is
assigned by a DHCP server. It is called static because it does not change compared
to a Dynamic IP address.

Routers, phones, tablets, desktops, laptops, and other devices which use an IP
address can be configured to have a static IP address. This can be done through the
device giving out IP addresses (like the router) or by manually typing the IP address
into the device from the device itself.

Dynamic IP Address
A Dynamic Internet Protocol address (Dynamic IP address) is a temporary IP
address that is assigned to a computing device or node when it’s connected to a
network. A dynamic IP address is an automatically configured IP address assigned
by a DHCP server to every new network node.

Dynamic IP addresses are generally implemented by Internet Service Providers


(ISP) and networks that have a large number of connecting clients or end-nodes.
Unlike static IP addresses, dynamic IP addresses are not permanent. A dynamic IP
is assigned to a node until it is connected to the network; therefore, the same node
may have a different IP address every time it reconnects with the network.

Dynamic means "constantly changing". The prefix dyna means power; however,
dynamic IP addresses are not more powerful, but they can change (or be changed).

4
Pros and Cons between Static and Dynamic IP addresses:

Static IP Address:
Pros Cons
1. Running Server 1. Easier to track
2. Stability information 2. Require to disclose them
3. Simplicity 3. Limits the users
4. Better for a dedicated server

Dynamic IP Address:
Pros Cons
1. Security 1. Network traffic
2. Lower cost 2. Network Failure
3. Automatic Network Configuration 3. Less reliable

Automatic Private Internet Protocol Address (APIPA)

APIPA is short for Automatic Private IP Addressing, a feature of Windows


operating systems, meant for non-routed small business environments, usually less
than 25 clients.

With APIPA, DHCP clients can automatically self-configure an IP address and


subnet mask when a DHCP server is not available. When a DHCP client boots up, it
first looks for a DHCP server in order to obtain an IP address and subnet mask.

APIPA usually starts with an IP 169.254.0.1 to 169.254.254.254, and the


subnet is 255.255.0.0. Client computers receive APIPA once a client does not receive
any information.

5
Network Connectivity Settings using Packet Internet Gopher (PING)

PING is a method or a computer network administrator software utility used to


determine the network connection or reachability of the host computer to an IP
network. Ping software sends a request to a website, and times the receipt of replay
(echo) called pong.

PING measures the roundtrip for messages sent from the originating host to a
destination computer that is echoed back to the source.

PING operates by sending Internet Control Message Protocol (ICMP) echo


request packets to the target host waiting for an ICMP echo reply. The program
reports errors, packet loss, and a statistical summary of the results, typically
including the minimum, the maximum, the mean round-trip times, and the standard
deviation of the mean.

The command-line options of the ping utility and its output vary between the
numerous implementations. Options may include the size of the payload, count of
tests, limits for the number of network hops Time To Leave(TTL) that probes traverse,
interval between the requests and time to wait for a response.

You can use ping to determine the connection between devices or on a web
site.

Example:
ping www.google.com or ping 192.168.1.10

6
Network Connectivity Settings using IP configuration (ipconfig)

It is a command line tool to determine the network connection. There are three
commands “all”, “release”, and “renew”. Ipconfig displays all current TCP/IP
network configuration values and refreshes Dynamic Host Configuration Protocol
(DHCP) and Domain Name System (DNS) settings. It is used without parameters,
Ipconfig displays the IP address, Subnet Mask, and Default Gateway for all adapters.

A windows command line utility that is used to manage the IP address assigned
to the machine which is running in. It uses without any additional parameters and
displays the computer's currently assigned IP, Subnet Mask and Default Gateway
addresses.

Reporting Displays
no switch IP, subnet mask & default gateway addresses
/all the above + hostname, MAC address, DNS server addresses, etc
.
/displaydns contents of DNS cache
/showclassid all DHCP class IDs for adapter
Management Action
/release release IP address
/renew renew IP address
/flushdns purge DNS cache
/registerdns refresh leases & reregister DNS
/setclassid update DHCP class ID

What’s More
Directions: Define the following terms based on your understanding,
Write your answer on a separate sheet of paper.

1. APIPA
2. MAC ADDRESS
3. STATIC IP
4. DYNAMIC IP
.

7
What I Have Learned

Directions: Read the questions below and answer each on a separate sheet of paper.

1. What are the learnings that you have gained in this lesson?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

2. How important are the types of NIC and cable use in a network?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

What I Can Do

Directions: Read the statements below and answer each on a separate sheet of
paper.

1. Using your desktop computer and cellphone, determine the speed of your
internet using speed test. Observe the differences between the two devices
and explain why.
Desktop: _________________ Cellphone: _______________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

2. Write the IP address of your device when the DHCP capability of your
router is turned off. Explain what will happen to your network connection
and what IP address will be shown on your computer.
IP Address
before turning off: ____________ after turning off: _______________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

Assessment

Directions: Choose the letter of the correct answer and it on your notebook.
1. Every network adapter has a Media Access Control Address (MAC address)
embedded to its firmware. What is the other term of MAC address?
A. APIPA C. Logical address
B. IP address D. Physical address

8
2. What network management protocol is used on IP networks when it is
automatically assigned to an IP address?
A. APIPA C. DNS
B. DHCP D. PING
3. Command line tool which determines the network connection.
A. Cls C. Pong
B. Ping D. release
4. Which of this device translates data into digital information and sends
them to a networking device through network cable and back to its original
information?
A. Coaxial cable C. Mother board
B. Ethernet card D. None of the above
5. I don’t have Wi-Fi on my laptop, what other remedy should I do to connect
to a network?
A. Buy new NIC C. Change IP address
B. Use USB-NIC D. Format my computer
6. I receive an IP address of 169.254.25.63 on my computer. It indicates that
I have __________?
A. APIPA C. Mac address
B. Dynamic IP D. Static IP
7. I want to determine the IP address of my computer, what command should
I use in the command line?
A. Ipconfig C. Ipconfig /renew
B. Show my IP D. Ipconfig /release
8. After the installation of my NIC in my computer, what other procedure
should I do?
A. Browse internet C. Ping other computers
B. install LAN driver D. Install motherboard driver
9. These are the factors that affect transmission speed of your computer
through internet or a network connectivity.
A. ISP C. Types of network cable used
B. Ethernet Card D. All of the above
10. In a PCI 32-bit ethernet card can transmit up to __________ of data speed.
A. 1064 MB/s c. 266 MB/s
B. 133 MB/s d. 512 MB/s

Additional Activities
Directions: Watch the following videos on YouTube and write you
reflections on a separate sheet of paper.

1. Static Vs. Dynamic


https://www.youtube.com/watch?v=WsZPwRkKiQ8

2. APIPA
https://www.youtube.com/watch?v=wShbO4MfmOs

9
Reflection:

1. I have learned that

2. I have realized that

3. I will apply

RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do and
Reflection)
This rubric will monitor, score and give suggestions to improve the performance of
the students.

PERFORMANCE INDICATORS 1 PT. 3 PTS. 5 PTS.


NOT YET APPROACHING COMPETENT
COMPETENT COMPETENT
Content: Substantial, specific,
and illustrative content which
demonstrated strong and
sophisticated ideas.

Focus: Apparent point to a


single topic with sufficient
awareness of task.

Conventions: Evident control of


grammar, mechanics, spelling,
usage and sentence formation.

Suggestions and Recommendations:

10
Quarter 1 Router, Access Point and
Lesson 2
Wi-Fi Configuration

What I Need to Know

This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and Respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.

LO 3: Set router/Wi-fi/wireless access point/repeater configuration


TLE_IACSS9- 12SUCN-If-j-IIae-35

After going through this module, the learners shall be able to:
1. configure client device systems settings in accordance with
manufacturer’s instructions and end user preference;
2. configure LAN in accordance with manufacturer’s instructions and
network design; and
3. configure wireless settings in accordance with manufacturer’s
instructions, network design, and end-user preferences.

What I Know

Directions: Choose the letter of the correct answer and write it in your
notebook.
1. A technician is noticing extremely slow performance on a computer and
would like to see what application is consuming resources. Which of the
following tools should the technician use to view the system performance?
A. Event Viewer C. Netmon
B. Msconfig D. Task Manager

2. Which of the following Internet connection types is known to have a


significantly higher latency than the others?
C. Cable C. Fiber
D. DSL D. Satellite

11
3. A user wants to implement a wireless router that will have the fastest data
speed and operate over the 5GHz frequency. Which of the following standards
should the user select?
C. 802.11a C. 802.11g
D. 802.11ac D. 802.11n

4. Which of the following network devices filters traffic of many different


protocols based on a predetermined set of rules established by a system
administrator?
C. Firewall C. Router
D. Proxy D. Switch

5. A client’s computer is not connecting to a website. Which of the following


commands will allow the technician to view the route/number of hops between
the host and remote systems?
C. Nbtstat C. Nslookup
D. Netstat D. Tracert

What’s In

Directions: Complete the following statements based on your understanding


of the topic. Write your answer on a sheet of paper.
3. The advantages in securing personal information during network installation
are
________________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

4. I received Automatic Private Protocol Address on my computer because


__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
________________________________________________________________________

12
What’s New

Importance of Configuring Networking Devices

In previous lessons, we have discussed different types of networking devices.


There are the advantages and disadvantages, and the functions and usages of these
devices. Configuring network devices is necessary in configuring network.

Generally speaking, network devices are the devices that are necessary to
build a network and to keep communication flowing. Network devices include hubs,
routers, switches, repeaters, and wireless access points. These devices must be
configured, and include firmware which must be updated.

In a broader sense, network devices are the end devices that are connected to
each other via the network, i.e. the devices for which the network is used: computers,
printers, media servers, VoIP phones, etc.

In this module we are going to configure some devices available in the


market today, such as router, repeater, wireless router and access point.
Remember that every manufacturer of these devices has different ways in
configuring it so it is important to read the manual carefully or look in the internet
on how these devices are configured.

What Is It

Router Configuration (Linksys router)


In this module, you will need a working ethernet port in your laptop or desktop
computer.

Step 1: Resetting
■ Connect the power cord.
■ Unplug ALL Ethernet connections.
■ Press the reset button for at least 15
seconds.

Step 2: Cable Setup


■ Connect your computer (PC or MAC) to the WAN
port, only.
WAN port is usually separated from LAN port.

13
Step 3: Accessing Router

■ Open your browser (Chrome, Firefox,


Safari) with the computer connected to
the Router.
■ Type the IP address found in your
wireless settings in your browser. The IP
address is embedded at the back of your
router device or read the manual to
determine IP address. Most IP addresses
start with 192.168.1.1.
■ Press Enter.
The username and password menu will
appear.
The username and password will depend
on the manufacturer of your networking
device.
Some networking devices use “Admin” as username. Password can be
"admin", or "password".
■ Click “OK”.

Default Screen Linksys Router

Step 4: Configure Wireless SSID


■ Click “Wireless”.
■ Click “Basic Wireless Settings”.
■ Enter a desired name into the
“Wireless Network Name (SSID)”
field.
■ Click “Save Settings”.

Step 5: Configure Wireless with WPA


Security Key
For WPA
■ Click “Wireless”.
■ Click “Wireless Security”.
■ Select “WPA Pre-Shared Key” in
the “Security Mode” field.
■ Set the “WPA algorithm” to “AES”.
■ Type in your personalized
password. It should be between 8

14
and 32 characters- the longer the better. Make sure it is something you
can remember but hard to guess.
■ Click “Save Settings”.

Step 6: Final Setup


■ Connect your laptop through wireless
connection using the username and
password you created.

Step 8: Verification
■ Click Windows + R --type “cmd”
under the Open field, and click “OK”.
■ Type ipconfig on command line interface.
Your IP Address should now begin with 192.168.1.x, same as your
router IP address but different on the fourth octet, if this is NOT the
case, go back to Step 1 and try again.

How do I configure the Linksys access point


The Linksys WAP54G is designed to be configured in different modes
depending on the model used.

Setting up the Access Point as an access point


Step 1:

Follow steps 1 – 4 in configuring router.


Step 2:

Click on “Wireless” on the


web-based setup page.
Step 3:

Enter the “Network Name


(SSID)”.

The “SSID Broadcast” should be set to “Enabled” so that the wireless devices
will be able to detect the wireless
network of your Linksys access point.

Step 4:

Click “Wireless Security” and select


your desired

Security Mode.

15
WPA2-Personal

Enter your desired password in the


“Passphrase” field.

Your Linksys access point is now


successfully configured.

Other things to remember


Linksys access point can also be set up
as a “Wireless Repeater”. This mode
will turn the access point into a wireless
repeater to extend the range of your
wireless signal.

● Linksys Wireless-G Access Point


(WAP54G)
● Linksys Wireless-G Router
(WRT54G)

Configuring the Wireless Repeater mode on most Linksys Smart


Wi-Fi Routers

Step 1:
Enter “http://192.168.1.1” in your web browser’s Address bar and log
in to your Linksys Smart Wi-Fi router.

QUICK TIP: The default IP


Address of the Linksys router is
192.168.1.1. If you have modified
it, use the new IP Address instead.

Step 2:
Click “Connectivity”.

Step 3:
Click “Internet Settings”.

Step 4:
Click “Edit”.

16
Step 5:
Select “Wireless Repeater”.

Step 6:
Enter the main router or access
point’s “Network name (SSID)”,
“Network band and Security
mode”.

Step 7:
Click “Ok” to save settings. Click “Yes” to continue.

Once your Linksys Smart Wi-Fi router is turned into a Wireless Repeater,
you will need to check on your main router or access point’s DHCP Table for the
new IP Address of your Linksys Smart Wi-Fi router.

If the Linksys Smart Wi-Fi router cannot find the main router or access
point, you will receive the following message. Clicking Ok will take you back to the
Internet Settings tab where you left off.

NOTE: You will not be able to save the settings if the Linksys Smart Wi-Fi
router cannot find the network.

When in Wireless Repeater mode, you will only have access to the
Connectivity, Troubleshooting and Wireless tools that are supported under
Repeater mode.

● Connectivity – This tool allows you to edit the Wireless Repeater


settings under the Internet Settings tab.
● Troubleshooting – This tool allows you to diagnose and troubleshoot
connectivity issues on your network.

17
● Wireless – This tool allows you to broadcast both frequency bands and
customize both wireless settings on the router setup as Wireless
Repeater mode.

NOTE: To edit or change the wireless settings of the radio being


repeated, go to Connectivity > Internet Settings tab.

Configuring WI-FI

Before configuring your wireless Wi-Fi connection make sure that your wireless
network has already been configured and the wireless connection in your computer
is working properly.

To determine if your Wi-Fi connection is working properly, go to your control


panel and check if it is installed already.

Look at your desktop screen at the lower right corner, check if your WI-FI
connection is working properly. If you do not see it there, go to your Device Manager
to check if it is installed properly.

1. Click “Windows Key + R” on your computer.


2. Type “Control Panel”.
3. Click “Hardware and Sound”.
4. Click “Device Manager”.

If your Wi-Fi is not there, call your system administrator manufacturer.

How to connect a Wi-Fi network on Windows 10

There are multiple ways to connect your Wi-Fi through the internet. In
Windows 10 you can use your Taskbar, Settings, Control Panel or in Command
Prompt.

Using the Taskbar:


1. Click the “wireless icon” at the bottom right corner of your taskbar.
(If you don’t see it click the arrow up on the left).
2. Select the “wireless router” you want to connect to.
3. Check the “Connect automatically” option.
4. Enter the “security key or password”.
5. Click the “next” button.

Use the connect Wi-Fi network manually to save battery, or prevent your
devices from connecting to a network in certain places for security
reasons. Connect it only if you know that the Wi-Fi is a trusted one. You
can choose also depending on your time, you can choose in one hour, in
four hours, or in one day.

18
Using Settings:

1. Click “Windows keys + R”.


2. Type “Settings” then enter.
3. Click “Network & Internet or Network & Security”.
4. Click “Wi-Fi”.
5. Turn on “Wi-Fi”.
6. Click “Manage known device or networks”.
7. Click “Add a network”.
8. Type the “Network name (SSID)”.
9. Select “Security” type (Usually the “WPA2-Personal AES” is
selected).
10. Enter the “Security key” (password).
11. Click “Connect Automatically”.
12. Check the box “Connect if this network is not broadcasting”.
13. Click the “Save” button. (It will connect automatically to the Wi-Fi).

Using Control Panel:

1. Click “Windows keys + R”.


2. Type “Control Panel” then “Enter”.
3. Click on “Network & Internet”.
4. Click on “Network and Sharing Center”.
5. Click on “Setup a new connection or network link”.
6. Select the “Manually” connects to a wireless network option.
7. Click the “Next” button.
8. Enter the “Network SSID” name.
9. Select “Security” type (Usually the WPA2-Personal AES is selected).
10. Enter the “Security key” (password).
11. Check the “Start this connection automatically” option.
12. Click “Next”.
13. Click “Close” button. (once completed, it will connect automatically to
the network).

Using the Command Prompt:

1. Click “Windows keys + R”.


2. Search “Command prompt” right click then select “Run as
administrator”.
3. Type “netsh wlan” to show profile then press “Enter”.
4. Make a note of the “Wireless network profile” with the settings you
want to use.
5. Type “Netsh wlan connect ssid=YOUR_WIFI_SSID
name=PROFILE_NAME” and press “Enter”.
Take note that the SSID is in your Router and its security password.
After running the command, your network will connect to the wireless
network.

19
What’s More

Directions: Define the following terms based on your understanding. Write


your answer on a separate sheet of paper.

1. SSID
2. WPA
3. AES
4. TKIP

What I Have Learned

Directions: Read the statements below and answer each on a separate piece of
paper.

1. Identify the learnings that you have gained from the lesson.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

2. Give the differences among Router, Access Point and Repeater in terms of
configuration.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

What I can Do

Directions: Accomplish the following tasks.

On a sheet of paper, select any router manufacturer. List down the


configuration procedure.

20
Assessment
Directions: Choose the letter of the correct answer. Write it in your
notebook.

1. In configuring the router, which port should the UTP cable be connected?
A. LAN port C. USB port
B. Switch port D. WAN port
2. In case you forgot the password of your router, what should you do?
A. Buy a new one C. Change Network cable
B. Press reset button D. none of the above
3. What type of security is usually selected on a router?
A. 802.11x WEP C. WPA2-Enterprise AES
B. WEP D. WPA2-PersonalAES
4. After configuration, you will see in your cmd that your IP address shows
169.254.xxx.xxx, what does it mean?
A. Configuration fail C. Configuration successful
B. Router is not working D. None of the above
5. In configuring a router, what is a network home address?
A. Password C. SSID
B. Security D. WPA
6. This tool allows you to broadcast both frequency bands and customize
both wireless settings on the router setup as Wireless Repeater mode.
A. IP Address C. Security
B. Passphrase D. Wireless
7. What are the ways in configuring network connectivity?
A. Use taskbar C. Use of Command line
B. Use settings D. All of the above
8. Which of the following programs will determine if all of your device
drivers are installed properly?
A. Device Manager C. Network Settings
B. Device Properties D. None of the above
9. If you don’t know the IP address of your router, what are you going to do?
A. Search on internet. C. Look at the back portion of your
router.
B. Look at the manual. D. All of the above
10. WPA stands for ___________.
A. Wired Personal Address C. Wi-Fi Protected Access
B. Wi-Fi Personal Address D. Wired Protected Access

Additional Activities

Directions: Watch the following videos and write you reflections on a separate
sheet of paper.

1. Router configuration https://www.youtube.com/watch?v=qfS8-Qvvmfk


2. Repeater https://www.youtube.com/watch?v=vrhb179CiiQ
3. How repeater works https://www.youtube.com/watch?v=b-
kR1MSgr9k

21
II. Reflection:
Directions: Based on the modules that you have read, answer the following
on a separate sheet of paper.

1. I have learned that

2. I have realized that

3. I will apply

RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do
and Reflection)
This rubric will monitor, score and give suggestions to improve the
performance of the students.

PERFORMANCE 1 PT. 3 PTS. 5 PTS.


INDICATORS NOTYET APPROACHING COMPETENT
COMPETENT COMPETENT

Content: Substantial,
specific, and illustrative
content which
demonstrated strong and
sophisticated ideas.

Focus: Apparent point to a


single topic with sufficient
awareness of task.

Conventions: Evident
control of grammar,
mechanics, spelling, usage
and sentence formation.

Suggestions and Recommendations:

22
Network Switch, Firewall,
Quarter 1
Lesson 3
Cloud Computing and LAN
Configuration

What I Need to Know

This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and Respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.

LO 3: Set router/Wi-fi/wireless access point/repeater configuration


LE_IACSS9- 12SUCN-If-j-IIae-35

After going through this module, the learners shall be able to:
1. configure wireless settings in accordance with manufacturer’s instructions,
network design, and end-user preferences;
2. configure security/firewall/advanced settings in accordance with
manufacturer’s instruction and end user preferences.

What I Know

Directions: Configure the following devices. Write your configuration on


separate sheet of paper.

1. Manageable Switch

2. Firewall

23
What’s In

Directions: Encircle the words listed below. They may be written


downward, upward, backward or diagonally

24
What’s New
Introduction:

When designing a network, a network switch is effectively its core, or


its “brain”. It is a networking hardware that connects all devices together on
a LAN (Local Area Network), redirecting and forwarding data to the correct
destination. When running a business, it is important to ensure that you have
a network switch that helps you effectively cover the needs of your entire
information technology scope.
Switches come in various sizes that allow them to have any number of
ports up to 48, but the differences go deeper than that when it comes to
managed and unmanaged switches. In this module, we are going to define the
two types. We shall look at the differences between them to help you decide
which is right for you.

What Is It

Network Switch: Managed and Unmanaged

Network switch is the most effective way of designing a network. It is the


networking hardware that connects all devices together on a Local Area Network. The
Network switch is the one which redirects and forwards data to its destination. It is
important to ensure that you have a network switch in designing a network.
The difference between managed and unmanned switches is that an
unmanaged switch allows you to immediately plug and play devices into your
network, while a managed switch allows a greater control over it.

Features
An unmanaged switch is simple, connecting ethernet devices with a fixed
configuration that you cannot make any changes to. It is often used for small
networks or to add temporary groups of systems to a larger network. A managed
switch, on the other hand, also allows you to manage, configure, and monitor the
settings of your LAN, including controls over LAN traffic, prioritizing certain
channels, and creating new virtual LANs to keep smaller groups of devices segregated
and to better manage their traffic. Managed switches also offer redundancy features
that duplicate and recover data in the event of a device or network failure.

Performance
The advantage of unmanaged switches when it comes to performance is that
you can plug and play immediately with your network. There is no need to set
anything up, and it has in-built QoS services to ensure it is working well. With a
managed switch, however, you can prioritize channels at will, ensuring that you get

25
the best performance where you need it. Furthermore, features like prioritized Simple
Network Management Protocol (SNMP), which allows for remote troubleshooting of
the network, also makes it even easier to check for any issues impacting that
performance, thus allowing you to implement fixes if necessary.

Security
An unmanaged switch has basic security features. They are secured by
ensuring you have no vulnerabilities from systems to systems which are accessible
to all devices. while the managed switch has one major security benefit, such as the
ability to monitor and control the network to shut down the entire thread.

Cost
Cost comparison between managed switch is cheaper than the unmanaged
network switch. But this device is also dependent on the number of ports in your
switches.

Some Capabilities of Managed Network Switch

▪ Manage communication on each port, they may prohibit communications


between a port group and another group. This allows a part of ethernet ports
to a specific port to prohibit internet access by prohibiting the communication
to the ADSL router.
▪ Prohibit Communications between certain IP addresses.
▪ Create a group of users via the Internet Group Management Protocol (IGMP).
▪ Manage the quality of network cabling by displaying the statistics of
collisions on each port.
▪ Hardware firewall and manageable switch layer block applications through
ports. If the program is trying to pass through a blocked port, there will be no
communications at all.
▪ Hardware firewalls detect frames modifications.
▪ Router transmits communications between networks of different addresses
classes using Network Address Translator (NAT) or Protocol Address
Translation (PAT), it is not manageable.

Firewall

A firewall is a network security device that monitors incoming and outgoing


network traffic and permits or blocks data packets based on a set of security rules.
Its purpose is to establish a barrier between your internal network and incoming
traffic from external sources such as an internet connection in order to block
malicious traffic like viruses and hackers.

Firewall works by analyzing carefully incoming traffic based on pre-


established rules and filter traffic coming from unsecured and suspicious sources to
prevent attacks. It guards your computer data or server entry point, called ports, in
which the internet is connected.

Types of Firewall
A firewall is either a software or hardware device but it is recommended to
protect both your computer and server from the unwanted hackers. A software
firewall is a program installed on a computer; most firewalls are included in the
operating systems installed in your computer. A physical firewall is an equipment
installed between computer and a router.

26
Packet Filtering
Firewalls can be effective; they provide basic protection. It can determine if the
contents of the request that is being sent will adversely affect the application. If a
malicious request is allowed from a trusted source, the result will be the deletion of
a database.

Packet filtering firewalls are divided into two:

• Stateless Firewall - It examines packets independently of one another


and lacks context, making them easy targets for hackers.

• Stateful Firewall – It remembers information about previously passed


packets and is considered more secured.

Next Generation Firewalls (NGFW) – It is a combination of traditional firewall


technology with additional functionality. It deeply examines the data within the
packet itself, enabling users to identify packets with malicious data.

Proxy Firewalls - It filters traffic within the application level. Request is


evaluated against a set of security rules and then permitted or blocked. It acts
as an intermediary between two end systems.

Network Address Translation (NAT) – It allows multiple devices with


independent network addresses to connect to the internet using a single IP
address, keeping individual IP addresses hidden. Provides greater security
against attack.

Stateful Multilayer Inspection (SMLI) Firewalls - It filters packets at the


network transport, and application layer, comparing them against known
trusted packets.

How to Turn on the Firewall on Windows 10?


1. Click “Windows Keys + R”.
2. Type “Settings” then “Enter”.
3. Click “Update and Security”.
4. Click “Windows Security”.
5. Click “Firewall and Network Protection”.
6. Open “Windows security settings”.
7. Click “Domain Network”.
8. Click “Turn on Windows Defender Firewall”.

Cloud Computing

Cloud computing is the delivery of computing services - including servers,


storage, databases, networking, software, analytics, and intelligence - over the
internet (“known as Cloud”) that offers faster innovation, flexible resources, and
economies of scale. Typically pays only for cloud services you use, helps lowering
your operating costs, runs your infrastructure more efficiently, and scales as your
business needs change.

27
Benefits of Cloud Computing

▪ Cost - It eliminates the capital expense of buying hardware and


software and setting up and running on-site datacenters - the racks of
servers, the round-the-clock electricity for power and cooling, and the
IT experts for managing the infrastructure.
▪ Global Scale - It includes the ability to scale elasticity. In cloud, speak
means delivering the right amount of IT resources-for example, more or
less computing power, storage, bandwidth-right when they are needed,
and from the right geographic location.
▪ Performance - It runs on a worldwide network of secure data centers,
which are regularly upgraded to the latest generation of fast and
efficient computing hardware. This offers several benefits over a single
corporate data centers, including reduced network latency for
applications and greater economies of scale.
▪ Security - Cloud providers offer a broad set of policies, technologies,
and controls that strengthen your security posture overall, helping
protect your data, apps, and infrastructure from potential threats.
▪ Speed - It provides self-service and on demand so even vast amounts
of computing resources can be provisioned in minutes, typically with
just a few mouse clicks, giving businesses a lot of flexibility and taking
the pressure off capacity planning.
▪ Productivity - On-site data centers typically require a lot of “racking
and stacking” - hardware setup, software patching, and other time-
consuming IT management chores. Cloud computing removes the need
for many of these tasks, so IT teams can spend time on achieving more
important business goals.
▪ Reliability - It makes data backup, disaster recovery, and business
continuity easier and less expensive because data can be mirrored at
multiple redundant sites on the cloud provider’s network.

Types of Cloud Computing

▪ Public cloud – It is owned and operated by a third-party cloud service


provider, which delivers the computing resources, like servers and
storage, over the internet, with a public cloud, all hardware, software,
and manage your account using a web browser. ex. Microsoft Azure,
Google Cloud, Oracle cloud, AWS direct connect.
▪ Private Cloud – It refers to cloud computing resources used exclusively
by a single business or organization. A private cloud can be physically
located in the company’s on-site data center. Some companies also pay
third-party service providers to host their private cloud. A private cloud
maintains its services and infrastructures in a private network.
▪ Hybrid Cloud – Combines public and private clouds, bound together
by technology that allows data and applications to be shared between
them. By allowing data and applications to move between private and
public clouds, a hybrid cloud gives your business greater flexibility,
more deployment options, and helps optimize your existing
infrastructure security, and compliance.

28
Infrastructure as a Service (IaaS)
provides renting for IT infrastructure - Server and Virtual Machines (VM’s),
storage, network, operating systems - cloud provider on a pay-as-you-go basis.

Platform as a Service (PaaS)


It refers to cloud computing services that supply an on-demand environment
for developing, testing, delivering, and managing software applications. PaaS is
designed to make it easier for developers to quickly create web or mobile applications,
without worrying about setting up or managing the underlying infrastructure of
servers, storage, network, and databases needed for development.

Serverless Computing
It focuses on building app functionality without spending time continually
managing the servers and infrastructure required to do so. The cloud provider
handles the setup, capacity planning and server management for you. Serverless
architectures are highly scalable and event-driven, only using resources when a
specific function or trigger occurs.

Software as a Service (SaaS)


It delivers software applications over the internet, on demand and typically on
a subscription basis. These service providers host and manage the software
applications and underlying infrastructure, and handle any maintenance, like
software upgrade and security patching. Users connect to the application over the
internet, usually with a web browser on their phone, tablet, or PC.

LAN Configuration using Windows 10

Windows 10 detects a network adapter once installed, and automatically


creates a network connection and configures to support basic networking protocols.
The following steps configure your network adapter on Windows 10.

1. Click “Windows Icon” on the lower left corner of your


screen or press Windows Keys on your keyboard.

2. Click “Settings Icon”.

3. Click “Network & Internet Icon”.

4. Click the “Ethernet Settings” page.

5. Click change “Adapter Option”.

29
6. Select the adapter and
double click.

7. Select the “Internet Protocol


version 4 (TCP/IPv4)”.

8. Click “Properties”.

9. Select “Obtain an IP address


automatically” to
automatically DHCP assign IP
address on your device.

or

■ Select “Use the following IP” to configure the IP address


manually.
■ Insert the IP address
depending on your
network design.
■ Insert Subnet Mask.
■ Insert Default Gateway
depending on the IP
address on your router
or server.

10. Click “Ok”.

30
What’s More

Directions: Define the following terms based on your understanding, Write


your answer on a separate sheet of paper.

1. Manageable Switch
2. Unmanage Switch
3. Firewall
4. IaaS

What I Have Learned

Directions: Read the statements below and answer each on a separate sheet
of paper.

1. Identify the learnings that you have gained from the lesson.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

2. Give the importance of Cloud computing nowadays.


__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

What I can Do
Directions: Accomplish the following tasks.

1. Step by Step Configuration on LAN configuration using Windows 8.

2. Step by step procedure on how to configure firewall on Windows 8.

31
Assessment

Directions: Choose the letter of the correct answer. Write it in your


notebook.

1. Cloud services that refer to the supply on-demand environment for


developing, testing, delivering applications.
A. IaaS C. SaaS
B. PaaS D. Serverless Computing
2. Cloud services that provide renting for IT infrastructure.
A. IaaS C. SaaS
B. PaaS D. Serverless Computing
3. It examines packets independently of one another and lacks context,
making them easy targets for hackers.
A. Next Generation firewall C. Stateful firewall
B. Proxy firewall D. Stateless firewall
4. It filters traffic within the application level. It acts as the intermediary
between two end systems.
A. Next Generation firewall C. Stateful firewall
B. Proxy firewall D. Stateless firewall
5. One of the benefits of cloud computing is to eliminate capital expenses of
buying hardware and software on-site datacenters.
A. Cost C. Performance
B. Global Scale D. Security
6. Cloud benefits that offer a broad set of policies, technologies and controls
that strengthen and protect your data and applications.
A. Cost C. Performance
B. Global Scale D. Security
7. A type of cloud computing owns and operates by a third-party cloud service
provider, which delivers computing services.
A. Hybrid cloud C. Public cloud
B. Private cloud D. none of the above
8. A cloud computing which is bound together by technology that allows data
and applications to share and to help optimize your existing infrastructure
security.
A. Hybrid cloud C. Public cloud
B. Private cloud D. none of the above
9. Type of firewall that allows multiple devices with independent network
addresses to connect to the internet using a single IP address.
A. NAT C. Proxy firewall
B. NGFW D. SMLI

10. It deals with benefits of cloud computing that provide self-service and on
demand so even in vast amounts of computing resources can be
provisioned in minute.
A. Performance C. Reliability
B. Productivity D. Speed

32
Additional Activities
Directions: Watch the following videos and write you reflections on a separate
sheet of paper.

1. Managed switch
https://www.youtube.com/watch?v=JHxU4DCjXV0
2. Firewall
https://www.youtube.com/watch?v=OQyXMYh6qLo
3. Cloud Computing
https://www.youtube.com/watch?v=dH0yz-Osy54
Reflection:

1. I have learned that

2. I have realized that

3. I will apply

RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do
and Reflection)
This rubric will monitor, score and give suggestions to improve the
performance of the students.
PERFORMANCE 1 PT. 3 PTS. 5 PTS.
INDICATORS NOT YET APPROACHING COMPETENT
COMPETENT COMPETENT
Content: Substantial,
specific, and illustrative
content which
demonstrated strong and
sophisticated ideas.
Focus: Apparent point to a
single topic with sufficient
awareness of task.
Conventions: Evident
control of grammar,
mechanics, spelling, usage
and sentence formation.
Suggestions and Recommendations:

33
Client Device Configuration/
Quarter 1
Lesson 4
Inspection Checklist/
Designing Network Diagram

What I Need to Know

This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and Respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.
LO 4: Inspect and test the configured computer networks TLE_IACSS9-
12SUCN-IIf-j-36

After going through this module, the learners shall be able to:
1. undertake final inspection of the configuration to conform to the
manufacturer’s instruction/manual;
2. ensure the configuration conforms to the manufacturer’s instruction/manual.

What I Know

Directions: Identify and label each equipment and cable used in this network
design. Write your answer on your notebook.

34
Directions: Encircle the words listed below. They may be written downward ,
upward, diagonally. or forward.

What’s New

A client/server network is a system where one or more computers called


“clients” that are connected to a central computer server to share or use
resources. Each client computer must use an operating system that allows it
to be identified to participate in the network.
In a client/server environment, each computer still holds (or can still
hold) its (or some) resources and files. Other computers can also access the
resources stored in a computer, as in a peer-to-peer scenario. One of the
particularities of a client/server network is that the files and resources are
centralized. This means that a computer, the server, can hold them and other
computers can access them. Since the server is always ON, the client
machines can access the files and resources without caring whether a certain
computer is ON.

35
What Is It

Client Device Configuration


Your wireless router has a variety
of useful options that you can configure.
These are practically hidden; you would
not know these features exist unless you
dig through your router’s configuration
pages.

Bear in mind that different routers


have different options. You may not have
all the options listed here on your own
router. The options will also be in
different places with different names.

Step 1

Click the detail button to view


more information about the
connection.

Step 2

Look for the IPv4 Default Gateway IP address in the details window. Plug this
IP address into your web browser’s
address bar. You will need to log in with
your username and password
combination. If you do not know these,
your router is probably using its default
combination — check your router’s
manual or perform a web search for its
model number and “default password”. If
you have previously changed the
password and cannot remember it, you
can reset your router’s password to the
default.

36
Step 3

Once you have logged in, you can


now browse your router’s configuration
pages and configure its settings.

▪ The most typical username is “admin”.


▪ The most typical passwords are “admin”
and “password”.
▪ Many routers will only require a username
and a blank password, while some allow
you to leave all fields blank.
▪ If you cannot figure out the correct IP
address, your username or password,
search for your router model online to see
what the default login is. If it has been
changed, press the Reset button found at
the back of the router for 10 (to 30+
seconds as dictated in the instructions for
the router model) to restore factory defaults
and try again.

Step 4
Open the Wireless Settings.
When you log in to your router, you will
be taken to the router’s main menu or
status screen. There will be several
options to choose from. The Internet
section can usually be left at default
settings. The Wireless section will allow
you to set up your wireless network. Enter
a name for your wireless network.

37
Step 5
In the Wireless section, you should
see a field labeled SSID or Name. Enter a
unique name for your wireless network.
This is what other devices will see when
scanning for networks.

Step 6
Check the box to enable SSID
broadcast. This will essentially “turn on”
the wireless network so that it may be
readily seen by anyone in range of the
signal.

Step 7
Choose a security method.
Choose from the list of available security
options. For the best security, choose
WPA2-PSK as the encryption method.
This is the most difficult security to
crack, and to give you the most
protection from hackers and intruders.

Step 8
Create a passphrase. Once you
have chosen your security method, enter in a passphrase for the network. This
should be a difficult password, with a combination of letters, numbers, and symbols.
Do not use any passwords that could be easily deduced from your network name or
from knowing you. Then save the setting once naming and security settings are
finished configuring.

Sample Inspection Checklist


INSPECTION CHECKLIST

Equipment Type: Desktop

Property Code: P.C. #1

Number: P.C. #1

Location: Practical Work Area

YES NO N/A INSPECTION ITEMS

1. Is there an internet connection?

2. Are the cables check for damaged?

38
3. Are all device drivers installed and configured properly?

4.Can computers see each other?

5. Is the password changed?

6. Is the SSID changed?

7. Is the IP address configured correctly?

8. Is the desired workgroup filled?

Designing a Network Diagram.

One important principle in creating a network, especially in the industry, is to


create or design a network diagram. First you have to know if your network will run
according to your plan, the material to be used and the cost needed. This network
diagram will present how things like networking device, firewall, servers, cables will
co-exist and work smoothly with each other. Also, this diagram will easily locate
network problems need for repair.

Network diagram can have lots of elements to consider depending how


complex your network would be. Try to use paper and pen first in listing all the
required elements needed on a network. Example of these are router, access point,
switches, hub, wire to use, wired or wireless computers, network cabinet, raceways,
modular box, power switch, tables etc. Draw each on a piece paper and put lines
between these devices.

Ex.

39
Next is to arrange wire and devices depending on the space provided and make
sure that the wire will not cross each other to avoid confusion when problem occurs
during installation. Name all the devices including wire to be used then assign an IP
address for this network on each node, lastly print the network diagram.

Sample of a complete network diagram

Diagramming and designing a network are very easy, you can use any online
tools available in the internet or just use paper and pen to draw it. Just do not forget
to label every device you use so you will not be confused in designing a network
diagram.

40
Connect a computer to a network

Windows 10

1. Click the network button at the lower right corner of your screen.

2. Click the desired network.

3. Click “Connect” – check “connect


automatically” in the box to connect
network automatic when restarting
your computer.

4. Enter the wireless network key on the


space provided.

5. Click “next”.

6. Select the “network option” you


prefer.

7. Click “yes” for home network.

8. If the network is successful, the screen will show that you are connected
on the network. If not, it will indicate “no internet connection”.

9. System tray icon will display if


succeeded.

Now you can try to browse the internet if it is connected through the internet.
Note: do not share your password and SSID with others for your data privacy
protection.

41
What’s More

Directions: Define the following terms based on your


understanding. Write your answer on a separate sheet of paper.

1. Network Dynamic Functionality


2. Windows Network Diagnostic
3. Netsh Trace

What I Have Learned

Directions: Read and complete the statements below. Write you answer on a
separate sheet of paper.

1. In designing a network diagram, the inspection checklist helps me to

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2. In configuring network diagram, I have to consider first designing a network


because

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_________________________________________________________________________________

What I Can Do
Directions: Accomplish the following tasks.

Title: Configure Client Device

Performance Objective: Given those devices, you should be able to connect


them through internet.

Equipment: 1 Computer Sets/Laptop/cellphone


1 Wireless Router / Data

42
Steps/Procedure:
1. Make sure that your working area is ready.
2. Prepare the computer/laptop/cellphone and other equipment.
3. Configure the wireless router.
4. Change the SSID.
5. Change the wireless router password.
6. Connect the computer to a network.
Assessment Method:
1. Procedural Demonstration

Assessment
Directions: Draw and design a network diagram using the following devices.

a. Router
b. Switch
c. 2 laptop computers
d. 4 Desktop
e. 2 Modular boxes
f. 1 Patch panel

Additional Activities
Directions: Watch the following videos and write you reflections on
separate sheet of paper.

1. Connecting your windows 7 through WiFi connectivity


https://www.youtube.com/watch?v=O3Win53t7XY
2. Turning Windows 7 into Hotpot
https://www.youtube.com/watch?v=5EPHgWonJps

Reflection:
1. I have learned that

2. I have realized that

3. I will apply

43
1. Assessment Actual Demonstration using this rubric

RUBRIC
PERFORMANCE INDICATOR 1 PT. 3 PTS. 5 PTS.
NOTYET APPROACHING COMPETENT
COMPETENT COMPETENT
Identifying and obtaining
necessary materials needed
before the start of the
activity.

Ensuring the accuracy of the


network diagram in terms of
completeness of its label and
IP address used

Keeping the impact of the


network design by
maintaining the neatness
and free from any kind of
errors.

Suggestions and Recommendations:

RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do
and Reflection)
This rubric will monitor, score and give suggestions to improve the
performance of the students.
PERFORMANCE 1 PT. 3 PTS. 5 PTS.
INDICATORS NOTYET APPROACHING COMPETENT
COMPETENT COMPETENT
Content: Substantial,
specific, and illustrative
content which
demonstrated strong and
sophisticated ideas.

44
Focus: Apparent point to a
single topic with sufficient
awareness of task.
Conventions: Evident
control of grammar,
mechanics, spelling, usage
and sentence formation.
Suggestions and Recommendations:

References
https://community.fs.com/blog/nic-card-guide-for-beginners-functions-types-and-
selection-tips.html
https://www.lifewire.com/what-is-a-static-ip-address-2626012
https://www.techopedia.com/definition/28504/dynamic-internet-protocol-
address-dynamic-ip-
address#:~:text=A%20dynamic%20Internet%20Protocol%20address,to%20every%2
0new%20network%20node.
https://www.webopedia.com/TERM/A/APIPA.html
https://www.paessler.com/network-device-
management#:~:text=Generally%20speaking%2C%20network%20devices%20are,fir
mware%20which%20must%20be%20updated.
https://www.linksys.com/nz/support-article?articleNum=136548
https://www.linksys.com/us/support-article?articleNum=142912
https://www.linksys.com/my/support-article?articleNum=136155
https://www.windowscentral.com/how-connect-wi-fi-network-windows-10
https://www.fieldengineer.com/blogs/network-switch-managed-vs-
unmanaged#:~:text=The%20Differences%20Between%20Managed%20and,for%20gr
eater%20control%20over%20it.https://www.fieldengineer.com/blogs/network-
switch-managed-vs-
unmanaged#:~:text=The%20Differences%20Between%20Managed%20and,for%20gr
eater%20control%20over%20it.
http://www.ybet.be/en-hardware-2-16/
https://www.forcepoint.com/cyber-edu/firewall
https://www.lifewire.com/what-is-a-public-ip-address-2625974
https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-
server-2012-r2-and-2012/jj129382(v=ws.11)

45
For inquiries or feedback, please write or call:
Department of Education – National Capital Region

Office Address: Pio Valenzuela Street,


Marulas, Valenzuela City, 1440
Telefax: (02) 292 – 32 – 47
E-mail Address: sdovalenzuela@deped.gov.ph

46

You might also like