You are on page 1of 10

Grade

10

TLE-INFORMATION AND
COMMUNICATIONS TECHNOLOGY

COMPUTER SYSTEMS
SERVICING:
SETTING UP NETWORKS
QUARTER 4 – MODULE 2
WEEK 3-4
MELC/ LO3 Set Router/Wi-fi/Wireless Access Points/Repeater Configuration

Prepared by:
JEFFREY O. TORRALBA
Teacher III
Don Ramon E. Costales Memorial NHS

0
What This Module is About
Good day learners! Welcome to this module in Information and Communications
Technology – Computer Systems Servicing Course ( ICT-CSS). In this module you will learn
skills on the different factors to consider in setting up computer network configurations.
At the end of this module you will be able to apply the knowledge and skills on setting
up computer network configuration.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Read the instruction carefully before doing each task.
3. Observe honesty and integrity in doing the tasks and checking your answers.
4. Finish the task at hand before proceeding to the next.
5. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!

Lesson SET ROUTER / WI-FI /


2 WAP / REPEATER
CONFIGURATION
Computer Network Configuration is not an easy task. In order for you to perform it, you
must know the different factors to consider for you to successfully set up your network.
In this lesson, you are expected to configure client device systems, LAN, WAN,
security, firewall and other advanced settings for end-user preferences.

What I Need to Know

At the end of the lesson, the learners are expected to:


LO3 Set Router/Wi-fi/Wireless Access Points/Repeater Configuration

1
What’s In

Wireless networks are computer networks that are not connected by cables of any
kind. The use of a wireless network enables enterprises to avoid the costly process of
introducing cables into buildings or as a connection between different equipment locations.
The basis of wireless systems are radio waves, an implementation that takes place at the
physical level of network structure.

What’s New

Wireless networks use radio waves to connect devices such as laptops to the Internet,
the business network and applications. When laptops are connected to Wi-Fi hot spots in
public places, the connection is established to that business’s wireless network.

What is It

How to set up a Wi-Fi network

The Internet is a really powerful tool. It gives us access to all kinds of information at a
moment's notice—think email, Google search, and Wikipedia. So there's something a little
counterintuitive about only being able to use the Internet when you sit down at a desktop
computer. What if you could use the Internet from anywhere in your home or office?

If you already have high-speed (broadband) Internet service at your house, it's pretty
easy to create your own home wireless network. Commonly known as Wi-Fi, a wireless
network allows you to connect laptops, smartphones, and other mobile devices to your home
Internet service without an Ethernet cable.

2
Wireless Router

To create your own Wi-Fi network, you'll need a wireless router. This is the device that
will broadcast the Wi-Fi signal from your Internet modem throughout your house. Your Internet
service provider (ISP) may offer you a wireless router for a small monthly fee. If you've never
set up a Wi-Fi network before, this may be the easiest option.

Connecting the Cables

1. Once you've acquired a wireless router, you'll need to connect it to your existing Internet
modem.

2. Connect an Ethernet cable from your modem to the wireless router (there is usually a short
Ethernet cable included with your wireless router for this purpose).

3. Plug in the power cable for the wireless router.

4. Wait at least 30 to 60 seconds, and make sure the lights on your router are working correctly.

3
Configure your router

Next, you'll need to use your computer to configure your router's default settings. This
includes setting a unique name and password for your wireless network.

1. Using your web browser, enter the router's default IP address into the address bar, then
press Enter. Your router's instructions should include this information, but some of the most
common addresses include 192.168.0.1, 192.168.1.1, and 192.168.2.1.

2. The router's sign-in page will appear. Again, the exact sign-in details should be included
with your router's instructions, but most routers use a standard user name and password
combination, such as admin and password.

3. Your router's settings page will appear. Locate and select the Network Name setting, then
enter a unique network name.

4. Locate and select the Network Password setting, and choose an Encryption option. There
are several types of encryption you can use, but we recommend WPA2, which is generally
considered to be the most secure.

5. Enter your desired password. Make sure to use a strong password to help ensure no one
else can access your network.

6. Locate and select the Save button to save your settings.

Configuring a Wireless Access Point

The physical setup for a wireless access point is pretty simple: You take it out of the
box, put it on a shelf or on top of a bookcase near a network jack and a power outlet, plug in
the power cable, and plug in the network cable.

The software configuration for an access point is a little more involved, but still not very
complicated. It’s usually done via a Web interface. To get to the configuration page for the
access point, you need to know the access point’s IP address. Then, you just type that address
into the address bar of a browser from any computer on the network.

Multifunction access points usually provide DHCP and NAT services for the networks
and double as the network’s gateway router. As a result, they typically have a private IP
address that’s at the beginning of one of the Internet’s private IP address ranges, such as
192.168.0.1 or 10.0.0.1. Consult the documentation that came with the access point to find
out more.

Basic configuration options

When you access the configuration page of your wireless access point on the Internet,
you have the following configuration options that are related to the wireless access point
functions of the device. Although these options are specific to this particular device, most
access points have similar configuration options.

Enable/Disable: Enables or disables the device’s wireless access point functions.

SSID: The Service Set Identifier is used to identify the network. Most access points have well-
known defaults. You can talk yourself into thinking that your network is more secure by
changing the SSID from the default to something more obscure, but in reality, that only

4
protects you from first-grade hackers. By the time most hackers get into the second grade,
they learn that even the most obscure SSID is easy to get around. So leave the SSID at the
default and apply better security measures.

Allow broadcast SSID to associate? Disables the access point’s periodic broadcast of the
SSID. Normally, the access point regularly broadcasts its SSID so that wireless devices that
come within range can detect the network and join in. For a more secure network, you can
disable this function. Then, a wireless client must already know the network’s SSID in order to
join the network.

Channel: Lets you select one of 11 channels on which to broadcast. All the access points and
computers in the wireless network should use the same channel. If you find that your network
is frequently losing connections, try switching to another channel. You may be experiencing
interference from a cordless phone or other wireless device operating on the same channel.

WEP — Mandatory or Disable: Lets you use a security protocol called wired equivalent
privacy.

DHCP configuration

You can configure most multifunction access points to operate as a DHCP server. For
small networks, it’s common for the access point to also be the DHCP server for the entire
network. In that case, you need to configure the access point’s DHCP server. To enable
DHCP, you select the Enable option and then specify the other configuration options to use
for the DHCP server.

Larger networks that have more demanding DHCP requirements are likely to have a
separate DHCP server running on another computer. In that case, you can defer to the existing
server by disabling the DHCP server in the access point.

How to Setup a Wi-Fi Repeater

Always defer to the original manufacturer's instructions, as the setup details of each
make and model vary. If you're rolling sans manual, the good news is that the basics of most
Wi-Fi repeater setup processes remain fairly consistent, even in terms of the long number
strings you have to input.

1. Choose a placement that is free of the same sorts of obstructions that can interfere
with your router's signal. Thick concrete walls pose more of a problem than wood or
glass, for example.
2. Plug the repeater into a working AC power outlet in your chosen location within
range of your existing Wi-Fi coverage.
3. Using a nearby computer or laptop, connect the repeater. Do this by connecting an
Ethernet cable directly from the repeater to your PC, a method that is often
recommended by the manufacturer, or by connecting to the repeater's wireless
network, often called something like Wi-Fi Repeater or containing the brand name of
the product's manufacturer.

4. When they are connected, open your computer's local area network properties. On
Windows, select Start > Control Panel > View Network Status and Tasks > Manage
Network Connections. Then, right-click Local Area Network and choose Properties,
followed by Internet Protocol Version 4 and Properties again.

5
5. Check the repeater's instructions to be sure, but the default IP address you need to
enter in the respective blank field is usually 192.168.10.1. Here, you'll also enter
common number strings for the subnet mask (255.255.255.0) and default gateway
(192.168.10.1).

6. Open a web browser and type http://192.168.10.1 in the address bar. If asked to
enter a DNS server address, leave the field blank. If asked for a username and
password, try entering admin in both fields or admin in the username field
and password in the password field. This brings you to the Setup Wizard.

7. Choose Wireless Repeater Mode and click Repeater – OneKey Setting. When it
appears, select the Wireless Network Selection button and click Refresh List.

8. Choose your main router's wireless network to connect the repeater to the router
and click Next.

9. Enter your Wi-Fi network's password in the Pre-Shared Key field when prompted if
the network is secured. Now click Apply and Reboot and OK.

Firewall

A firewall is a network security device that monitors incoming and outgoing


network traffic and decides whether to allow or block specific traffic based on a
defined set of security rules.

Firewalls have been a first line of defense in network security for over 25
years. They establish a barrier between secured and controlled internal networks that
can be trusted and untrusted outside networks, such as the Internet.

A firewall can be hardware, software, or both.

Types of Firewalls

1. Proxy firewall

An early type of firewall device, a proxy firewall serves as the gateway from
one network to another for a specific application. Proxy servers can provide additional
functionality such as content caching and security by preventing direct connections
from outside the network. However, this also may impact throughput capabilities and
the applications they can support.

2. Stateful inspection firewall

Now thought of as a “traditional” firewall, a stateful inspection firewall allows or


blocks traffic based on state, port, and protocol. It monitors all activity from the
opening of a connection until it is closed. Filtering decisions are made based on both
administrator-defined rules as well as context, which refers to using information from
previous connections and packets belonging to the same connection.

3. Unified threat management (UTM) firewall

A UTM device typically combines, in a loosely coupled way, the functions of a


stateful inspection firewall with intrusion prevention and antivirus. It may also include
additional services and often cloud management. UTMs focus on simplicity and ease
of use.

6
4. Next-generation firewall (NGFW)

Firewalls have evolved beyond simple packet filtering and stateful inspection.
Most companies are deploying next-generation firewalls to block modern threats such
as advanced malware and application-layer attacks.

5. Threat-focused NGFW

These firewalls include all the capabilities of a traditional NGFW and also
provide advanced threat detection and remediation.

6. Virtual firewall

A virtual firewall is typically deployed as a virtual appliance in a private cloud


(VMware ESXi, Microsoft Hyper-V, KVM) or public cloud (AWS, Azure, Google,
Oracle) to monitor and secure traffic across physical and virtual networks. A virtual
firewall is often a key component in software-defined networks (SDN).

What I Have Learned

Directions. Write TRUE if the statement is correct and FALSE if the statement is wrong.

______1. A firewall is a network security device that monitors incoming and outgoing
network traffic.
______2. A firewall decides whether to allow or block all traffic based on a defined set
of security rules.
______3. Proxy firewall serves as the gateway from all networks to another for a specific
application.
______4. Proxy servers can provide additional functionality such as content caching and
security by preventing direct connections from outside the network.
______5. A UTM device does not include additional services and often cloud management.
______6. SIF monitors all activity from the opening of a connection until it is closed.
______7. Firewalls have remained as simple packet filtering.
______8. A virtual firewall is often a key component in hardware-defined networks (HDN).
______9. Filtering decisions are made based on both administrator-defined rules as well as
context.
______10. Firewalls have been a first line of defense in network security for over 50 years.

Summative Assessment

I. Directions. Choose the letter of the best answer. Write your answer on a separate sheet of
paper.

1. These firewalls include all the capabilities of a traditional NGFW and also provide
advanced threat detection and remediation.
a. Threat-focused b. Self-Activated NGFW c.both a and b d. none of these
2. Lets you use a security protocol called wired equivalent privacy.
a. DSF b. ISP c. WEP d. WPS

7
3. Used to identify the network.
a. SIDD b. SSID c. SDID d. SSDI
4. They establish a barrier between secured and controlled internal networks that can be
trusted and untrusted outside networks, such as the Internet.
a. Antivirus b. Malware Protect c. both a and b d. none of these
5. Provides additional functionality such as content caching and security by preventing direct
connections from outside the network.
a. Proxy Server b. SSID c. Firewall d. all of these
6. Typically deployed as a virtual appliance in a private cloud.
a. Virtual FW b. Threat-focused FW c. Antivirus d. none of these
7. Most companies are deploying next-generation firewalls to block modern threats such as
a. Advanced Malware b. Application-Layer Attacks
c. both a and b d. none of these
8. This is the device that will broadcast the Wi-Fi signal from your Internet modem
throughout your house.
a. NIC b. SSID c. Wireless Router d. Advanced Firewall
9. Computer networks that are not connected by cables of any kind.
a. Internet b. Website c. both a and b d. none of these
10. It gives us access to all kinds of information at a moment's notice.
a. WiFi b. Internet c. both a and b d. none of these
11. Allows you to connect laptops, smartphones, and other mobile devices to your home
Internet service without an Ethernet cable.
a. Wireless Network b. Internet c. both a and b d. none of these
12. A Wireless Access Point can be configured as ________.
a. Enabled b. Disabled c. both a and b d. none of these

II. Directions. ARRANGE THE FOLLOWING STEPS FROM FIRST PROCEDURE TO


LAST PROCEDURE. WRITE NUMBERS 1-8.

___1. Open a web browser and type http://192.168.10.1 in the address bar.
___2. Choose your main router's wireless network to connect the repeater to the router and
click Next.
___3. Plug the repeater into a working AC power outlet in your chosen location within range
of your existing Wi-Fi coverage.
___4. When they are connected, open your computer's local area network properties. On
Windows, select Start > Control Panel > View Network Status and Tasks > Manage
Network Connections.
___5. Choose Wireless Repeater Mode and click Repeater – OneKey Setting. When it
appears, select the Wireless Network Selection button and click Refresh List
___6. Choose a placement that is free of the same sorts of obstructions that can interfere
with your router's signal.
___7. Using a nearby computer or laptop, connect the repeater.
___8. Check the repeater's instructions to be sure, but the default IP address you need to
enter in the respective blank field is usually 192.168.10.1.

III. Directions. CREATE A FLOWCHART REPRESENTING THE STEPS IN


CONFIGURING A ROUTER.

8
Answer Key
What I have Learned
1. TRUE
2. FALSE
3. FALSE
4. TRUE
5. FALSE
6. TRUE
7. FALSE
8. FALSE
9. TRUE
10. FALSE

References:

Abrams, M. D., et al., "The NBS network measurement system," IEEE Trans. on Commun.
COM-25, (Oct 1977), 1189--1198.

Bruce Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”,
Fast Software Encryption, Cambridge Security Workshop Proceedings (December
1993), Springer-Verlag,
1994.

Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo Cardoso and Frank Piessens,
“Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network
Discovery Mechanisms”, ACM Asia Conference on Computer and Communications
Security, May 2016.

Lixia Zhang, “A New Architecture for Packet Switching Network Protocols”, PhD Thesis,
Massachusetts Institute of Technology, 1989.

School Self-Learning Module Development Committee:


Chairman: Dr. Rowena Lea G. Moreno (School Principal IV)
Co-Chairman: Dr. Maribeth S. Tugare (Head Teacher III, TLE Dept.)
Content Researcher: Mr. Jeffrey O. Torralba (Teacher III)
Language Validator: Mr. Ulysses M. Bañaga (Teacher III)

You might also like