Professional Documents
Culture Documents
COC2 Edited
COC2 Edited
COMPUTER SYSTEMS
Qualification : SERVICING NCII
SETTING-UP COMPUTER
Module Title : NETWORKS
HOW TO USE THIS COMPETENCY –BASED LEARNING MATERIAL
Welcome!
Remember to:
Work through all the information and complete the activities in each
section.
When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No
. Unit of Competency Module Title Code
Installing and
Install and configure configuring
ELC724331
1.
computer systems computer systems
MODULE DESCRIPTOR:
Computer networks.
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
ASSESSMENT CRITERIA:
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
11. Any fault or problem in the network system is diagnosed and remedied
in line with the standard operating procedures.
16. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network des
17. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network des
MODULE DESCRIPTOR:
Computer networks.
CONTENTS:
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and obtained
in accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work
are obtained in accordance with established procedures and checked for correct
operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage
has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
Excess components and materials are disposed of based on WEEE directives and 3Rs waste
management program
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT
LEARNING OBJECTIVES:
An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
● Cables and connectors. These link together the computers, printers, servers and
other equipment on your network.
●A router. This manages network traffic, ensuring devices can communicate with
each other via both wired and wireless connections, and provides internet
connectivity.
● A wireless access point (optional). This will extend your wireless network if the
router is incapable of offering coverage in certain parts of the building.
● An internet connection. This could be a faster fibre connection or dedicated leased
line.
● A hardware firewall. This creates a secure barrier between your network and the
internet, blocking security threats. Networks sometimes include an on-site network
server which runs central applications, acts as an email server and provides file
storage.
Going wireless
Routers also include Wi-Fi capability, enabling people to connect
laptops, smartphones, tablets and other devices to the network wirelessly.
Wi-Fi is ideal for providing network access to staff with mobile devices and in meeting
rooms or common areas. It's also useful for offering internet access to visitors, with
many routers including a separate 'guest' network for the purpose. Wireless routers
start at around £70.
RJ45
RJ means Registered jack. This is a
standard physical Network Interface
used for connecting telecommunications
equipment commonly, a computer networking
equipment
UTP CABLE
The cheapest cable use in computer in
networking is the UTP
(Unshielded Twisted Pair) cable.
Other use the STP (Shielded Twisted Pair)
cable which is cost much than UTP but more reliable.
CRIMPER
Crimping tool is used to join the
RJ-45 and RJ-11 connectors to
the both ends of either phone
or CAT5 cable.
WIRE STRIPPER
A tool designed to remove the protective
covering (jacket) off of a cable to expose
the inner wires. Because different wires
come in different shapes, there are dozens
of different wire strippers available.
LAN TESTER
ROUTER
SWITCH HUB
BAY RACK
PATCH PANEL
2 COMPUTER DESKTOP
RACEWAY or SLOTTED
COMPUTER TABLE
a flat surface, usually supported by
four legs, used for putting things on
UNINTERRUPTIBLE POWER SUPPLY
SELF-CHECK 1.1-1
Steps / Procedure:
LEARNING OBJECTIVES:
Coaxial Cable
It has a single copper conductor in the middle. A
plastic layer provides insulation between the
braided metal shield and center conductor. The
metal shield blocks outer interference from motors,
fluorescent lights, and other computers.
Coaxial cabling is extremely resistant to signal
obstruction though it is complex to install. It can
handle great cable lengths between network
devices than the twisted pair cable. The two types of
coaxial cables are thin coaxial and thick coaxial.
● CAT5 wire is now replaced by the CAT5e designs providing an enhanced crosstalk
specification allowing it to support speeds up to 1 Gbps. It is the most used network
cabling specification in the world.
● CAT6 support speeds of 1 Gbps for length up to 100 meters and 10 Gbps up to 55
meters. Organizations using CAT6 cabling should use a specialized cable analyzer to
request a complete test report, to ensure that the the CAT6 guidelines and standards
have been followed during the installation.
● The CAT7 is a fresh copper cable pattern which can support speeds of 10Gbps and
length up to 100 meters.
For the development of a successful network in an organization, understanding the
different types of cable and how they affect other aspects of a network is vital.
STRAIGHT THROUGH
TYPE A TYPE B
Materials Needed:
2 RJ45
1 meter Network Cable – UTP cable
Tools Needed:
Crimping Tool
Wire Stripper
LAN Tester
Equipment Needed:
2 Working computers with Network Adapter (LAN port)
Position all wires. Make sure that all are in proper pin assignment
Cut the wires
Make sure that the cut is even and small enough for the RJ45
POSSIBLE ISSUES:
Connection between server and computer(s) is weak
Outside interference causing data loss or decreased signal strength
Faulty cable
ENUMERATION: Write the correct answer in your whole sheet of pad paper
Steps / Procedure:
⮚ Unroll the required length of network cable and add a little extra wire, just in
case.
⮚ Carefully remove the outer jacket of the cable
⮚ Inspect the newly revealed wires for any cuts or scrapes that expose the
⮚ Untwist the pairs so they will lay flat between your fingers.
⮚ Arrange the wires based on the wiring specifications you are following.
⮚ You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires
are switched.
⮚ Press all the wires flat and parallel between your thumb and forefinger
⮚ Keep the wires flat and in order as you push them into the RJ-45 plug with
the flat surface of the plug on top
⮚ Place the wired plug into the crimping tool
⮚ Repeat all of the above steps with the other end of the cable
Assessment Method:
Demonstration
YE N
CRITERIA S O
Did you……
Wear your ppe
Unroll the required length of network cable and add a little extra wire,
just in case.
Carefully remove the outer jacket of the cable
Inspect the newly revealed wires for any cuts or scrapes that expose
the
Untwist the pairs so they will lay flat between your fingers.
Arrange the wires based on the wiring specifications you are following.
You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which
wires are switched.
Press all the wires flat and parallel between your thumb and forefinger
Keep the wires flat and in order as you push them into the RJ-45 plug
with the flat surface of the plug on top
Place the wired plug into the crimping tool
Repeat all of the above steps with the other end of the cable
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
PART 2 SET-UP :
1.When you power on the router, it will only create its wi-fi network, and the
device will be connected to the router's wi-fi connection, not the internet. To
connect the router to the internet, with some internet providers (i.e. GTPL in India),
it is required to register router's MAC address to the internet service provider's
website.
● MAC of the router can be found printed on router or in the documents etc.
2.Go to the internet service provider's website. Type ip address Log in with the
username and password provided by the internet service provider and go to MAC
address update option. one can see their existing laptop / computers MAC address
there. Add the router's MAC address there and save it. This process means that the
router is authorized to use the internet provide by the broadband company.
1.Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the
router or in the documentation.[4] If you can’t find the router’s IP address
anywhere, you can do a web search for the router model to see what the default
address is.
2.Enter your username and password. In order to access the configuration page,
you will need to be on the router's IP address and enter a valid username and
password at the prompt. Most routers have a basic account set up that you will
need to use to log on. This varies from model to model, but should be printed on
the router or in the documentation.
● The most typical username is “admin”.
3.Open the Wireless Settings. When you log in to your router, you will be taken to
the router’s main menu or status screen. There will be several options to choose
from. The Internet section can usually be left at default settings, unless you
received specific instructions from your internet service provider. The Wireless
section will allow you to set up your wireless network.
4.Enter a name for your wireless network. In the Wireless section, you should
see a field labeled SSID or Name. Enter a unique name for your wireless network.
This is what other devices will see when scanning for networks.
● Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the
signal. *See the Tips section below for additional information on the SSID
setting.
3. Choose a security method. Choose from the list of available security
options. For the best security, choose WPA2-PSK as the encryption method.
This is the most difficult security to crack, and will give you the most
protection from hackers and intruders.
4. Save your
settings.
O nce you
are
finished
naming
and
securing your wireless network, click the Apply or Save button. The changes
will be applied to your router, which may take a few moments. Once the
router has finished resetting, your wireless network will be enabled.
2. Enter your wireless passphrase. Once you enter the passphrase, your device
will be automatically connected to the wireless network. The network will be stored
in your devices memory and will automatically connect whenever you are within
range.
3.Connect your other devices. Besides other computers and tablets, you can
connect other devices as well, such as printers, game consoles, TVs and more. See
the following guides for instructions for your specific device.
SELF-CHECK 2.1-1
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
YE N
CRITERIA S O
Did you……
Wear your ppe
Configure your wireless router gateway
Update the router's firmware
LEARNING OBJECTIVES:
Network Connectivity
You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).
ROUTER
SWICTH HUB
PATCH PANEL
SWICTH HUB
FIFTH: CONNECT PATCH PANEL TO 2 SYSTEMS UNIT
PATCH PANEL
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each
computer on the network its own individual IP address. This process is handled
automatically if you're using a router. Think of an IP address as a mailing
address. Each computer on the network needs a unique IP address so that
information sent across the network reaches the correct destination.
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
Click the Use the following IP address radio button.
A. Click Start
B. Right-click
Network
and click
Properties
C. Click Local Area Connection
D. Click Details. Make note (on a piece of paper) of the address on the
right side of IPv4 Address:
(For our example, we are building a small network and we will just use a small
range of IP addresses. In the real world or for a large network, you would need to
actually know TCP/IP, design a range of IP addresses you plan to use, then assign
those IP addresses, or design a way to assign the IP addresses to the computers)
E. Click Close
F. In the Local Area Connection Status dialog box, click Properties
G. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
Click Properties
H. Click Use the Following IP Address
I. Type the IP address you want the server to use. For our example,
and based on the above dialog box, we type 192.168.001.001
J. Press Tab
K. Type the subnet mask (normally, it should be added automatically
when you press Tab from the previous IP address text box) and
press Tab
L. Type the default gateway address (use the first and the second octets
of the IP address you had provided (such as 192.168) and use
001.001 for the other two bytes)
M.Provide the Preferred DNS server address (we use 127.0.0.1 for our
example) and the Alternate DNS Server address (we leave ours
empty)
N. Click Advanced to check the values that were put in the IP Settings
and DNS property pages
O. Click OK
P. Click OK
Q. Click Close
R. Click Close
INFORMATION SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY
ESSAY: write the correct definition in your whole sheet of pad paper
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
7.Click OK. This will save the settings for that computer. This computer is now
configured on your network with a unique IP address.
Assessment Method:
Demonstration
Did you……
Wear your ppe
Click the Ethernet link at the top of the window. You'll see this next
to
"Connections." Click Properties.
Click OK. This will save the settings for that computer. This computer
is now configured on your network with a unique IP address.
CONTENTS:
ASSESSMENT CRITERIA:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
“Network testing is an
investigation conducted to provide
stakeholders with information about
the quality of the product or service
under test. Network testing can also
provide an objective, independent
view of the network to allow the
business to appreciate and
understand the risks of network
implementation.”
Couldn’t be further from the truth.
Network testing is, in the end,
making sure that your network
configuration works as designed. Network testing is very similar to software
testing, with one exception: in contrast to software testing, network testing
often has to happen in a production environment, after the configuration
change was made. In fact, it is sometimes very difficult, or almost impossible,
to model a complex system like a large enterprise network, or the Internet
itself, in a lab environment. Thus, network testing is a MUST-HAVE step in the
network implementation process.
Ping
ping is a fundamental tool for testing TCP/IP network connectivity. Because
most networks today use the Internet (TCP/IP) protocol for file and printer
sharing services, as well as for Internet access, most Windows users can use
the ping test to confirm that their network cabling, hardware, and the TCP/IP
protocol are all functioning correctly. Ping sends several data packets to a
specified computer and waits for the other computer to send the packets back.
By default, it sends four packets and prints the results of the four tests.
To see whether the network can carry data between a pair of computers, use
the ipconfig command (described previously) to find the IP address of the two
computers. Then, on one computer, open a command prompt window by
choosing Start, All Programs, Accessories, Command Prompt.
Next, type the following command:
Ping 127.0.0.1
This command tests the networking software of the computer itself by sending
packets to the special internal IP address 127.0.0.1. This test has the computer
send data to itself. It should print the following:
If your computer can send data to itself, try another computer on your LAN.
Find its IP address by running ipconfig on that computer and then issue
the ping command again on the first computer, as in this example:
Ping 192.168.0.23
Of course, you should use the other computer's real IP address in place of
192.168.0.23. You should get four replies as before:
These replies indicate that you have successfully sent data to the other
machine and received it back.
Ping comes from a term used in sonar technology that sends out pulses of
sound, and then listens for the echo to return. On a computer network, a ping
tool is built into most operating systems that works in much the same way.
You issue the ping command along with a specific URL or IP address. Your
computer sends several packets of information out to that device, and then
waits for a response. When it gets the response, the ping tool shows you how
long each packet took to make the round trip—or tells you there was no reply.
It sounds simple, and it is. But you can use it to good effect. You can test
whether your computer can reach another device—like your router—on your
local network, or whether it can reach a device on the Internet. This can help
you determine if a network problem is somewhere on your local network, or
somewhere beyond. The time it takes packets to return to you can help you
identify a slow connection, or if you’re experiencing packet loss.
And it pretty much doesn’t matter what operating system you’re using. Pull up
a terminal or Command Prompt window, and you can use ping on macOS,
Linux, or any version of Windows.
We’re going to use the Windows Command Prompt in our example here. But
you can also use the ping command in Windows PowerShell, or in the Terminal
app on macOS or any Linux distro. Once you get to using the actual command,
it works the same everywhere.
In Windows, hit Windows+R. In the Run window, type “cmd” into the search
box, and then hit Enter.
At the prompt, type “ping” along with the URL or IP address you want to ping,
and then hit Enter. In the image below, we’re pinging www.howtogeek.com and
getting a normal response.
That response shows the URL you’re pinging, the IP address associated with
that URL, and the size of the packets being sent on the first line. The next four
lines show the replies from each individual packet, including the time (in
milliseconds) it took for the response and the time-to-live (TTL) of the packet,
which is the amount of time that must pass before the packet is discarded.
At the bottom, you’ll see a summary that shows how many packets were sent
and received, as well as the minimum, maximum, and average response time.
And in the next image, we’re pinging the router on our local network using its
IP address. We’re also getting a normal response from it.
When the ping tool does not get a response from whatever devices you’re
And that’s how to use ping at its most basic. Of course, like most commands,
there are some advanced switches you can use to make it behave a bit
differently. For example, you can have it keep pinging a destination until you
stop the command, specify the number of times you want it to ping, set how
often it should ping, and more. But unless you’re doing some very specific
types of troubleshooting, you won’t need to worry much about those advanced
switches.
If you’re curious about them, though, just type “ping /?” at the Command
Prompt to see a list.
So, What Can You Do With Ping?
Now that you know how to use the command, here are some interesting things
you can do with it:
● Ping your router to see if you can reach it. If you can’t successfully ping an
internet location, you can then try pinging your router. A successful
response lets you know that your local network is working okay, and that
the problem reaching the internet location is somewhere out of your control.
● Ping your loopback address (127.0.0.1). If you can’t successfully ping your
router, but your router appears to be turned on and working, you can try
pinging what’s known as a loopback address. That address is always
127.0.0.1, and pinging it successfully lets you know that the network
adapter on your computer (and the networking software in your OS) is
working properly.
Note: You may not get a ping response from other computers on your local
network because the built-in firewalls on those devices prevent them from
responding to ping requests. If you want to be able to ping those devices, you’ll
need to turn off that setting to allow pings through the firewall.
The list above uses a kind of outside-in approach, where you ping the furthest
destination first, and then work your way in to the more local devices. Some
people like to work inside-out by pinging the loopback address first, then their
router (or another local device), and then an internet address.
And of course, what we’re talking about in this article is mostly about using
ping to perform troubleshooting on a home or small business network. On
larger networks, there’s a lot more complexity to worry about. Plus, if you’re
tasked with troubleshooting larger networks, you probably already know how
to use ping and many other networking tools.
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
Did you……
Wear your ppe
Check the physical connections. Check that the Link light — the little
red or green light next to the RJ-45 port — is lit on every computer
ipconfig
If your computer can't communicate with others on your LAN, after you check
the Event Log and Device Manager, use the ipconfig command-line utility to
see whether your computer has a valid IP address. Check other computers on
the LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs,
Accessories, Command Prompt), type the following command:
ipconfig /all
Windows IP Configuration
(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that
mention Tunnel adapters.)
● Host name—This should be set to the desired name for each computer. If
you can correspond with some computers but not others, be sure that the
ones that don't work are turned on and correctly named. Make sure that
you don't have two computers with the same name, and that none of the
computer names is the same as the workgroup name.
● IP address—This should be set appropriately for your network. If your LAN
uses Internet Connection Sharing, the address will be a number in the
range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for
automatic configuration, your network manager can tell you whether the IP
address is correct. Networks with cable/DSL sharing routers usually use
numbers starting with 192.168.x where x is a number from 0 to 15.
NOTE
Computer
You can check your computer's identification and workgroup or domain
membership setup from the Computer window. To do so, click Start,
Computer. Look in the Details pane at the bottom of the screen for the
computer name and domain or workgroup name, as shown in
NOTE
None of your computers can use the workgroup or domain name as its
computer name. For example, if your workgroup is MSHOME, you can't also
name a computer MSHOME. If you find this on one of your computers, change
that computer's name.
Network Connections
You can manually check all installed network protocols and services and their
configuration by viewing Network Connections and viewing the properties for
Local Area Connection. To view this screen, click Start, Network. At the top of
the Network window, click Network and Sharing Center. In the left pane of that
window, click Manage Network Settings. Then, right-click your Local Area
Connection icon (or the appropriate wireless connection icon) and select
Properties.
Confirm that each required protocol is installed and correctly configured. In
general, the settings on each computer on your LAN should match, except that
the IP address differs (usually only in the last of its four dot-separated
numbers). If your LAN uses Automatic IP address configuration, you need to
use the ipconfig command, described earlier, to check the settings.
So, how do you protect devices from the prying eyes of the hackers?
All the wireless networks and secretive information should be well encrypted
with unique username and passwords making it difficult for the hackers to
break into the system. Using a WPA2 encryption is more secure way than any
other encryption protocol as it is not easily hacked into.
If the CCTV hooked up with the system is not encrypted strongly than hackers
can easily view your updates of home or office and steal prime information.
Hackers could get all the insights of your office and household and can make a
right move at the right time.So it is very important to keep it secure with
username and password which may not be guessed. You can have an alarm
and security features if any unknown device hacks into it to keep your system
safe.
SELF-CHECK 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS
2. Gives the Secure & check your Computer System And Network?
Steps / Procedure:
Assessment Method:
Demonstration
Did you……
Wear your ppe