You are on page 1of 50

Computer Systems Servicing NC II

COMPETENCY-BASED LEARNING MATERIALS

Sector : Electronics
Qualification Title : Computer Systems Servicing NC II
Unit of Competency : Set-Up Computer Networks
Module Title : Setting-Up Computer Networks

TECHNOLOGICAL UNIVERSITY of the PHILIPPINES


Ayala Blvd., Ermita, Manila, Metro Manila

Technical Education & Skills Development Authority


JACOBO Z. GONZALES MEMORIAL SCHOOL OF ARTS AND TRADES
San Antonio, Biñan, Laguna

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 1 of 50
Engr. Eliseo M. Labaco
Revision # 01
TABLE OF CONTENTS
DESCRIPTION PAGE
Table of Content……………………………………………………………….. 2
How to use this Competency Based Learning Materials…………… 5
List of Competency……………………………………………………………. 6
Learning Outcome Summary……………………………………………….. 7
Learning Experiences…………………………………………………………. 9
Information Sheet No. 2.1-1………………………………………………… 13
Task Sheet 2.1-1……………………………………………….…..….. 19
Answer key 2.1-1….…………………………….……………………… 20
Information Sheet No. 2.1-2………………………………………………… 23
Self Check 2.1-2………………..………………………………………. 26
Answer Key 2.1-2………………………………………………………. 27
Information Sheet 2.1-3………………………………………………………. 28
Task Sheet 2.1-3………………………………………………………... 31
Answer Key 2.1-3………………………………………………………. 33
Information Sheet 2.1-4………………………………………………………. 34
Task Sheet 2.1-4………………………………………………………... 35
Answer Key 2.1-4………………………………………………………. 36
Information Sheet 2.1-5………………………………………………………. 47
Task Sheet 2.1-4………………………………………………………... 38
Answer Key 2.1-4………………………………………………………. 39
Information Sheet 2.1-6………………………………………………………. 40
Task Sheet 2.1-6 ………………………………………………………... 41
Answer Key 2.1-6………………………………………………………. 42
Information Sheet 2.2-1………………………………………………………. 45
Self Check 2.2-1A………………………………………………………… 46
Answer Key 2.2-1B………………………………………………………. 47
Task Sheet 2.2-1C………………………………………………………... 49
Performance Criteria Checklist 2.2-1……………………………. 49
Bibliography…………………………………………………………………..…… 50

HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL


Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 2 of 50
Engr. Eliseo M. Labaco
Revision # 01
Welcome to the module in Setting-Up Computer Networks. This
module contains training materials and activities for you to complete.

The unit of competency “Set-Up Computer Networks" contains knowledge,


skills and attitudes required for Computer Systems Servicing course
required to obtain the National Certificate (NC) level II.

You are required to go through a series of learning activities in order


to complete each learning outcome of the module. In each learning outcome
are Information Sheets, Task Sheets, Self-Checks and/or Checklist and
Job Sheets. Do this activity on your own and answer Self-Checks and/or
Checklist at the end of each learning activity. If you have questions, do not
hesitate to ask your teacher for assistance.

The goal of this course is the development of practical skills. To gain


these skills, you must learn basic concepts and terminologies.

This module is prepared to help you achieve the required competency,


in “Setting-Up Computer Networks".

This will be the source of information for you to acquire knowledge


and skills in this particular competency independently and at your own
pace, with minimum supervision or help from your instructor.

Remember to:
 Work through all the information and complete the activities in each
section.
 Read information sheets and complete the self-check and/or checklist.
 Use the Self-checks and/or Checklist, or Job Sheets at the end of each
section to test your own progress.
 When you feel confident that you have had sufficient practice, ask your
Trainer to evaluate you. The results of your assessment will be recorded
in your Progress Chart and Accomplishment Chart.

TRAINERS METHODOLOGY LEVEL I


Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 3 of 50
Engr. Eliseo M. Labaco
Revision # 01
COMPUTER SYSTEMS SERVICING NC-II
LIST OF COMPETENCIES

No. Unit of Competency Module Title Code

Install and Configure Installing and


ELC724331
1. Computer Systems and Configuring Computer
Networks Systems and Networks

Set-Up Computer Setting-Up Computer ELC724332


2.
Networks Networks

Set-Up Computer Setting-Up Computer ELC724333


3.
Server Server

Maintain and Repair Maintaining and


ELC724334
4. Computer Systems and Repairing Computer
Networks Systems and Networks

QUALIFICATION : Computer Systems Servicing NC II

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 4 of 50
Engr. Eliseo M. Labaco
Revision # 01
UNIT OF COMPETENCY : Set-Up Computer Networks
MODULE TITLE : Setting-Up Computer Networks

INTRODUCTION
This module deals with the cabling and networks of computers.

LEARNING OUTCOMES
Upon completion of this module, the trainees/students must be able to:
LO 1. Install network cables
LO 2. Set network configuration
LO 3. Set router/Wi-Fi/ wireless access point/repeater
configuration
LO 4. Inspect and test the configured computer networks

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with network


design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements.
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety.
4. Appropriate personal protective equipment is used and OHS
policies and procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA)
standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no
unnecessary damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements

9. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 5 of 50
Engr. Eliseo M. Labaco
Revision # 01
10. Network connectivity of each terminal is checked in accordance with
network design.
11. Any fault or problem in the network system is diagnosed and
remedied in line with the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance
with network design.
13. Communication checking between terminals are carried out in
accordance with OS network configuration guides
14. Unplanned events or conditions are responded to in accordance with
established procedures
15. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
16. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
17. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
18. Wireless settings are configured in accordance manufacturers’
instructions, network design and end-user preferences
19. Security/Firewall/Advance settings are configured in accordance
with
manufacturers’ instructions and end-user preferences
20. Final inspections are undertaken to ensure that the configuration
done on the computer networks conforms with the manufacturer’s
instruction/manual
21. Computer networks are checked to ensure safe operation.
22. Reports are prepared/completed according to company requirements.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 6 of 50
Engr. Eliseo M. Labaco
Revision # 01
SUMMARY OF LEARNING OUTCOMES

LEARNING OUTCOMES 2.1-1 Install Networks Cables


Assessment Criteria:
1. Cable routes are determined and planned in accordance with network
design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements.
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety.
4. Appropriate personal protective equipment is used and OHS
policies and procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA)
standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no
unnecessary damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 7 of 50
Engr. Eliseo M. Labaco
Revision # 01
CONTENTS:
1. Different types of Networks and topologies
2. Different Terminals and Networks connectivity
3. Tools, equipment and testing devices needed for installation
4. OHS policies and procedures
5. Types Cable Networks cables.
6. Different Network cables and cable raceway.

CONDITIONS:
1. The different types of topologies are able to identified
2. Able to set up computer networks.
3. Different cables used in computer networking are performed
4. Tools, equipment and testing materials needed to install
netwoks are properly used in accordance with OHS standards.
5. Understand Occupational Health and Safety procedures
6. Able to demostrate splicing/cabling of cables.
7. Proper installation of cables and cable raceways are being
performed correctly.
8. Faults and errors during or after installion are are diagnosed
based on the job requirements.
9. The principles underlying the 5S and waste management
program are explained well.
10. Can connect network and configure

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 8 of 50
Engr. Eliseo M. Labaco
Revision # 01
11. Trainee must be provided with the following:
a. Work place location
b. Tools
-screw drivers (assorted)
-pliers (assorted)
-whrenches
-utility software
c. Materials
-connectors
-adaptorts
-usb
-CD_ROM

d. Computer system
Complete set of working computer
-spare of all components
e. Testing devices
-multi-tester
-oscilloscope
-approriate software

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 9 of 50
Engr. Eliseo M. Labaco
Revision # 01
LEARNING EXPERIENCES

LEARNING OUTCOMES No.2


Install Networks Cables

1. Read Information Sheet No. Read the information sheet. After


2.2-1 on networks Topologies reading the learner is encourage to
answer the self-check No.2.2-1.
2. Answer the self-check Compare your answer to the answer
key No. 2.2-1
No. 2.2-1
3. ReadInformation Sheet No. Read the information sheet. After
2.2-2 on Networks Materials reading the learner is encourage to
answer the self-check No.2.2-2.
4. Answer Self-check No. 2.2-2 Compare to Answer Key No. 2.2-2
5. Read Information Sheet No. Read the information sheet. After
2.2-3on Hand tools and reading the learner is encourage to
equipment answer the self-check No.2.2-3.
6. Answer Self-check No. 2.2-3 Compare to Answer Key No. 2.2-3

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 10 of 50
Engr. Eliseo M. Labaco
Revision # 01
Learning Outcome 2 SET-UP COMPUTER CONFIGURATION

Learning Activities Special Instructions


READ and understand the Information Sheet
2.2-1A and observe NETWORK CONNECTIVITY.
Perform Task seet 2.2-1A Perform Tasksheet 2.2-1A. Ask for trainer’s
assistance and ask for feedback (Performance
Checklist 2.2-1A)

READ and understand the Information Sheet


Answer self-check guide 2.2-1B.
2.2-1B CHECK yourself by answering the Self-Check
Guide 2.2-1B. Compare your answers with the
Answer Key 2.2-2. You must answer all the
questions correctly before PERFORMING the
Operation Sheet 2.2-1B.

Evaluate your own work using the Performance


Perform Operation sheet Criteria Checklist 2.2-1C. When you are ready,
2.2-1C present your work to your trainer for final
evaluation and recording.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 11 of 50
Engr. Eliseo M. Labaco
Revision # 01
INFORMATION SHEET No. 2.1-1
Different types of Networks and topologies
Learning Objectives
After reading this information sheet, you must able to:
1. understand computer networks concepts; and
2. define different types ofnetwork topologies.

In the previous lesson, you are taught the concepts of


computer and its peripherals this time, you are introduced to the
concepts of networks. The step by step process will help you to
better understand how to create your own networrk.

Types of Network Topology

Network Topology is the schematic description of a network arrangement,


connecting various nodes (sender and receiver) through lines of connection.

BUS Topology
Bus topology is a network type in where every computer and network device is
connected to single cable.

Features of Bus Topology


1. It transmits data only in one direction.
2. Every device is connected to a single cable
Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the
network decreases.
3. Cable has a limited length.
Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 12 of 50
Engr. Eliseo M. Labaco
Revision # 01
4. It is slower than the ring topology.

RING Topology
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbours
for each device.

Features of Ring Topology


1. A number of repeaters are used and the transmission is
unidirectional.
2. Date is transferred in a sequential manner that is bit by bit.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more
nodes, as only the nodes having tokens can transmit data.
2. Cheap to install and expand
Disadvantages of Ring Topology
1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network activity.
3. Failure of one computer disturbs the whole network.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 13 of 50
Engr. Eliseo M. Labaco
Revision # 01
STAR Topology
In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the
central node.

Features of Star Topology


1. Every node has its own dedicated connection to the hub.
2. Acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages of Star Topology
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed rest of the nodes can work
smoothly.
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub is affected then the whole network is stopped because all
the nodes depend on the hub.
4. Performance is based on the hub that is it depends on its capacity

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 14 of 50
Engr. Eliseo M. Labaco
Revision # 01
MESH Topology
It is a point-to-point connection to other nodes or devices. Traffic is carried only
between two devices or nodes to which it is connected. Mesh has n (n-2)/2 physical
channels to link hn devices.

Types of Mesh Topology


1. Partial Mesh Topology : In this topology some of the systems are
connected in the same fashion as mesh topology but some devices are
only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected
to each other.
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
Disadvantages of Mesh Topology
1. Installation and configuration is difficult.
2. Cabling cost is more.
3. Bulk wiring is required.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 15 of 50
Engr. Eliseo M. Labaco
Revision # 01
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the
hierarchy.

Features of Tree Topology


1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
4. Error detection is easily done.
Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 16 of 50
Engr. Eliseo M. Labaco
Revision # 01
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another
star topology is used, connecting these topologies will result in Hybrid Topology
(ring topology and star topology).

Features of Hybrid Topology


1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
1. Reliable as Error detecting and trouble shooting is easy.
2. Effective.
3. Scalable as size can be increased easily.
4. Flexible.
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 17 of 50
Engr. Eliseo M. Labaco
Revision # 01
SELFCHECK 2.1-1
TEST 1IDENTIFICATION:
1. Identify/enumerate the different network topologies.
2. Design your own network topologies.

TEST II PROBLEM SOLVING ACTIVITY


SITUATION:
Your team is in charge of telecommunication and
networking at a rapidly expanding manufacturing company. The
company is building new manufacturing facilities in IRELAND,
SINGAPORE, and MEXICO to go along with three plants in the
PHILIPPINES (Laguna, Cebu, Manila). The CEO wants a plan to
upgrade the corporate network.
Develop a plan for the upgrade, to include your proposed type and
topology of the network. Be sure to address the networks across the
enterprise as well as networks inside the new plants.
TEST II1 FILL IN THE BLANK
1. The collection and distribution of electronic representation of
information between two points is called ____________________.
2. __________________ is collection of information between two or more
entities.
3. A communication device in the same building is _________________.
4. Physical path by which a message travels from sender to the receiver.
5. Transmission media consisting of strands of insulated copper wire is
called_________________.
6. First used by Cable Television Company in data transmission is a
___________________.
7. Fiber optic media transmit data as pulses of______________, up to
2.5Gbs.
8. A ___________________ acts as relay station for the earth station by
receiving data, amplify it, and then retransmitting it to another earth
station.
9. The media that transmit data as high frequency radio
waves._______________

10.Interconnection of computer around the globe is called__________________

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 18 of 50
Engr. Eliseo M. Labaco
Revision # 01
ANSWER KEY 2.1-1

TEST I ENUMERATION

1. Ring topology
2. Star topology
3. Bus topology
4. Mesh topology
5. Tree topology
6. Hybrid topology

TEST II PROBLEM SOLVING


Possible answer is based on the design and discresion of the trainer
but based on the information sheet 2.1lecture.

TEST1II IDENTIFICATION
1. DATA COMMUNICATION
2. TELECOMMUNICATION
3. LOCAL COMMUNICATION
4. MEDIUM
5. TWISTED PAIR WIRE
6. COAXIAL CABLE
7. LIGHT
8. TRANSMITER
9. HIGH FREQUENCY
10. Networks/ internet

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 19 of 50
Engr. Eliseo M. Labaco
Revision # 01
TASK SHEET 2.1-1
TITLE: Design a Network topology
Performance Objective:
Reading the information sheet 2.1-1, you are assigned to make
your own type of network and design your topology. This is to familiar
your knowledege how to identify and differentiate network

sSupplies: mock-up network, internet, network cables, tools


Equipment: computer sets, router, hub or switch
Sterps/procedure:
1. On a piece of paper, draw a type of network
2. Design a kind of topology
3. Using the mock up model, connect the given set of computer,
equipment based on your own design.
4. Preset your work to your trainer.
Assessment Criteria: performance Checklist

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 20 of 50
Engr. Eliseo M. Labaco
Revision # 01
Performance Checklist 2.1-1

CRITERIA
Did the trainee perform the following? Yes No
1. Be able to draw a network
2. Perform to design a kind of topology
3. Copied the mock-up network and connect
the computer and equipment according to
his design.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 21 of 50
Engr. Eliseo M. Labaco
Revision # 01
INFORMATION SHEET No. 2.1-2
Different Terminals and Networks connectivity
Learning Objectives
After reading this information sheet, you must be able to;
1. determine different network connectivity and;
2. uses of different network devices.

This information teaches you to understand network


connectivity using different network devices. Understand the
functions and uses of devifferent divices.

Network Devices

A router is a device that forwards data packets along networks. A router is


connected to at least two networks, commonly two LANs or WANs or a LAN and
its ISP's network. Routers are located at gateways, the places where two or more
networks connect.

Routers use headers and forwarding tables to determine the best path for
forwarding the packets, and they use protocols such as ICMP to communicate with
each other and configure the best route between any two hosts.

Switch in networks, a device that filters and forwards packets between LAN
segments. Switches operate at the data link layer (layer 2) and sometimes the
network layer (layer 3) of the OSI Reference Model and therefore support any
packet protocol. LANs that use switches to join segments are called switched
LANs or, in the case of Ethernet networks, switched Ethernet LANs.

A small lever or button. The switches on the back of printers and on expansion
boards are called DIP switches. A switch that has just two positions is called
a toggle switch.

Another word for option or parameter -- a symbol that you add to a command to
modify the command's behaviour.

A hub is a common connection point for devices in a network. Hubs are


commonly used to connect segments of a LAN. A hub contains
multiple ports. When a packet arrives at one port, it is copied to the other
ports so that all segments of the LAN can see all packets.

Hubs and switches serve as a central connection for all of your network equipment
and handles a data type known as frames. Frames carry your data. When a frame
is received, it is amplified and then transmitted on to the port of the destination
PC.
Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 22 of 50
Engr. Eliseo M. Labaco
Revision # 01
In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't
matter that the frame is only destined for one port. The hub has no way of
distinguishing which port a frame should be sent to. Passing it along to every port
ensures that it will reach its intended destination. This places a lot of traffic on the
network and can lead to poor network response times.

Repeater is a network device used to regenerate or replicate a signal. Repeaters are


used in transmission systems to regenerate analog or digital signals distorted by
transmission loss. Analog repeaters frequently can only amplify the signal while
digital repeaters can reconstruct a signal to near its original quality.

In a data network, a repeater can relay messages between subnetworks that use
different protocols or cable types. Hubs can operate as repeaters by relaying
messages to all connected computers. A repeater cannot do the
intelligent routing performed by bridges and routers.

Bridge is a device that connects two local-area networks (LANs), or two


segments of the same LAN that use the same protocol, such as
Ethernet or Token-Ring.

IP Addressing

An Internet Protocol address (IP address) is a numerical label assigned to


each device (e.g., computer, printer) participating in a computer network that uses
the Internet Protocol for communication. An IP address serves two principal
functions: host or network interface identification and location addressing. Its role
has been characterized as follows: "A name indicates what we seek. An address
indicates where it is. A route indicates how to get there."
The designers of the Internet Protocol defined an IP address as a 32-
bit number and this system, known as Internet Protocol Version 4 (IPv4), is still in
use today. However, because of the growth of the Internetand the
predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits
for the address, was developed in 1995. IPv6 was standardized as RFC 2460 in
1998, and its deployment has been ongoing since the mid-2000s.

IP addresses are usually written and displayed in human-


readable notations, such as 172.16.254.1 (IPv4), and 2001:db8:0:1234:0:567:8:1
(IPv6).

The Internet Assigned Numbers Authority (IANA) manages the IP address


space allocations globally and delegates five regional Internet registries (RIRs) to
allocate IP address blocks to local Internet registries(Internet service providers) and
other entities.

Subnetting

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 23 of 50
Engr. Eliseo M. Labaco
Revision # 01
In the early stages of development of the Internet Protocol, network
administrators interpreted an IP address in two parts: network number portion and
host number portion. The highest order octet (most significant eight bits) in an
address was designated as the network number and the remaining bits were called
the rest field or host identifier and were used for host numbering within a network.
This early method soon proved inadequate as additional networks developed
that were independent of the existing networks already designated by a network
number. In 1981, the Internet addressing specification was revised with the
introduction of classful network architecture.
Classful network design allowed for a larger number of individual network
assignments and fine-grained subnetwork design. The first three bits of the most
significant octet of an IP address were defined as the class of the address. Three
classes (A, B, and C) were defined for universal unicast addressing. Depending on
the class derived, the network identification was based on octet boundary segments
of the entire address. Each class used successively additional octets in the network
identifier, thus reducing the possible number of hosts in the higher order classes
(B and C). The following table gives an overview of this now obsolete system.

Historical classful network architecture

Size Size Numbe


Address
Leadi of netwo of re r Start
Clas es
ng rk st of addres End address
s per
bits number bit networ s
network
bit field field ks

16,777,2 127.255.255.
A 0 8 24 128 (27) 0.0.0.0
16 (224) 255

16,384 65,536 128.0.0 191.255.255.


B 10 16 16
(214) (216) .0 255

2,097,1 192.0.0 223.255.255.


C 110 24 8 256 (28)
52 (221) .0 255

Classful network design served its purpose in the startup stage of the
Internet, but it lacked scalability in the face of the rapid expansion of the network
in the 1990s. The class system of the address space was replaced with Classless
Inter-Domain Routing (CIDR) in 1993. CIDR is based on variable-length subnet
masking (VLSM) to allow allocation and routing based on arbitrary-length prefixes.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 24 of 50
Engr. Eliseo M. Labaco
Revision # 01
Self Check 2.1-2
Test I Identification
Directions: March Column A to Column B, Choose the letter of the correct
answer and put it on the space porovided.
1. A device that forwards data packets along networks.
2. A device that filters and forwards packets between LAN segments.
3. Is a common connection point for devices in a network
4. A network device used to regenerate or replicate a signal.
5. Is a device that connects two local-area networks (LANs), or two
segments of the same LAN that use the same protocol.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 25 of 50
Engr. Eliseo M. Labaco
Revision # 01
Answwer key 2.1-2

1. Routher
2. Bridge
3. Hub,swhitch
4. Repeater
5. bridge

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 26 of 50
Engr. Eliseo M. Labaco
Revision # 01
INFORMATION SHEET 2.1-3
Tools, equipment and testing devices needed for installation.

Learning Objectives:

At the end of the session, you will be able to:

1. Define different tools, equipment and testing devices in network


congiuration;
2. Identify network tools , equipment and testing devices and;
3. Explain the function and uses of each tools , equipment and testing
devices

TOOLS, EQUIPMENT AND TESTING DEVICES

Eye protection is protective gear for the eyes, which


comes in many types depending upon the threat that is
to be reduced. The threats can be particles, light, wind
blast, heat, sea spray or some type
of ball or puck used in sports.
A multimeter or a multitester, also known as a VOM
(Volt-Ohm meter or Volt-Ohm-milliammeter ), is an electronic measuring
instrument that combines several measurement functions in one unit. A
typical multimeter can measure voltage, current, and resistance. Analog
multimeters use a microammeter with a moving pointer to display readings.
Digital multimeters (DMM, DVOM) have a numeric display, and may also
show a graphical bar representing the measured value. Digital multimeters
are now far more common but analog multimeters are still preferable in
some cases, for example when monitoring a rapidly varying value.

A multimeter can be a hand-held device useful for


basic fault finding and field service work, or a bench
instrument which can measure to a very high degree of
accuracy. They can be used to troubleshoot electrical
problems in a wide array of industrial and household
devices such as electronic equipment, motor controls,
domestic appliances, power supplies, and wiring
systems.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 27 of 50
Engr. Eliseo M. Labaco
Revision # 01
A multimeter or a multitester, also known as a VOM
(Volt-Ohm meter or Volt-Ohm-milliammeter ), is an
electronic measuring instrument that combines several
measurement functions in one unit. A typical multimeter
can measure voltage, current, and resistance. Analog
multimeters use a microammeter with a moving pointer to
display readings. Digital multimeters (DMM, DVOM) have
a numeric display, and may also show a graphical bar representing the
measured value. Digital multimeters are now far more common but analog
multimeters are still preferable in some cases, for example when monitoring
a rapidly varying value.

Antistatic wrist strap


An antistatic wrist strap with crocodile clip.

An antistatic wrist strap, ESD wrist strap, or ground


bracelet is an antistatic device used to safely ground a
person working on very sensitive electronic equipment, to
prevent the buildup of static electricity on their body,
which can result in electrostatic discharge (ESD).

A punch down tool, also called a punchdown tool or a


krone tool (named after the KRONE LSA-PLUS connector),
is a small hand tool used by telecommunication and
network technicians. It is used for inserting wire into
insulation-displacement connectors on punch down
blocks, patch panels, keystone modules, and surface
mount boxes (also known as biscuit jacks).

A screwdriver is a tool, manual or


powered, for turning (driving or removing)
screws. A typical simple screwdriver has a
handle and a shaft, and a tip that the
user inserts into the screw head to turn

A cable tester is an electronic device used to verify the


electrical connections in a cable or other wired assembly.
Generally a cable tester consists of:
Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 28 of 50
Engr. Eliseo M. Labaco
Revision # 01
A source of electric current,A volt meter,A switching matrix used to connect
the current source and the voltmeter to all of the contact points in a cable.

Crimping pliers for RJ45 and RJ11RJ14 socket connectors,


Typically, the metals are joined together via a special
connector. Stripped wire (often stranded) is inserted through
the correctly sized opening of the connector, and a crimper is
used to tightly squeeze the opening against the wire.
Depending on the type of connector used, it may be attached
to a metal plate by a separate screw or bolt or it could be
simply screwed on using the connector itself to make the
attachment like an F connector.

SELFCHECK 2.1-3

TEST I IDENTIFICATION/ENUMERATION
1. Find out/ or Enumerate correct usage of tools
Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 29 of 50
Engr. Eliseo M. Labaco
Revision # 01
2. Identify tools and equipment
3. Identify testing devices

ANSWER KEY 2.1-3

TEST I IDENTIFICATION/ENUMERATION
1. CRIMPIng tool

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 30 of 50
Engr. Eliseo M. Labaco
Revision # 01
2. Wire stripper
3. LAN tester
4. Wire cutter

EQUIPMENT
Desktop Computer
Laptop computer/Netbook
Computers for server
Server cabinet/Frame
Patch panel (48-ports)

MATERIALS
RJ 45
Modular box (RJ45)
Raceway or Slotted PVC 1.5” x 1.5” x 48”
UTP cable
Contact cleaner
Whiteboard
Fastener
Filler (lead-free)
Fiber optic cable 2 meters (terminated)

Information Sheet 2.1-4


OHS policies and procedures

Learning Objectives

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 31 of 50
Engr. Eliseo M. Labaco
Revision # 01
At after reading this information, you must be able to understrand the
following:
1. Define the concepts of OHS and;
2. Proper uses of protective PPE

The knowledge in Occupatiotional Health and Safety allows you to


follow the set standard for proper handling of riks and hazards. The
knowledge in this ,information will keep you inline to the set safety
standards set forth in the inbsdustry.

OCCUPATIONAL HEALTH AND SAFETY


Occupational safety and health (OSH) also commonly referred to as
occupational health and safety (OHS) or workplace health and safety (WHS)
is an area concerned with the safety, health and welfare of people engaged in
work or employment. The goals of occupational safety and health programs
include to foster a safe and healthy work environment.[1] OSH may also
protect co-workers, family members, employers, customers, and many
others who might be affected by the workplace environment. In the United
States the term occupational health and safety is referred to as occupational
health and occupational and non-occupational safety and includes safety for
activities outside work.

In common-law jurisdictions, employers have a common law duty to take


reasonable care for the safety of their employees.[3] Statute law may build
upon this to impose additional general duties, introduce specific duties and
create government bodies with powers to regulate workplace safety issues:
details of this will vary from jurisdiction to jurisdiction.

As defined by the World Health Organization (WHO) "occupational


health deals with all aspects of health and safety in the workplace and has a
strong focus on primary prevention of hazards."[4] Health has been defined
as "a state of complete physical, mental and social well-being and not merely
the absence of disease or infirmity."[5] Occupational health is a
multidisciplinary field of healthcare concerned with enabling an individual
to undertake their occupation, in the way that causes least harm to their
health. Health has been defined as It contrasts, for example, with the
promotion of health and safety at work, which is concerned with preventing
harm from any incidental hazards, arising in the workplace.

Since 1950, the International Labour Organization (ILO) and the


World Health Organization (WHO) have shared a common definition of
occupational health. It was adopted by the Joint ILO/WHO Committee on
Occupational Health at its first session in 1950 and revised at its twelfth
session in 1995. The definition reads:
Self Check 2.1-4

Test 1 Answer/Identify what is being ask


Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 32 of 50
Engr. Eliseo M. Labaco
Revision # 01
1. Proper use of OHS

Guidelines:
a. Employer assures that employee uses eye or face protection from
hazards:
b. Flying particles
c. Molten metal
d. Liquid chemicals, acids or caustic liquids
e. Chemical gases or vapors
f. Potentially injurious light radiation

2. Proper uses on the following


a. Eye protection
b. Hand protection
c. Foot protection and’
d. Body/ head protection

3. Identify Protective equipment


a. Eye glasses/goggle
b. Antistatic wrist wrap
c. Antistatic mat
d. Helmet
e. Shoes

ANSWER KEY 2.1-4

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 33 of 50
Engr. Eliseo M. Labaco
Revision # 01
1. Proper use of OHS
Guidelines:
a. Employer assures that employee uses eye or face protection from
hazards:
b. Flying particles
c. Molten metal
d. Liquid chemicals, acids or caustic liquids
e. Chemical gases or vapors
f. Potentially injurious light radiation

2. Proper uses on the following


e. Eye protection
f. Hand protection
g. Foot protection and’
h. Body/ head protection

3. Identify Protective equipment


a. Eye glasses/goggle
b. Antistatic wrist wrap
c. Antistatic mat
d. Helmet
e. Shoes

Information Sheet 2.1-5a


Network cables & cable raceway
Learning Onbjective

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 34 of 50
Engr. Eliseo M. Labaco
Revision # 01
After studying this information , you must be able to identify
the perform the the following:
1. Identify different network raceways and;
2. Perform cabling connectivity.

Organize, conceal, store, route and protect copper and fiber


structured cabling with ICC's raceway products. Available in three of our
most popular sizes (3/4", 1 1/4" and 1 3/4"), two length straight sections (6'
and 8'), in bulk packs or individual packs and in white and ivory. They are
incorporated with a one-piece latching system, and an adhesive back design
to speed up installations. Additional connecting accessories are available.
Our wiring ducts are designed to accommodate large cable volumes
consisting of two styles (slotted and solid wall), and are available in two sizes
(2"x 2" & 2" x 4"), both slotted and solid wall wiring ducts measure 6'
straight, and can be cut to size. Available in white, gray and black.

Raceway Mounting Boxes Wiring Ducts Raceway & Fittings

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 35 of 50
Engr. Eliseo M. Labaco
Revision # 01
TASK SHEET No. 2.1-5a
Network cables & raceways
Learning Outcome: Network cables installation
Task: configure the networks
Learning Objective: at the of this activity the trainee will able to configure
networks and fixed cables and raceways.
TIme Alloted: 2.5 hrs
Materials and Equipment needed:
 Computer set
 UTP cable, RJ45, Crimper, Wire Stripper, Hub/switch, LAN tester

STEPS:
1. Perform Occupational Health and Safety Procedure and Policies.
2. Prepare the materials and handtools need for network cabling.
3. Cut the UTP cable on a desired length.
4. Strip the outer covering of the cable.
5. Untwist the cable pair.
6. Arrange the cable using the color coding below:
a. EIA-TIA 568A – White Green/Green/White Orange/Blue/White
Blue/Orange/ White Brown/Brown
b. EIA-TIA 568B – White Orange/Orange/White
Green/Blue/White Blue/Green/White Brown/Brown
7. Trim the cable.
8. Insert the cables inside the Modular Plug (RJ45 Connector)
9. Crimp the RJ45 To lock the cables
10. Test your cable using LAN Tester

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 36 of 50
Engr. Eliseo M. Labaco
Revision # 01
Performance Citeria checklist 2.1-5a

Did the trainee perform the following… YES NO


1. Perform Occupational Health and Safety Procedure and
Policies.
2. Prepare all the materials needed for cabling.
3. Arrange the proper color coding
(Straight-thru/Crossover)
4. Crimp the cable snugly.
5. Test the cable

Over-all performance rating: ( ) Competent ( ) Not Yet Competent


Rating: _____________

Performed by: Checked by:

_______________________________
_______________________________
Date: ________________________ Date:
________________________

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 37 of 50
Engr. Eliseo M. Labaco
Revision # 01
TASK SHEET No. 2.1.5b
Preparing Network Cable (Modular Box and Patch Panel)
Learning Outcome: installation of modular box and patch panel
Task: to create network cables and install modular box and patch panel
Learning Objective: at the end of the task, the trainee will able to create a
network cable- standard cable and crossover and install modular box and
patch panel.
TIme Alloted: 2.5 hrs
Materials and Equipment needed:
 UTP Cable, RJ45, Modular box, Patch panel, punch tool

STEPS:
1. Perform Occupational Health and Safety Procedure and Policies.
2. Prepare the materials and hand tools need for network cabling.
3. Connector the Modular Plug (RJ45) at one end of the cable. Refer to
Task Sheet 1.
4. Connect the other end at the Patch Panel (a) or Modular Box (b).
(a) Patch Panel
- Strip the outer covering of the cable
- Arrange the wires according to its proper color coding
based on the color coding which you have done on your
RJ45. (Straight-thru connection)

A – white blue / blue / white green / green / white orange / orange /


white brown / brown
B – white blue / blue / white orange / orange / white green / green /
white brown / brown

(b) Modular Box


- Strip the outer covering of the cable
- Arrange the wires according to its proper color coding
based on the color coding which you have done on your
RJ45. (Straight-thru connection)

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 38 of 50
Engr. Eliseo M. Labaco
Revision # 01
1 8
2 7
3 6
4 5

Note: Follow the standard color coding for the RJ45 Connector. Simply
connect the cables just like the numbers are arranged in the figure above.

1.1 Setting-up your computer network system

Specific Instructions
1. Follow the diagram on how to set up your network.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 39 of 50
Engr. Eliseo M. Labaco
Revision # 01
Performance checklist Criteria 2.1-6

Did the trainee perform the following… YES NO


1. Perform Occupational Health and Safety Procedure and
Policies.
2. Prepare all the necessary materials needed for setting-up
a computer network.
3. Arrange the proper color coding on the Patch Panel and
Modular Box
4. Follow the network diagram presented.
5. Test the network connections.

Over-all performance rating: ( ) Competent ( ) Not Yet Competent


Rating: _____________

Performed by: Checked by:

_______________________________
_______________________________
Date: ________________________ Date:
________________________

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 40 of 50
Engr. Eliseo M. Labaco
Revision # 01
INFORMATION SHEET No. 2.2-1A
Networks congifuration (wireles/P2P), File sharing and Printer sharing
Learning Objectives
At the end of this information, you must be able to:
1. Understand wireless network and;
2. Perform simple printer and file sharing and;
3. Configure wireless networks.

Wireless networking is a method by which


homes, telecommunications networks and enterprise (business) installations
avoid the costly process of introducing cables into a building, or as a
connection between various equipment
locations. Wireless telecommunications networks are generally implemented
and administered using radio communication. This implementation takes
place at the physical level (layer) of the OSI model network structure.

Wireless Networking
A wireless network is any type of computer network that uses
wireless data connections for connecting network nodes.

Examples of wireless networks include cell phone networks, Wi-Fi local


networks and terrestrial microwave networks.

Wireless PAN
Wireless personal area networks (WPANs) interconnect devices within a
relatively small area, which is generally within a person's reach. For
example, both Bluetooth radio and invisible infrared light provides a WPAN
for interconnecting a headset to a laptop. ZigBee also supports WPAN
applications. Wi-Fi PANs are becoming commonplace (2010) as equipment
designers start to integrate Wi-Fi into a variety of consumer electronic
devices. Intel "My WiFi" and Windows 7 "virtual Wi-Fi" capabilities have
made Wi-Fi PANs simpler and easier to set up and configure.
Wireless LAN
Wireless LANs are often used for connecting to local resources and to the
Internet.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 41 of 50
Engr. Eliseo M. Labaco
Revision # 01
A wireless local area network (WLAN) links two or more devices over a short
distance using a wireless distribution method, usually providing a
connection through an access point for internet access. The use of spread-
spectrum or OFDM technologies may allow users to move around within a
local coverage area, and still remain connected to the network.

Products using the IEEE 802.11 WLAN standards are marketed under
the Wi-Fi brand name. Fixed wireless technology implements point-to-
point links between computers or networks at two distant locations, often
using dedicated microwave or modulated laser light beams over line of
sight paths. It is often used in cities to connect networks in two or more
buildings without installing a wired link.

Wireless mesh network

A wireless mesh network is a wireless network made up of radio nodes


organized in a mesh topology. Each node forwards messages on behalf of the
other nodes. Mesh networks can "self-heal", automatically re-routing around
a node that has lost power.

Wireless MAN

Wireless metropolitan area networks are a type of wireless network that


connects several wireless LANs.
 WiMAX is a type of Wireless MAN and is described by the IEEE
802.16 standard.

Wireless WAN

Wireless wide area networks are wireless networks that typically cover large
areas, such as between neighbouring towns and cities, or city and suburb.
These networks can be used to connect branch offices of business or as a
public internet access system. The wireless connections between access
points are usually point to point microwave links using parabolic dishes on
the 2.4 GHz band, rather than omnidirectional antennas used with smaller
networks. A typical system contains base station gateways, access points
and wireless bridging relays. Other configurations are mesh systems where
each access point acts as a relay also. When combined with renewable
energy systems such as photovoltaic solar panels or wind systems they can
be stand alone systems.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 42 of 50
Engr. Eliseo M. Labaco
Revision # 01
Global area network
A global area network (GAN) is a network used for supporting mobile across
an arbitrary number of wireless LANs, satellite coverage areas, etc. The key
challenge in mobile communications is handing off user communications
from one local coverage area to the next. In IEEE Project 802, this involves a
succession of terrestrial wireless LANs.
Space network
Space networks are networks used for communication between spacecraft,
usually in the vicinity of the Earth. The example of this is NASA's Space
Network.

Wireless Network Elements


The telecommunications network at the physical layer also consists of many
interconnected wireline Network Elements (NEs). These NEs can be stand-
alone systems or products that are either supplied by a single manufacturer
or are assembled by the service provider (user) or system integrator with
parts from several different manufacturers.

Wireless NEs are the products and devices used by a wireless carrier to
provide support for the backhaul network as well as a Mobile Switching
Center (MSC).

Reliable wireless service depends on the network elements at the physical


layer to be protected against all operational environments and applications
(see GR-3171, Generic Requirements for Network Elements Used in Wireless
Networks – Physical Layer Criteria).

What are especially important are the NEs that are located on the cell tower
to the Base Station (BS) cabinet. The attachment hardware and the
positioning of the antenna and associated closures/cables are required to
have adequate strength, robustness, corrosion resistance, and rain/solar
resistance for expected wind, storm, ice, and other weather conditions.
Requirements for individual components, such as hardware, cables,
connectors, and closures, shall take into consideration the structure to
which they are attached.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 43 of 50
Engr. Eliseo M. Labaco
Revision # 01
Difficulties
 Interferences
Compared to wired systems, wireless networks are frequently subject
to electromagnetic interference. This can be caused by other networks or
other types of equipment that generate radio waves that are within, or close,
to the radio bands used for communication. Interference can degrade the
signal or cause the system to fail.

 Absorption and reflection


Some materials cause absorption of electromagnetic waves, preventing it
from reaching the receiver, in other cases, particularly with metallic or
conductive materials reflection occurs. This can cause dead zones where no
reception is available. Aluminium foiled thermal isolation in modern homes
can easily reduce indoor mobile signals by 10 dB frequently leading to
complaints about the bad reception of long-distance rural cell signals.
 Multipath fading
In multipath fading two or more different routes taken by the signal, due to
reflections, can cause the signal to cancel out at certain locations, and to be
stronger in other places (upfade).

 Hidden node problem


The hidden node problem occurs in some types of network when a node is
visible from a wireless access point (AP), but not from other nodes
communicating with that AP. This leads to difficulties in media access
control.

 Shared resource problem


The wireless spectrum is a limited resource and shared by all nodes in the
range of its transmitters. Bandwidth allocation becomes complex with
multiple participating users. Often users are not aware that advertised
numbers (e.g., for IEEE 802.11 equipment or LTE networks) are not their
capacity, but shared with all other users and thus the individual user rate is
far lower. With increasing demand, the capacity crunch is more and more
likely to happen. User-in-the-loop (UIL) may be an alternative solution to
ever upgrading to newer technologies for over-provisioning.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 44 of 50
Engr. Eliseo M. Labaco
Revision # 01
TASK SHEET No. 2.2-1A
Computer Network Configuration Setup
PART ONE
Learning Outcome: configuring and setting up computer networks
Task: to configure the networks
Learning Objective: at the end of this task the trainee will able to congifure
networks.
TIme Alloted: 30min
Materials and Equipment needed:
 Computer set

Steps:
Step 1: Connect your cable from the switch to your PC.
Step 2: Set up Security Settings
 Disable your antivirus (if there is a strict antivirus program installed
in your computer).
 Click start menu and go to control panel.
 Select System and Security, then select Windows Firewall.
 Turn your windows firewall off for both private and public networks.
Step 3: Set up your IP Address
 Click start menu and go to control panel
 Go to Network and Internet and select Network and Sharing Center
 Select Change Adapter Setting
o Be sure that this components are installed
 QoS Packet Scheduler
 File and Printer Sharing Services
 Client for Microsoft Networks
 Internet Protocol (IPV4)
 Disable your Internet Protocol Version 6 (IPV6)
 Choose Internet Protocol (IPV4) and select properties
 Write your Static IP on the field together with its subnet mask
 Click OK and then close the windows

Step 4: Setup Computer Configuration


 Click Start Menu and right-click on Computer
 Go to change settings
 Click “Change” to change the Computer Name and Workgroup Name.
 Click OK and restart your computer.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 45 of 50
Engr. Eliseo M. Labaco
Revision # 01
TASK SHEET 2.2.1B
FILE SHARING
PART TWO
Learning Outcome: file sharing
Task: to share a folder or document to the client or server
Learning Objective:
TIme Alloted: 30 min
Materials and Equipment needed:
 Computer set
STEPS:
Step 1: Create your folder on the desktop
Step 2: Right-click on your folder and choose properties
Step 3: Click “SHARE”
 On the drop-down box; select Everyone then Add
 Choose Read and Write
 Click OK
Step 4: Select “advance sharing”
 Tick the box “share this folder”
 Click OK

PART THREE: PRINTER SHARING

Step 1: Go to start menu and select to Control Panel

Step 2: Select Devices and Printers

Step 3: Choose “add a printer” and follow the instructions prompted in


the wizard
 Note: Sharing of printer is already included in the wizard and print a
test page.

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 46 of 50
Engr. Eliseo M. Labaco
Revision # 01
Did the trainee perform the following... YES NO
1. Perform Occupational Health and Safety Procedure and
Policies.
2. Installed the LAN Driver.
3. Configure the Security Settings of Computer.
4. Set the IPV4 of the Computer.
5. Change the Computer Name and Computer Work Group
Name.
6. Perform File Sharing.
7. Install and Perform Printer Sharing.
8. Test the network connections.

Over-all performance rating: ( ) Competent ( ) Not Yet Competent


Rating: _____________

Performed by: Checked by:

_______________________________
_______________________________
Date: ________________________ Date:
________________________

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 47 of 50
Engr. Eliseo M. Labaco
Revision # 01
TASK SHEET No. 2.2-1C
Wireless Router Configuration
Learning Outcome: configuring and setting up computer networks
Task: to configure the networks
Learning Objective:
TIme Alloted: 2.5 hrs
Materials and Equipment needed:
 Computer set
STEPS:
Step 1: Using your cable, connect the router to your computer.
Step 2: Open any internet browser and type in the default IP Address of
your router which can be found at the sticker placed under the
router.
Step 3: Read the Instructions carefully; if prompted with password and
username, used “admin” as username and “admin” as
password.
Step 4: Browse and explore the entire interface and look for any setup
that can be configured (wireless setup), like;
 SSID or Router name
 Password
 MAC Address, etc.

Did the trainee perform the following... YES NO


Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 48 of 50
Engr. Eliseo M. Labaco
Revision # 01
1. Perform Occupational Health and Safety Procedure and
Policies.
2. Prepare a Straight-Thru cable.
3. Connect the cable to the router.
4. Open the router configuration window interface through a
browser.
5. Change the SSID or Router Name.
6. Change the password.
7. Allow or block the MAC Address.
8. Test the network connections.

Over-all performance rating: ( ) Competent ( ) Not Yet Competent


Rating: _____________
Performed by:___________________ Checked by:___________________

Date:_________________ Date: ____________________

Bibliography
Date Developed: Document No.
May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 49 of 50
Engr. Eliseo M. Labaco
Revision # 01
Training Regulation developed by TESDA.

Competency Base Curriculum developed by TESDA.

Electronic Sources:
1. http://ccs.exl.info/electric.html
2. http://hassam.hubpages.com
3. http://home.olemiss.edu/~misbook/sfapsfm.htm
4. http://www.180techtips.com
5. http://www.computerhope.com/os.htm
6. http://www.computerhope.com/os.htm
7. http://www.computerhope.com/wince.htm#01
8. http://www.ehow.com/how
9. http://www.google.com.ph/search?um=1&hl=en&biw=1280&bih=619
&tbm=isch&sa=1&q=application+software&oq=application+s&gswww.
coretechnica.com%252Fproducts.html%3B904%3B742
10. http://www.sciencedaily.com

Date Developed: Document No.


May 2016
Computer
Systems Issued by: Page
Servicing NC II Developed by: 50 of 50
Engr. Eliseo M. Labaco
Revision # 01

You might also like