Setup Computer Networks
Setup Computer Networks
(CBLM)
Characteristics of Learners
1
Cultural and Ethnicity / culture:
language a. Ifugao
background b. Igorot
c. Ibanag
d. Gaddang
e. Muslim
f. Ibaloy
g. Others (please specify) _______________
Education & Highest Educational Attainment:
general a. High School Level
knowledge b. High School Graduate
c. College Level
d. College Graduate
e. with units in Master’s degree
f. Masteral Degree
g. With units in Doctoral Level
h. Doctoral Graduate
Sex a. Male
b. Female
2
Special courses Other courses related to Programming NCIV
a. BS Computer Science
b. BS Information Technology
c. Others (please
specify)______________________
Learning Styles a. Visual – The visual learner takes mental
pictures of information given, so in order for
this kind of learner to retain information, oral or
written, presentations of new information must
contain diagrams and drawings, preferably in
color. The visual learner can concentrate with a
lot of activity around him and will focus better
and learn faster in quiet study environment.
b. Kinesthetic – described as the students in the
classroom, who have problems sitting still and
who often bounce their legs while tapping their
fingers on the desks. They are often referred to
as hyperactive students with concentration
issues.
c. Auditory – a learner who has the ability to
remember speeches and lectures in detail but
has a hard time with written text. Having to
read long texts is pointless and will not be
retained by the auditory learner unless it is
read aloud.
d. Activist – learns by having a go.
e. Reflector – learns most from activities where
they can watch listen and then review what has
happened.
f. Theorist – Learns most when ideas are linked
to existing theories and concepts.
g. Pragmatist – Learns most from learning
activities that are directly relevant to their
situation.
Other needs a. Financially challenged
b. Working student
c. Solo parent
d. Others (please specify)
_______________________
3
In this module, you (students) are required to go through a series of learning
activities in order to complete the learning outcome. There are information sheets, self-
check sheets, job sheet and operation sheets that cover the learning outcome. Follow the
activities on your own and answer the self-check at the end of each learning activity.
If you have questions, don’t hesitate to ask your teacher for assistance.
The main objective of this module is to develop your practical skills. And to gain these skills,
you must learn basic concepts and terminology. For most part you’ll get this information from
the information sheets.
This module is prepared to help you achieve the LO1- Assemble a Computer of the Unit of
Competency – Install and Configure Computer Systems and Networks as a required
competency in Computer Systems Servicing NC II.
This will be the source of information for you to acquire knowledge and skills in this particular
competency independently and at your own pace, with minimum supervision or help from
your instructor/teacher.
Remember to:
Work through all the information and complete the activities in each section.Read information
sheets and complete the self-check. Suggested references are included to supplement the
materials provided in this module. Most probably your trainer will also be your supervisor or
manager. He/she is there to support you and show you the correct way to do things.You will
be given plenty of opportunities to ask questions and practice on the job. Make sure you
practice your new skills during regular work shift in order for you to improve both your speed
and memory and also your confidence.
All the learning activities are designed for you to complete at your own pace. Use the
Self-checks, Operation Sheets or Job Sheets at the end of each section to test your own
progress.
You may already have some of the knowledge and skills covered in this module because you
have been working for some time or completed training in this area.If you can demonstrate to
your teacher that you are competent in a particular skill or skills, talk to him/her about having
them formally recognized so you don’t have to do the same training again. If you have a
qualification or Certificate of Competency from previous trainings show it to your teacher. If
the skills you acquired are still current and relevant to this module, they may become part of
the evidence you can present for RPL. If you are not sure about the currency of your skills,
discuss it with your teacher.
When you feel confident that you have had sufficient practice, ask your Trainer to
evaluate you to assess your competency. The results of your assessment will be recorded in
your Progress Chart and Achievement Chart. Below is the list of CSS NCII Competencies and
you are about the start knowing the first learning outcome of the unit of competency no.1,
Assemble a Computer.
4
COMPUTER SYSTEMS SERVICING NC II
List of Competencies
CONTENTS:
1. Occupational health and safety policies and procedures
2. 5S and 3Rs environmental policies
3. Networking Fundamentals
4. Tools, equipment and testing devices
5. Configuring computer networks
5
ASSESSMENT CRITERIA:
Planned and prepared unit assembly to ensure OHS policies and
procedures are followed in accordance with systems requirements.
Identified and obtained materials necessary to complete the work in
accordance with the established procedures and checked against
systems requirements.
Obtained Tools, equipment and testing devices needed to carry out the
configuration work in accordance with the established procedures and
checked for correct operation and safety.
Configured computer network is in accordance with the established
procedures and systems requirements.
CONDITIONS:
The participants will have access to:
1. Tools and test instruments
Anti-static wrist strap
Crimper
Wire stripper
LAN Tester
Modem
Router
Switch
Patch panel
Networking materials (UTP cable, RJ45)
2. Desktop PC parts and peripherals
Processor, mother board and memory
Network interface card
Hard disk and optical drive
Enclosure with power supply
Keyboard and mouse
Monitor
Test speaker (internal)
3. Access to power source
ASSESSMENT METHOD:
1. Written exam
2. Practical exam/demonstration
3. Observation in workplace
Learning Experiences
Learning Outcome 1
Plan and prepare for configuration
6
NOTE:
All Pictures and graphic illustrations taken from the internet are properties of the original
owners and are used only as supplemental materials for educational purposes.
4. Answer the Self Check 1.1-2 Compare answers with the Answer Key 1.1-2.
You are required to get all the answers correct. If
not, read the Information Sheet again to answer
all questions correctly.
Be familiar with network cables, tools, materials
5. Read Information Sheet 1.1-3 and equipment that you will be using in working
“Configure Network Cables” with the Job Sheet 1.1-1.
If you have doubt/verifications regarding the data
on the information sheet 1.1-3, you may ask the
trainer or co-trainees who are done with this
activity.
7
Learning Activities Special Instructions
6. Perform Job Sheet 1.1-3 Perform Job Sheet 1.1-3 and use the
Performance Checklist 1.1-3 as your guide in
doing the activity.
7. Read Information Sheet 1.1-4 Be familiar with the steps in configuring Peer-to-
“Configure Peer-to-peer Network” peer network in working with the Job Sheet 1.1-
4.
If you have doubt/verifications regarding the data
on the information sheet 1.1-3, you may ask the
trainer or co-trainees who are done with this
activity.
6. Perform Job Sheet 1.1-4 Perform Job Sheet 1.1-4 and use the
Performance Checklist 1.1-4 as your guide in
doing the activity.
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Define what is a network and protocols
2. Identify different types of networks
• Security. Files and programs on a network can be designated as "copy inhibit," so that you
do not have to worry about illegal copying of programs. Also, passwords can be established
8
for specific directories to restrict access to authorized users.
• Resource Sharing. Sharing resources is another area in which a network exceeds stand-
alone computers. Most establishments cannot afford enough laser printers, fax machines,
modems, scanners, and CD-ROM players for each computer. However, if these or similar
peripherals are added to a network, they can be shared by many users.
• Information Sharing. Information sharing describes the exchange of data between various
organizations, people and technologies. There are several types of information sharing:
Information shared by individuals (such as a video shared on Facebook or YouTube).
What is a Protocol?
• Ethernet
• Local Talk
• Token Ring
• FDDI
• ATM
Networking hardware includes all computers, peripherals, interface cards and other
equipment needed to perform data-processing and communications within the network.
fig. 1 fig. 2
9
The network interface card (NIC) provides the physical connection between the network and
the computer workstation. Most NICs are internal, with the card fitting into an expansion slot
inside the computer. Some computers, such as Mac Classics, use external boxes which are
attached to a serial port or a SCSI port. Laptop computers can now be purchased with a
network interface card built-in or with network cards that slip into a PCMCIA slot.
Network interface cards are a major factor in determining the speed and performance of a
network. It is a good idea to use the fastest network card available for the type of workstation
you are using
Switch
A concentrator is a device that provides a central connection point for cables from
workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each
workstation to a central switch/hub. Most switches are active, that is they electrically amplify
the signal as it moves from one device to another. Switches no longer broadcast network
packets as hubs did in the past, they memorize addressing of computers and send the
information to the correct location directly. Switches are:
Routers
A router translates information from one network to another; it is similar to a super intelligent
bridge. Routers select the best path to route a message, based on the destination address
and origin. The router can direct traffic to prevent head-on collisions, and is smart enough to
know when to direct traffic along back roads and shortcuts. If you have a school LAN that you
want to connect to the Internet, you will need to purchase a router. In this case, the router
serves as the translator between the information on your LAN and the Internet. It also
determines the best route to send the data over the Internet.
10
What is Network Cabling?
Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some
cases, a network will utilize only one type of cable, other networks will use a variety of cable
types. The type of cable chosen for a network is related to the network's topology, protocol,
and size. Understanding the characteristics of different types of cable and how they relate to
other aspects of a network is necessary for the development of a successful network. The
following sections discuss the types of cables used in networks and other related topics.
fig. 1
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to
be inserted only one way. RJ stands for Registered Jack, implying that the connector follows
a standard borrowed from the telephone industry. This standard designates which wire goes
with each pin inside the connector.
11
Wireless LANs
Not all networks are connected with cabling; some networks are wireless. Wireless LANs use
high frequency radio signals, infrared light beams, or lasers to communicate between the
workstations and the file server or hubs. Each workstation and file server on a wireless
network has some sort of transceiver/antenna to send and receive the data. Information is
relayed between transceivers as if they were physically connected. For longer distance,
wireless communications can also take place through cellular telephone technology,
microwave transmission, or by satellite.
Wireless networks are great for allowing laptop computers or remote computers to connect to
the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or
impossible to install cables.
Unlike operating systems, such as DOS and Windows, that are designed for single users to
control one computer, network operating systems (NOS) coordinate the activities of multiple
computers across a network. The network operating system acts as a director to keep the
network running smoothly. The two major types of network operating systems are
Network Architecture
Peer-to-Peer
12
In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are
connected and share resources without going through a separate server computer.
Client/Server
Self-check 1.1-2
1. A medium through which information usually moves from one network device to
another
13
a. Cable
b. Router
c. Client
d. Server
a. Cable
b. Router
c. Switch
d. Server
3. its is a type of network connected and share resources without going through a
separate server computer.
a. Client/Server
b. Peer-to-peer
c. LAN
d. WAN
4. It is a device that provides a central connection point for cables from workstations,
servers, and peripherals.
a. Switch
b. Router
c. Bridge
d. Repeater
a. Centralized
b. Scalability
c. Accessibility
d. Decentralized
1. A
2. B
3. B
4. A
5. D
14
Information Sheet 1.1-3
Configuring network cables
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the appropriate tools, materials and equipment in configuring a network cable
2. Prepare tools, materials and equipment in configuring a network cable
A UTP cable (category 5) is one of the most popular LAN cables. This cable consists of 4
twisted pairs of metal wires (that means there are 8 wires in the cable). Adding RJ45
connectors at both ends of the UTP cable it becomes a LAN cable they usually use.
Preparation
Making Cable
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-
side).
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it
tightly.
5. Make the other side of the cable (we call this side B-side) in the same
way.
15
6. After you made it, you don't need to take care of the direction of the cable. (Any cable
in this page is directionless --- that means you can set either end of the cable to either
device.)
Take the UTP cable with your left hand and a RJ45 connector with your right hand. Hold the
RJ45 connector in the way you can see the contact metal face of the RJ45 connector.
The tables below are for the case where the UTP cable consists of green/green-white,
orange/orange-white, blue/blue-white, brown/brown-white twisted pairs.
10BaseT and 100BaseT are most common mode of LAN. You can use UTP category-5 cable
for both mode. (You can use UTP category-3 cable for 10BaseT, in which there are only 3
wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it to connect 2
hubs in the case one of the hubs has an uplink port (and you use normal port on the other
hub).
A cross cable for 10BaseT and 100BaseT is used to connect 2 computers directly (with ONLY
the UTP cable). It is also used when you connect 2 hubs with a normal port on both hubs. (In
other words, the cross cable is used relatively in a rare case.)
16
1 White-orange White-green
2 Orange Green
3 White-green White-orange
4 blue Blue
5 White-blue White-blue
6 green orange
7 White-brown White-brown
8 brown brown
Steps/ Procedure:
Assessment Method:
Demonstration with questioning , Performance Criteria checklist
17
CRITERIA
YES NO
Is…
1. Safety precautions are observed
2. All the configured UTP cable have been tested for
successful connectivity
3. Proper boot-up and shutdown of the computer is
observed
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the proper cable to connect the two PCs
2. Configure workstation IP address information
3. Test connectivity using the ping command
Procedure
This procedure focuses on the ability to connect two PCs to create a simple peer-to-peer
Ethernet LAN between two workstations. The workstations will be directly connected to each
other without using a hub or switch. In addition to the Layer 1 physical and Layer 2 data link
connections, the computers must also be configured with the correct IP network settings,
which is Layer 3, so that they can communicate. A basic Category 5/5e/6 UTP crossover
cable is all that is needed. A crossover cable is the same type that would be used as
backbone or vertical cabling to connect switches together. Connecting the PCs in this manner
can be very useful for transferring files at high speed and for troubleshooting interconnecting
devices between PCs. If the two PCs can be connected with a single cable and are able to
communicate, then any networking problems are not with the PCs themselves. Start this lab
with the equipment turned off and with cabling disconnected. Work in teams of two with
one person per PC.
Step 1 Identify the proper Ethernet cable and connect the two PCs. The connection between
the two PCs will be accomplished using a Category 5 or 5e crossover cable. Locate a cable
18
that is long enough to reach from one PC to the other, and attach one end to the NIC in each
of the PCs. Be sure to examine the cable ends carefully and select only a crossover cable.
Step 2 Verify the physical connection. Plug in and turn on the computers. To verify the
computer connections, ensure that the link lights on both NICs are lit.
Right Click on your network icon in the taskbar and click "Open Network and Sharing Center"
19
Step 4 Configure TCP/IP settings for the two PCs
a. Set the IP address information for each PC according to the information in the table.
b. Note that the default gateway IP address is not required, since these computers are directly
connected. The default gateway is only required on local area networks that are connected to
a router.
from PC-B
C:>ping 192.168.1.1
Look for results similar to those shown below. If not, check the PC connections and TCP/IP
settings for both PCs.
20
JOB SHEET 1.1-3
Steps/ Procedure:
Assessment Method:
Demonstration with questioning , Performance Criteria checklist
21
Performance Criteria Checklis 1.1-4
CRITERIA
YES NO
Is…
4. Safety precautions are observed
5. All the UTP are properly connected to the computer and
hub/switch
6. Computers are properly connected and seen in the
network
7. Proper boot-up and shutdown of the computer is
observed
22