0% found this document useful (0 votes)
187 views

Setup Computer Networks

This document provides instructions for trainees on how to use a competency-based learning material for the Computer Systems Servicing NC II qualification. It outlines that the module focuses on Learning Outcome 1 which is to assemble a computer. It instructs trainees to work through the information sheets, activities, self-checks and job sheets to develop their practical skills. It emphasizes practicing new skills during work shifts to improve speed, memory and confidence. It also addresses recognizing prior learning if trainees have previous experience or qualifications related to the topics.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views

Setup Computer Networks

This document provides instructions for trainees on how to use a competency-based learning material for the Computer Systems Servicing NC II qualification. It outlines that the module focuses on Learning Outcome 1 which is to assemble a computer. It instructs trainees to work through the information sheets, activities, self-checks and job sheets to develop their practical skills. It emphasizes practicing new skills during work shifts to improve speed, memory and confidence. It also addresses recognizing prior learning if trainees have previous experience or qualifications related to the topics.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

COMPETENCY-BASED LEARNING MATERIAL

(CBLM)

Setup Computer Configure Computer Network


Computer System Network LEARNING OUTCOME 1
Servicing NC-II MODULE
QUALIFICATION
SPCFI By: Petalver, Carlo NTTC CSS NCII
Trainer

Qualification Title : Computer Systems Servicing NC II


Unit of Competency : Setup Computer Networks
Module Title : Configuring Computer Networks
Learning Outcome 1 (LO1): Configure Computer Network

Data Gathering Instrument for Trainee’s


Characteristics

Please answer the following instrument according to the characteristics described


below.Encircle the letter of your choice that best describes you as a learner. Blank spaces
are provided for some data that need your response.

Characteristics of Learners

Language, literacy Average grade in: Average grade in:


and numeracy English Math
(LL & N) a. 95 and above 1. 95 and above
b. 90 to 94 2. 90 to 94
c. 85 to 89 3. 85 to 89
d. 80 to 84 4. 80 to 84
e. 75 to 79 5. 75 to 79

1
Cultural and Ethnicity / culture:
language a. Ifugao
background b. Igorot
c. Ibanag
d. Gaddang
e. Muslim
f. Ibaloy
g. Others (please specify) _______________
Education & Highest Educational Attainment:
general a. High School Level
knowledge b. High School Graduate
c. College Level
d. College Graduate
e. with units in Master’s degree
f. Masteral Degree
g. With units in Doctoral Level
h. Doctoral Graduate
Sex a. Male
b. Female

Age Your age: ____________

Physical ability 1. Disabilities (if any)__________________


2. Existing Health Conditions (Existing illness if
any)
a. none
b. Asthma
c. Heart Disease
d. Anemia
e. Hypertension
f. Diabetes
g. Others (please specify)
________________
Previous NC Certificates
experience with a. NC certified
the topic b. NC graduate
c. NC trainer
d. NC lead trainer
Number of years as a competency
trainer____________
Previous List down trainings related to Programming NCIV
learning ____________________________
experience ____________________________
____________________________

Training Level National Certificates acquired and NC level


Completed ________________________________
________________________________

2
Special courses Other courses related to Programming NCIV
a. BS Computer Science
b. BS Information Technology
c. Others (please
specify)______________________
Learning Styles a. Visual – The visual learner takes mental
pictures of information given, so in order for
this kind of learner to retain information, oral or
written, presentations of new information must
contain diagrams and drawings, preferably in
color. The visual learner can concentrate with a
lot of activity around him and will focus better
and learn faster in quiet study environment.
b. Kinesthetic – described as the students in the
classroom, who have problems sitting still and
who often bounce their legs while tapping their
fingers on the desks. They are often referred to
as hyperactive students with concentration
issues.
c. Auditory – a learner who has the ability to
remember speeches and lectures in detail but
has a hard time with written text. Having to
read long texts is pointless and will not be
retained by the auditory learner unless it is
read aloud.
d. Activist – learns by having a go.
e. Reflector – learns most from activities where
they can watch listen and then review what has
happened.
f. Theorist – Learns most when ideas are linked
to existing theories and concepts.
g. Pragmatist – Learns most from learning
activities that are directly relevant to their
situation.
Other needs a. Financially challenged
b. Working student
c. Solo parent
d. Others (please specify)
_______________________

HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL


Welcome!
This module focuses on the Learning Outcome no. 1 (LO1) which is Assemble a Computer of
the Unit of Competency – Install and Configure Computer Systems and Networks. This
module contains knowledge, skills and attitudes required for a Computer Systems Servicing
NC II course. It also contains training materials and activities for you (students) to complete.

3
In this module, you (students) are required to go through a series of learning
activities in order to complete the learning outcome. There are information sheets, self-
check sheets, job sheet and operation sheets that cover the learning outcome. Follow the
activities on your own and answer the self-check at the end of each learning activity.
If you have questions, don’t hesitate to ask your teacher for assistance.
The main objective of this module is to develop your practical skills. And to gain these skills,
you must learn basic concepts and terminology. For most part you’ll get this information from
the information sheets.
This module is prepared to help you achieve the LO1- Assemble a Computer of the Unit of
Competency – Install and Configure Computer Systems and Networks as a required
competency in Computer Systems Servicing NC II.
This will be the source of information for you to acquire knowledge and skills in this particular
competency independently and at your own pace, with minimum supervision or help from
your instructor/teacher.

Remember to:
Work through all the information and complete the activities in each section.Read information
sheets and complete the self-check. Suggested references are included to supplement the
materials provided in this module. Most probably your trainer will also be your supervisor or
manager. He/she is there to support you and show you the correct way to do things.You will
be given plenty of opportunities to ask questions and practice on the job. Make sure you
practice your new skills during regular work shift in order for you to improve both your speed
and memory and also your confidence.
All the learning activities are designed for you to complete at your own pace. Use the
Self-checks, Operation Sheets or Job Sheets at the end of each section to test your own
progress.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this module because you
have been working for some time or completed training in this area.If you can demonstrate to
your teacher that you are competent in a particular skill or skills, talk to him/her about having
them formally recognized so you don’t have to do the same training again. If you have a
qualification or Certificate of Competency from previous trainings show it to your teacher. If
the skills you acquired are still current and relevant to this module, they may become part of
the evidence you can present for RPL. If you are not sure about the currency of your skills,
discuss it with your teacher.
When you feel confident that you have had sufficient practice, ask your Trainer to
evaluate you to assess your competency. The results of your assessment will be recorded in
your Progress Chart and Achievement Chart. Below is the list of CSS NCII Competencies and
you are about the start knowing the first learning outcome of the unit of competency no.1,
Assemble a Computer.

4
COMPUTER SYSTEMS SERVICING NC II
List of Competencies

No. Unit of Competency Module Title Code


Install and Configure Disassemble and Assemble
1. Computer Systems Computer Hardware ELC724331

Set-up Computer Setting-up Computer


2. ELC724332
Networks Networks
Setting-up Computer
3. Set-up Computer Servers ELC724333
Servers
Maintain and Repair Maintaining and Repairing
4. Computer Systems and Computer Systems and ELC724334
Networks Networks

LEARNING OUTCOME 1 CONFIGURE COMPUTER NETWORK

CONTENTS:
1. Occupational health and safety policies and procedures
2. 5S and 3Rs environmental policies
3. Networking Fundamentals
4. Tools, equipment and testing devices
5. Configuring computer networks

5
ASSESSMENT CRITERIA:
Planned and prepared unit assembly to ensure OHS policies and
procedures are followed in accordance with systems requirements.
Identified and obtained materials necessary to complete the work in
accordance with the established procedures and checked against
systems requirements.
Obtained Tools, equipment and testing devices needed to carry out the
configuration work in accordance with the established procedures and
checked for correct operation and safety.
Configured computer network is in accordance with the established
procedures and systems requirements.

CONDITIONS:
The participants will have access to:
1. Tools and test instruments
 Anti-static wrist strap
 Crimper
 Wire stripper
 LAN Tester
 Modem
 Router
 Switch
 Patch panel
 Networking materials (UTP cable, RJ45)
2. Desktop PC parts and peripherals
 Processor, mother board and memory
 Network interface card
 Hard disk and optical drive
 Enclosure with power supply
 Keyboard and mouse
 Monitor
 Test speaker (internal)
3. Access to power source

ASSESSMENT METHOD:
1. Written exam
2. Practical exam/demonstration
3. Observation in workplace

Learning Experiences

Learning Outcome 1
Plan and prepare for configuration

6
NOTE:
All Pictures and graphic illustrations taken from the internet are properties of the original
owners and are used only as supplemental materials for educational purposes.

Learning Activities Special Instructions


Be familiar and follow occupational health and
1. Read Information Sheet 1.1-1 safety policies in preparation of network
“Occupational Health and Safety Policies configuration in accordance with system
and Procedures” requirements that you will be using in working
with the Self Check 1.1-1.
If you have doubt/verifications regarding the data
on the information sheet 1.1-1, you may ask the
trainer or co-trainees who are done with this
activity.
Compare answers with the Answer Key 1.1-1.
2. Answer the Self Check 1.1-1. You are required to get all the answers correct. If
not, read the Information Sheet again to answer
all questions correctly.

Be familiar with computer networks, types of


3. Read Information Sheet 1.1-2 computer networks, network hardwares and
“Networking Fundamentals” materials in configuring computer networks that
you will be using in working with the Self Check
1.1-2.
If you have doubt/verifications regarding the data
on the information sheet 1.1-2, you may ask the
trainer or co-trainees who are done with this
activity.

4. Answer the Self Check 1.1-2 Compare answers with the Answer Key 1.1-2.
You are required to get all the answers correct. If
not, read the Information Sheet again to answer
all questions correctly.
Be familiar with network cables, tools, materials
5. Read Information Sheet 1.1-3 and equipment that you will be using in working
“Configure Network Cables” with the Job Sheet 1.1-1.
If you have doubt/verifications regarding the data
on the information sheet 1.1-3, you may ask the
trainer or co-trainees who are done with this
activity.

7
Learning Activities Special Instructions

6. Perform Job Sheet 1.1-3 Perform Job Sheet 1.1-3 and use the
Performance Checklist 1.1-3 as your guide in
doing the activity.

7. Read Information Sheet 1.1-4 Be familiar with the steps in configuring Peer-to-
“Configure Peer-to-peer Network” peer network in working with the Job Sheet 1.1-
4.
If you have doubt/verifications regarding the data
on the information sheet 1.1-3, you may ask the
trainer or co-trainees who are done with this
activity.

6. Perform Job Sheet 1.1-4 Perform Job Sheet 1.1-4 and use the
Performance Checklist 1.1-4 as your guide in
doing the activity.

INFORMATION SHEET 1.1-2

Basic Terms, Concepts, and Types of Computer Networks

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Define what is a network and protocols
2. Identify different types of networks

A computer network is an interconnected group of computers. A network enables two or


more computers to share data, resources, and even applications. The computers must have
some connectivity , of course: some way for the signal from one machine to reach the other.
In addition, the hardware must be compatible and the software set up so that the receiving
computer can understand what the sending machine sends.

Advantages of Installing a Network


• Speed. Networks provide a very rapid method for sharing and transferring files. Without a
network, files are shared by copying them to removable disks, then carrying or sending the
disks from one computer to another. This method of transferring files (referred to as sneaker-
net) is very time-consuming.

• Security. Files and programs on a network can be designated as "copy inhibit," so that you
do not have to worry about illegal copying of programs. Also, passwords can be established

8
for specific directories to restrict access to authorized users.

• Resource Sharing. Sharing resources is another area in which a network exceeds stand-
alone computers. Most establishments cannot afford enough laser printers, fax machines,
modems, scanners, and CD-ROM players for each computer. However, if these or similar
peripherals are added to a network, they can be shared by many users.

• Information Sharing. Information sharing describes the exchange of data between various
organizations, people and technologies. There are several types of information sharing:
Information shared by individuals (such as a video shared on Facebook or YouTube).

What is a Protocol?

A protocol is a set of rules that governs the communications between computers on a


network. These rules include guidelines that regulate the following characteristics of a
network: access method, allowed physical topologies, types of cabling, and speed of data
transfer. The most common protocols are:

• Ethernet
• Local Talk
• Token Ring
• FDDI
• ATM

What is Networking Hardware?

Networking hardware includes all computers, peripherals, interface cards and other
equipment needed to perform data-processing and communications within the network.

fig. 1 fig. 2

Example of computer network hardwares

Network Interface Cards

9
The network interface card (NIC) provides the physical connection between the network and
the computer workstation. Most NICs are internal, with the card fitting into an expansion slot
inside the computer. Some computers, such as Mac Classics, use external boxes which are
attached to a serial port or a SCSI port. Laptop computers can now be purchased with a
network interface card built-in or with network cards that slip into a PCMCIA slot.

Network interface cards are a major factor in determining the speed and performance of a
network. It is a good idea to use the fastest network card available for the type of workstation
you are using

Switch

A concentrator is a device that provides a central connection point for cables from
workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each
workstation to a central switch/hub. Most switches are active, that is they electrically amplify
the signal as it moves from one device to another. Switches no longer broadcast network
packets as hubs did in the past, they memorize addressing of computers and send the
information to the correct location directly. Switches are:

Routers

A router translates information from one network to another; it is similar to a super intelligent
bridge. Routers select the best path to route a message, based on the destination address
and origin. The router can direct traffic to prevent head-on collisions, and is smart enough to
know when to direct traffic along back roads and shortcuts. If you have a school LAN that you
want to connect to the Internet, you will need to purchase a router. In this case, the router
serves as the translator between the information on your LAN and the Internet. It also
determines the best route to send the data over the Internet.

10
What is Network Cabling?

Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some
cases, a network will utilize only one type of cable, other networks will use a variety of cable
types. The type of cable chosen for a network is related to the network's topology, protocol,
and size. Understanding the characteristics of different types of cable and how they relate to
other aspects of a network is necessary for the development of a successful network. The
following sections discuss the types of cables used in networks and other related topics.

• Unshielded Twisted Pair (UTP) Cable


• Shielded Twisted Pair (STP) Cable
• Coaxial Cable
• Fiber Optic Cable
• Wireless LANs

Unshielded Twisted Pair (UTP) Cable


Twisted pair cabling comes in two varieties: shielded and unshielded.
Unshielded twisted pair (UTP) is the most popular and is generally the best
option for school networks (See fig. 1).

fig. 1

Unshielded Twisted Pair Connector

The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to
be inserted only one way. RJ stands for Registered Jack, implying that the connector follows
a standard borrowed from the telephone industry. This standard designates which wire goes
with each pin inside the connector.

11
Wireless LANs

Not all networks are connected with cabling; some networks are wireless. Wireless LANs use
high frequency radio signals, infrared light beams, or lasers to communicate between the
workstations and the file server or hubs. Each workstation and file server on a wireless
network has some sort of transceiver/antenna to send and receive the data. Information is
relayed between transceivers as if they were physically connected. For longer distance,
wireless communications can also take place through cellular telephone technology,
microwave transmission, or by satellite.

Wireless networks are great for allowing laptop computers or remote computers to connect to
the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or
impossible to install cables.

What is a Network Operating System?

Unlike operating systems, such as DOS and Windows, that are designed for single users to
control one computer, network operating systems (NOS) coordinate the activities of multiple
computers across a network. The network operating system acts as a director to keep the
network running smoothly. The two major types of network operating systems are

Network Architecture

Peer-to-Peer

12
In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are
connected and share resources without going through a separate server computer.

Advantages of a peer-to-peer network:

• Less initial expense - No needfor a dedicated server.


• Setup - An operating system (such as Windows 7) already in place may only need to be
reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:

• Decentralized - No central repository for files and applications.


• Security - Does not provide the security available on a client/server network.

Client/Server

Client-server architecture (client/server) is a network architecture in which each computer or


process on the network is either a client or a server.

Advantages of a client/server network:

• Centralized - Resources and data security are controlled through the


server.
• Scalability - Any or all elements can be replaced individually as needs
increase.
• Flexibility - New technology can be easily integrated into system.
• Interoperability - All components (client/network/server) work together.
• Accessibility - Server can be accessed remotely and across multiple
platforms.

Disadvantages of a client/server network:

• Expense - Requires initial investment in dedicated server.


• Maintenance - Large networks will require a staff to ensure efficient
operation.
• Dependence - When server goes down, operations will cease across the
network.

Self-check 1.1-2

Multiple choice. Encircle the letter of your choice.

1. A medium through which information usually moves from one network device to
another

13
a. Cable
b. Router
c. Client
d. Server

2. It translates information from one network to another; it is similar to a super intelligent


bridge.

a. Cable
b. Router
c. Switch
d. Server

3. its is a type of network connected and share resources without going through a
separate server computer.

a. Client/Server
b. Peer-to-peer
c. LAN
d. WAN

4. It is a device that provides a central connection point for cables from workstations,
servers, and peripherals.

a. Switch
b. Router
c. Bridge
d. Repeater

5. There are several advantages of a client-server network except.

a. Centralized
b. Scalability
c. Accessibility
d. Decentralized

Answer key 1.1-2

1. A
2. B
3. B
4. A
5. D

14
Information Sheet 1.1-3
Configuring network cables

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the appropriate tools, materials and equipment in configuring a network cable
2. Prepare tools, materials and equipment in configuring a network cable

A UTP cable (category 5) is one of the most popular LAN cables. This cable consists of 4
twisted pairs of metal wires (that means there are 8 wires in the cable). Adding RJ45
connectors at both ends of the UTP cable it becomes a LAN cable they usually use.

Preparation

You need a UTP Cable, Crimping Tool, RJ45, and Cutter

Making Cable

Follow the steps below.

1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-
side).
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it
tightly.
5. Make the other side of the cable (we call this side B-side) in the same
way.

15
6. After you made it, you don't need to take care of the direction of the cable. (Any cable
in this page is directionless --- that means you can set either end of the cable to either
device.)

How to see the wire arrangement.

Take the UTP cable with your left hand and a RJ45 connector with your right hand. Hold the
RJ45 connector in the way you can see the contact metal face of the RJ45 connector.

The tables below are for the case where the UTP cable consists of green/green-white,
orange/orange-white, blue/blue-white, brown/brown-white twisted pairs.

10 Base T / 100 Base T Straight

10BaseT and 100BaseT are most common mode of LAN. You can use UTP category-5 cable
for both mode. (You can use UTP category-3 cable for 10BaseT, in which there are only 3
wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it to connect 2

hubs in the case one of the hubs has an uplink port (and you use normal port on the other
hub).

PIN ID SIDE A SIDE B


1 White-orange White-orange
2 Orange Orange
3 White-green White-green
4 blue blue
5 White-blue White-blue
6 green green
7 White-brown White-brown
8 brown brown

10 Base T / 100 Base T Cross

A cross cable for 10BaseT and 100BaseT is used to connect 2 computers directly (with ONLY
the UTP cable). It is also used when you connect 2 hubs with a normal port on both hubs. (In
other words, the cross cable is used relatively in a rare case.)

PIN ID SIDE A SIDE B

16
1 White-orange White-green
2 Orange Green
3 White-green White-orange
4 blue Blue
5 White-blue White-blue
6 green orange
7 White-brown White-brown
8 brown brown

JOB SHEET 1.1-3

Title : Network Cable Configuration


Performance Objective : Given the necessary tools and materials you are
going to make crossover and straight cable connection
and test the connectivity of your cable.
Supplies : UTP Cable, RJ 45
Tools/Equipment : Crimping tool
Network switch
Router
Working Computer with OS
Internet connection
Cable Tester

Steps/ Procedure:

1. Prepare the necessary tools and materials


2. Use UTP Cable and 4 RJ-45 to make Straight & Cross-over
connection.
3. Follow the procedures in crimping UTP cable in Information sheet
1.1-3
3. Check the connectivity of your cables.
4. Let your trainer check your work.

Assessment Method:
Demonstration with questioning , Performance Criteria checklist

Performance Criteria Checklis 1.1-3

17
CRITERIA
YES NO
Is…
1. Safety precautions are observed
2. All the configured UTP cable have been tested for
successful connectivity
3. Proper boot-up and shutdown of the computer is
observed

Information Sheet 1.1-4


configure peer-to-peer network

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify the proper cable to connect the two PCs
2. Configure workstation IP address information
3. Test connectivity using the ping command

To create a peer-to-peer network, you must have the following resources:

 Two workstations with an ethernet 10/100 NIC installed


 Ethernet cables (straigh-through/cross-over) to choose for connecting the two
workstations

Procedure

This procedure focuses on the ability to connect two PCs to create a simple peer-to-peer
Ethernet LAN between two workstations. The workstations will be directly connected to each
other without using a hub or switch. In addition to the Layer 1 physical and Layer 2 data link
connections, the computers must also be configured with the correct IP network settings,
which is Layer 3, so that they can communicate. A basic Category 5/5e/6 UTP crossover
cable is all that is needed. A crossover cable is the same type that would be used as
backbone or vertical cabling to connect switches together. Connecting the PCs in this manner
can be very useful for transferring files at high speed and for troubleshooting interconnecting
devices between PCs. If the two PCs can be connected with a single cable and are able to
communicate, then any networking problems are not with the PCs themselves. Start this lab
with the equipment turned off and with cabling disconnected. Work in teams of two with
one person per PC.

Step 1 Identify the proper Ethernet cable and connect the two PCs. The connection between
the two PCs will be accomplished using a Category 5 or 5e crossover cable. Locate a cable

18
that is long enough to reach from one PC to the other, and attach one end to the NIC in each
of the PCs. Be sure to examine the cable ends carefully and select only a crossover cable.

Step 2 Verify the physical connection. Plug in and turn on the computers. To verify the
computer connections, ensure that the link lights on both NICs are lit.

Step 3 Access the IP settings on Windows.


Note: Be sure to write down the existing IP settings, so that they can be restored at the end of
the lab. These include IP address, subnet mask, default gateway, and DNS servers. If the
workstation is a DHCP client, it is not necessary to record this information.

Right Click on your network icon in the taskbar and click "Open Network and Sharing Center"

Click on the START MENU and select CONTROL PANEL.


Select NETWORK AND INTERNET.
Select the NETWORK AND SHARING CENTER.
From the Tasks section on the left, select CHANGE ADAPTER SETTINGS.
Right-click the LOCAL AREA CONNECTION icon and select PROPERTIES.
From the User Access Control window, click CONTINUE.
Select INTERNET PROTOCOL VERSION 4 (TCP/IPv4), and then click the PROPERTIES
button.
Click on Properties and click on Use the following IP address.

19
Step 4 Configure TCP/IP settings for the two PCs
a. Set the IP address information for each PC according to the information in the table.
b. Note that the default gateway IP address is not required, since these computers are directly
connected. The default gateway is only required on local area networks that are connected to
a router.

Computer IP Address Subnet Mask Default Gateway


PC-A 192.168.1.1 255.255.255.0 Not required
PC-B 192.168.1.2 255.255.255.0 Not required

Step 5 Access the Command or MS-DOS prompt


a. Use the Start menu to open the Command Prompt (MS-DOS-like) window: type cmd or
command prompt on search dialog box.

Step 6 Verify that the PCs can communicate


a. Test connectivity from one PC to the other by pinging the IP address of the opposite
computer.

Use the following command at the command prompt.


from PC-A
C:>ping 192.168.1.2

from PC-B
C:>ping 192.168.1.1

Look for results similar to those shown below. If not, check the PC connections and TCP/IP
settings for both PCs.

20
JOB SHEET 1.1-3

Title : Configure Peer-to-Peer Network


Performance Objective : Given the necessary tools and materials you are
going to configure basic Peer-to-Peer network
Supplies : Configured UTP Cable (cross-over/straight-through)
Tools/Equipment : Working Computer with OS
Cable Tester

Steps/ Procedure:

1. Prepare the necessary tools and materials


2. Use the configured UTP Cable (Cross-over/Straight-through)
3. Follow the procedures in configuring basic Peer-to-Peer network in
Information sheet 1.1-4
3. Check the connectivity of the two(2) workstations
4. Let your trainer check your work.

Assessment Method:
Demonstration with questioning , Performance Criteria checklist

21
Performance Criteria Checklis 1.1-4

CRITERIA
YES NO
Is…
4. Safety precautions are observed
5. All the UTP are properly connected to the computer and
hub/switch
6. Computers are properly connected and seen in the
network
7. Proper boot-up and shutdown of the computer is
observed

22

You might also like