Technology and Livelihood Education
Technology and Livelihood Education
ert E
10
p
tP
r o
A L
m en S
ov
ern
OR
G
T F
N O
Technology and
Livelihood Education
Information and Communication Technology
Computer Systems Servicing
Quarter 4 - Module 4
Troubleshooting Network Breakdowns
sdfgsd
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Management Team:
Chairperson: Arturo B. Bayocot, PhD, CESO III
Regional Director
0
Lesson Reactive Network
1 Troubleshooting
__________________________________________________________________________________
Below are the skills and competencies you need to learn for today’s
lesson.
What I Know
__________________________________________________________________________________
Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.
1. Any changes to the network software or hardware can create problems. This is
when reactive network troubleshooting comes in. Is this statement correct?
A. Yes
B. No
1
2. What network troubleshooting approach is also known network breakdown
troubleshooting?
A. Proactive network troubleshooting
B. Reactive network troubleshooting
C. Preventive network troubleshooting
D. Corrective network troubleshooting
2
9. Which of the following is an example of reactive network troubleshooting
approach?
A. Diagnose the problem
B. Do the replacement of defective parts
C. Do the scheduled troubleshooting
D. Test the solution to the problem
10. The following are the situation when network breakdown usually occurs,
except for one. Which of the following is the least possible reason for network
breakdown?
A. A new software was installed.
B. A new hardware was installed.
C. A new upgrade was performed.
D. A new network device was installed.
E. A new network technician was installed.
What’s In
__________________________________________________________________________________
ACTIVITY 2
Direction: Read and answer the questions below. Write your answer in your
activity notebook.
3
What’s New
__________________________________________________________________________________
Before you start the lesson on network fault diagnosis, do the activity
below.
Direction: Answer the question below and write your answer in your activity
notebook.
What is it
__________________________________________________________________________________
When a user complains about the network, investigate first if there is really a
problem. Sometimes it may be just a user problem especially when the user has a
deadline to meet.
4
3. Check the configurations on the workstation, if IP address is correct and if a
correct NIC card configured.
4. Check all the physical media attached to the malfunctioning device.
5. Interview the user. Ask what he or she was doing just before the problem
occurred. Look for clues that will help you determine the root of the problem.
The very first question you should be asking yourself when a problem occurs
is “what is new or different?” Any changes to network software or hardware can
create problems. Some of the places where change might have occurred are with
systems files, new devise, new device drivers, new accounts, changed privileges,
upgraded software, etc.
Where to look first when there are many workstations in a network? Start with
your network diagram. Are the complaints coming from a single department? Are they
connected to a single hub?
Look for systemic issues first before examining into local ones. Systemic
problems are the one that every user in the network experiences. This means that the
problem might involve a shared resource, device, or program. Isolate systemic issues
first before local problems.
For example:
Juan knows from the baseline performance data that when the system is
running optimally for that time frame takes an average of 3 ms (milliseconds) to ping
POP mail server. When he ping the workstation and find that it takes 5ms. The
problem is that the network throughput is low. Juan then look at the performance
monitoring software and found that one workstation cannot even load for lack of
resources, but another workstation is running smoothly. This might indicate that the
problem is the server’s memory cache is almost full. What might be causing that?
In addition, the server is locked in the secure server room. The logbook also
tells that the computer room door has not been opened since late last night when the
backup media were removed offsite. No new software has been installed on the
network in the last 2 weeks. The performance manager shows correct amount of
memory; the problem is not that it is not connected but that it is unavailable.
In the company where Juan work, a marketing director was fired last week.
Could these two seemingly unrelated incidences, connected?
Form a Hypothesis
The fact that server’s very little memory available can explain why people are
having trouble with network connection. In addition, processes are competing with a
very little memory.
5
- This cannot be since the server room is locked and been untouched.
Memory may have become unavailable due to a wiring
- This is impossible since the performance manager shows the right amount of
memory.
Some process is gobbling up the memory
- This is a reasonable hypothesis. Memory should be available, and
Thus, one hypothesis is obvious that a runaway process is using excess memory.
How will Juan know what he is dealing with? So far, his hypothesis is that a
runaway process is using excess memory.
To test the hypothesis, run utilities to identify the various process that are
running and where they are running. If there are 53 ping processes running, and
another ping appears after 5 minutes, a program might be responsible for this.
The right thing to do for Juan is to isolate the ping program and determine
that it originated from a workstation in the marketing department. This workstation
was assigned to the marketing director who was fired last week.
Draw Conclusions
The conclusion is that the disgruntled employee set the continuous ping
before he or she left the company. He made a program that runs ping continuously,
then, after 5 minutes regenerates itself to run a second version of ping, and so on,
until the system crashes.
The solution is to kill the 55 pings running. This will speed up again the
systems and regain the memory that ping was using. Never forget to document
everything. Print the ping program causing the trouble for future legal use.
There is no easy solution, but there are different approaches you can take.
Whichever solution you choose, be sure to document it, so that the next person who
must troubleshoot the same problem you encountered can see where the potential
problem lies.
6
What’s More
__________________________________________________________________________________
Direction: Read the scenario below. Identify the problem and formulate
hypothesis using the scientific problem-solving approach. Write your
answer in your activity notebook.
One day a computer café owner approached a computer network technician friend
with a problem. The five computers of his computer café cannot communicate to the server.
The access point where it is connected indicates it is okay. “What could be the problem?”
asked the computer café owner to the technician. The technician considered some of the
options. One possibility was that an IP Stack failure. Another possibility was that the
configuration settings was faulty. “A third possibility was that the access point was the
problem especially you have multiple access points,” said the technician. “Let’s check the
network connection first,” said the technician. The two walked over to where the five
computers located. The technician turned on the computers and begin typing ping in the
command prompt. It said, “destination host unreachable.” The friend then checked the
physical connection. “Let’s try unplugging the access point,” said the technician. The two
walked over to the server room of the internet cafe, then the technician unplugging and
plugging the access point back again. “Turn on the access point,” said the technician to the
owner. As the access point labored to turn on and connect. The technician went back to the
computers, use ping again. He shouted, “That’s the problem!”
7
What I Have Learned
__________________________________________________________________________________
What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson.
Direction: Identify the keywords below and explain it your own words. Write your
answer in your activity notebook.
reactive network
troubleshooting
What I Can Do
What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.
Direction: Read the scenario given. Examine the Job Order Form carefully and
identify what was the complain of the customer, and how to
troubleshoot the problem. Explain your answer. Write it in your activity
notebook.
8
Network Maintenance Job Order Form
Client Name: Viloria Enterprise Phone No.: 0936-1234567
Client Address: Sayre Highway, Poblacion,
Quezon, Bukidnon Client Email:
Job Order Details
Date issued: June 11, 2020 Job Order No.: 1234569
Issued by: Juan dela Cruz Job Performed by: Mario Jose Maria
Client’s Complaints/Problems:
• Cannot connect to the internet
Description of Job Required:
1. Check physical connection and hardware
2. Do the diagnostic tool – ping
3. Contact ISP
Materials Required:
Remarks: The client suspected about broken cables because of
rats.
Completion Information
Date Completed: Time Required
Materials Used:
Remarks
Employee Signature: Supervisor Signature:
9
Assessment
_________________________________________________________________________________
Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.
1. Any changes to the network software or hardware can create problems. This is
when reactive network troubleshooting comes in. Is this statement correct?
A. Yes
B. No
10
6. Which steps in a scientific problem-solving approach requires to test the
formed hypothesis?
A. State the problem
B. Research the problem
C. Form a hypothesis
D. Test the hypothesis
E. Draw conclusions and solve problem
10. The following are the situation when network breakdown usually occurs,
except for one. Which of the following is the least possible reason for network
breakdown?
A. A new software was installed.
B. A new hardware was installed.
C. A new upgrade was performed.
D. A new network device was installed.
E. A new network technician was installed.
11
Additional Activities
Amidst the challenges of the previous activities, you did well. That was
divine. The following activity will enrich your knowledge and skill of the
lesson learned. Enjoy doing this activity.
12
Lesson Proactive Network
2 Troubleshooting
__________________________________________________________________________________
To start with, let us try to find out the learning competencies in which you
are going to master at the end of this lesson.
What I Know
__________________________________________________________________________________
Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.
13
D. Do the necessary replacement of a defective network device
2. This provides data striping but no data redundancy at level 0. Which of the
proactive network troubleshooting approach was described?
A. I
B. II
C. III
D. IV
4. This serves as watchdog that send alert to the management system when it
detected that something is not right. Which of the proactive network
troubleshooting approach was described?
A. I
B. II
C. III
D. IV
6. This provides rationale about the importance of a good plan. Which of the
proactive network troubleshooting approach was described?
A. III
B. IV
C. V
D. VI
7. This reduces the chances of failure in a device. Which of the proactive network
troubleshooting approach was described?
A. III
B. IV
C. V
D. VI
14
D. Limiting dial-up access
9. You want to save your device from failure due to sudden blackout. What Fail-Safe
device you should have?
A. RAID
B. SNMP
C. UPS
D. A spare device
13. You need to design a fault tolerant system for backing up critical data stored on a
single network server. The system is in operation five days per week, Monday
through Friday. You want to be able to restore the data as fast as possible after a
hard disk drive failure. Which fault tolerance system will best meet the
requirement of restoring the lost data as quickly as possible?
A. Install a RAID level 0 system in the server.
B. Install a RAID level 1 system in the server.
C. Install a RAID level 3 system in the server.
D. Install a RAID level 5 system in the server.
14. Maria is public school teacher. She needs to connect to internet everyday for
additional resources. She only uses less than 1GB of data every day. When she
checked internet bills, it was way too much she had used in a month. She
suspects that someone is stealing her data usage. What security measures she
must have to prevent others from stealing her internet data?
A. Install IPS/IDS in her network.
B. Install firewall hardware.
C. Subscribe to VPN network.
D. Install rogue connection detection in her system.
15
What’s In
__________________________________________________________________________________
ACTIVITY 2: One-Phraser
Direction: Answer the questions given below. Write your answer on the space
provided. Write your answer in your activity notebook.
_______________________________
1. Reactive network troubleshooting is
_____________________________________________________________
16
What’s New
__________________________________________________________________________________
Before you start the lesson on diagnostic procedure, you need to do the
activity below.
Direction: Read the scenario below and try to solve the problem presented. Answer
the questions provided. Write your answer in your activity notebook.
One day you decided to water your garden, using a garden hose that is
already connected to a spigot on the side of your house:
Source 1 https://www.allaboutcircuits.com/worksheets/basic-troubleshooting-strategies/
When you turn on the valve at the spigot, no water comes out the nozzle at the
other end of the hose.
How would you prevent this incident from happening again? Give at least to
ways to prevent from recurring.
1. ________________________________________________________
2. ________________________________________________________
Glossary:
Data striping – the spreading of data over multiple disk drives to improve
performance. Also known as “RAID 0,” data are interviewed by bytes or blocks
of bytes across the drives. For example, with four drives and a RAID controller
that simultaneously read and writes all drives, four times as much data is read
or written in the same time frame as a system without striping. Disk striping
17
does not provide fault tolerance but is often used in conjunction with disk
mirroring (RAID 3 and RAID 5) to provide both speed and safety.
What is it
__________________________________________________________________________________
Documentation were discussed in the previous modules. Let us just briefly discuss
remaining topics.
RAID is a technique using two or more disk drives in combination for fault
tolerance and performance. RAID disk drives are used frequently on servers but are
not generally necessary for personal computers. There are numbers of different ways
to use multiple disks together in a RAID scheme and these are known as RAID
levels. There are many different RAID levels, and some manufacturers have
developed their own variations.
Level 0
This level provides data striping but no redundancy. This improves
performance but does not deliver fault tolerance.
Level 1
This level provides disk mirroring, which gives good data protection but
no performance benefit.
Level 3
This level is the same as Level 0, but also reserves one dedicated disk
for error-correction data. It provides good performance and some
degree of fault tolerance.
Level 5
18
This level provides data striping at the byte level and strips error-
correction information. This results in excellent performance and good
fault tolerance.
2. Prioritization of task
Which work should come first? What is the schedule for the changes or
upgrades?
3. Testing plan
When the changes are implemented, they should be done in controlled
environment. Schedule this so that it has the minimum impact on
network users.
4. Implementation
Notify users of the implementation schedule ahead of the actual time of
implementation so they can plan their work around any disruption this
may cause.
5. Retesting
Once you implement changes, test the network to verify the correct
operation of the changes.
6. Documentation
Again, document all changes/modifications. This will save time and
money for continued network improvements.
Network Security
You already know several important points about security. This section is a
quick review of the security issues of which you should be aware.
The goals of security are confidentiality, integrity, and availability. Users expect
their data to be confidential. They expect to retrieve untampered data from servers.
Users need assurance that unauthorized changes will not occur.
19
20
A secure network should prevent “eavesdropping” and unauthorized use. How
to do this?
Scrambling and encrypting data as it travels over the physical media. An
example for this is using virtual private network (VPN).
Attending to the unauthorized person access to devices. An example for this
providing a unique access to each user.
Preventing intrusion from unauthorized devices that attempt to alter, steal, or
corrupt data as it goes through network. Example for this is using different
passwords for each device.
Installing prevention and detection mechanisms to guard against someone
tampering with data. An example for this is installing intrusion preventive
system / intrusion detection system (IPS/IDS) in the network.
Preventing malware in the system.
Security measures that help manage network security include the following:
Physically lock wiring closets, server room and equipment.
Frequently change passwords.
Store backups in different physical location from the network.
Limit dial-up access.
Explain and distribute a written security policy throughout the organization.
The policy must be understood by the individuals who need to know the
following:
- Resources that are secured
- Procedures implemented
- Resource availability
Developing Fail-Safe
All network equipment will fail eventually. The equipment may reach the end of
its useful life, it may fail because of physical (malicious or accidental) damage, or it
may be the victim of environmental damage such as a power spike, lightning strike or
overload from adjacent equipment. A fail-safe is any method or device used to reduce
the chance of failure.
21
Problem solving capabilities.
Interfaces that allow development of third-part applications.
Modeling capabilities for cable, hardware, etc.
Accounting management functionality for tracking network use and billing
accounts.
What’s More
__________________________________________________________________________________
Direction: Match each presented security threats below to the security risk matrix.
One security threat may appear multiple times. The first threat is done
for you. Write your output in a separate sheet.
security threats
security risks
22
What I Have Learned
__________________________________________________________________________________
What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson. You can do
it.
Direction: Answer the questions briefly and concisely. Use the space provided for
your answer.
What I Can Do
__________________________________________________________________________________
What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.
ACTIVITY 6: Reflection
Direction: Read the famous quotation above. Write a reflection based on that
quotation and what you have learned from the lesson 2. Write your
output in a separate sheet.
23
My Reflection
Assessment
_________________________________________________________________________________
Direction: Read and answer each item below. Choose the letter your answer.
Write your answer in your activity notebook.
2. This provides data striping but no data redundancy at level 0. Which of the
proactive network troubleshooting approach was described?
A. I
B. II
C. III
D. IV
24
3. This ensures confidentiality, integrity, and availability of data. Which of the
proactive network troubleshooting approach was described?
A. I
B. II
C. III
D. IV
4. This serves as watchdog that send alert to the management system when it
detected that something is not right. Which of the proactive network
troubleshooting approach was described?
A. I
B. II
C. III
D. IV
6. This provides rationale about the importance of a good plan. Which of the
proactive network troubleshooting approach was described?
A. III
B. IV
C. V
D. VI
7. This reduces the chances of failure in a device. Which of the proactive network
troubleshooting approach was described?
A. III
B. IV
C. V
D. VI
9. You want to save your device from failure due to sudden blackout. What Fail-Safe
device you should have?
A. RAID
B. SNMP
C. UPS
D. A spare device
25
11. Which device is required to provide a steady stream of continuous electrical
power to a server?
A. UPS
B. AVR
C. Switch
D. Router
13. You need to design a fault tolerant system for backing up critical data stored on a
single network server. The system is in operation five days per week, Monday
through Friday. You want to be able to restore the data as fast as possible after a
hard disk drive failure. Which fault tolerance system will best meet the
requirement of restoring the lost data as quickly as possible?
A. Install a RAID level 0 system in the server.
B. Install a RAID level 1 system in the server.
C. Install a RAID level 3 system in the server.
D. Install a RAID level 5 system in the server.
14. Maria is public school teacher. She needs to connect to internet every day for
additional resources. She only uses less than 1GB of data every day. When she
checked internet bills, it was way too much she had used in a month. She
suspects that someone is stealing her data usage. What security measures she
must have to prevent others from stealing her internet data?
A. Install IPS/IDS in her network.
B. Install firewall hardware.
C. Subscribe to VPN network.
D. Install rogue connection detection in her system.
Additional Activities
Amidst the challenges of the previous activities, you did well. That was
divine. The following activity will enrich your knowledge and skill of the
lesson learned. Enjoy doing this activity.
26
Is proactive network troubleshooting the same as preventive maintenance? Why or
why not
_________________________________________________________________________________
To start with, let us try to find out the learning competencies in which you
are going to master at the end of this lesson.
What I Know
__________________________________________________________________________________
Before you start the lesson on diagnostic software, you need to answer
the following activity below. You will be challenged to dig deeper into
your prior knowledge and previous experiences. This phase will guide
you in assessing yourself on how much you have known diagnostic
software.
ACTIVITY 1
Direction: Discuss your answer to the question below. Write your output in your
activity notebook.
__________________________________________________________________________________
You are done with Lesson 2 where you learned about proactive
network troubleshooting. So as a sort of review, kindly carry out the
activity below.
Direction: Read the questions below and answer it with a just keyword. Write your
answer in your activity notebook.
What’s New
__________________________________________________________________________________
Before you start the lesson on solving common network problems, you
need to do the activity below.
ACTIVITY 3. One-phraser
Direction: Identify the internet connection problem and give the possible solution.
Write your output in your activity notebook.
A. What will you do if suddenly you cannot connect to the internet? What could be
wrong? How could you fix it?
28
B. You are task to match security keys upon connecting, upon inputting the password
you find out that suddenly someone changes the password. What could be wrong?
How could you fix it?
C. You found out that the broadband router you use at home is malfunctioning. What
could be wrong? How could you fix it?
What is it
__________________________________________________________________________________
When you suddenly cannot connect to the Internet, any of several things could
be wrong. Use this checklist to find and solve common Internet connection problems.
Unplugged or loose network cables are one of the most common reasons why
you might suddenly find yourself unable to connect to the Internet. That's a problem
on wireless networks, but on most laptops the wireless-fidelity (Wi-Fi) radio can be
inadvertently shut off instead. On home networks, it's also possible that someone
unplugged the router.
Action: Ensure your wired or wireless network hardware is switched on and plugged
in.
29
2. Website Temporarily Offline
Action: Before assuming your Internet connection is faulty, try visiting several
popular Web sites rather than just one.
3. IP Address Conflicts
If your computer and another on the network both have the same IP address,
the conflict between them will prevent either from working properly online.
Action: To resolve an IP conflict, follow these instructions to release and renew your
IP address. If your network uses static IP addresses, manually change your IP to a
different number.
Step 1: Click Start > Run. In the Run window, enter “cmd” then click OK.
Step 2: On the command prompt, enter “ipconfig /release” then press [Enter].
Step 3: Once the IP address becomes 0.0.0.0, enter “ipconfig /renew” then press
[Enter].
30
4. Computer Firewall Malfunctions
Action: Use one of the options written below to measure the strength of your wireless
signal and try these ideas to expand the range of your Wi-Fi. Ideally, you should
place the router at a height in some central location and away from other cordless
devices. Make sure that the router is not placed near something metallic (like an
almirah or window grills) as that will weaken the wireless signals. Avoid mirrors as
they can reflect the wireless signals away from the desired direction. Wireless routers
generally ship with omni-directional antennas, but you can replace them with more
powerful uni-directional antennas and that will keep the signal from getting broadcast
in all directions.
Wi-Fi networks with encryption options like WPA or WEP turned on require
computers to use matching security keys when connecting. If someone changes the
encryption keys or password on the access point, devices that worked before will
suddenly be unable to establish sessions and Internet connections. Likewise (though
less likely), if the access point settings are changed to require using a specific Wi-Fi
channel number, some computers may be unable to discover it.
Action: Confirm that the Wi-Fi channel number and encryption keys on your router
have not recently changed (check with the network administrator if necessary). When
using a hotspot, follow the provider's instructors for signing in carefully.
Home networks that use broadband routers are easier to manage than those
without one, but technical glitches with the router can also prevent computers from
connecting to the Internet. Router failures are caused by overheating, excessive
traffic, or simply a faulty unit. Typical symptoms of a flaky router include computers on
the network not being able to obtain IP addresses, or the router console not
responding to requests.
31
Action: Check the router's lights and console if possible to ensure it is running and
responding properly. Troubleshoot and reset the router if necessary. Change the old
router if necessary.
Internet Service Providers (ISPs) can choose to block access from your
account if you fail to make payment or otherwise violate the provider's Terms of
Service. Especially when using paid hotspots that charge by the hour or day,
sometimes people forget to keep their subscription updated. Other common reasons
an ISP might block your account include exceeding bandwidth caps, sending spam e-
mail, and downloading illegal or inappropriate content.
Action: Contact your ISP if you suspect your account has been blocked.
9. Computer Glitches
Action: Check the computer and remove any malware that you will find. On Windows
computers, try resetting the network connection. Reboot the computer if necessary.
Those using satellite Internet service may notice they cannot connect to the
Internet during periods of very bad weather. Providers in dense urban areas
(including cellular Internet carriers) sometimes are unable to support peaks in
network traffic that causes sporadic outages for some customers. Finally, those who
subscribe to newer or more complex forms of Internet services (such as fixed
wireless broadband) may experience more downtime than others as providers
encounter more issues with relatively less mature equipment.
Action - If all else fails, contact your Internet provider to verify whether they are
experiencing an outage. Some providers also give advice on troubleshooting
problems connecting to their network.
32
What’s More
__________________________________________________________________________________
Direction: Solve the internet connection problems below. Show your answers in a
technological manner. Refer to the lessons discussed as working
reference. Write your output in a separate sheet.
Problems Action
3. IP Address Conflicts
9.Computer Glitches
10.Network Downtime
Direction: Imagine you are in a computer class and the computer you are
assigned has an IP Address conflicts with another computer. Give the
steps in resolving the problem.
33
What I Have Learned
__________________________________________________________________________________
What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson. You can do
it.
What I Can Do
__________________________________________________________________________________
What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.
34
Your performance will be assessed according to this rubric:
Assessment
_________________________________________________________________________________
Direction: Solve the network connectivity problems below. Write your output in
your activity notebook.
Situation 1: One fine Saturday morning, you and your sister decided to watch an
instructional video to answer her subject assignment. Your little siblings come out and
play all over the place. Suddenly, you find yourself unable to connect the internet.
35
Problem/s:
_________________________________________________________________
_________________________________________________________________
Action/Solution:
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Situation 2: How can bad weather condition extremely affect the network
connectivity problem of a user?
Problem/s:
__________________________________________________________________
________________________________________________________________
Action/Solution:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
______________________________________________________________
36
Additional Activities
Amidst the challenges of the previous activities, you did well. That was
divine. The following activity will enrich your knowledge and skill of the
lesson learned. Enjoy doing this activity.
37
Lesson
Server Stress Test
4
Welcome to your fourth lesson!
_________________________________________________________________________________
To start with, let us try to find out the learning competencies in which you
are going to master at the end of this lesson.
What I Know
__________________________________________________________________________________
Before you start the lesson on server stress test, you need to answer the
following activity below. You will be challenged to dig deeper into your
prior knowledge and previous experiences. This phase will guide you in
assessing yourself on how much you have known burn-in test.
Direction: Identify the answer on each item. Write your answer in your activity
notebook.
1. What do you call of a server stress test that test on the capability of each
computer?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test
38
2. What do you call of a server stress test signals the system to shutdown and
restart?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test
3. What do you call of a server stress test that has workloads that operate in user
level?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test
4. What do you call of a type of test where a computer, device or component is run
for an extended length of time in order to identify any potential problems?
A. Burn-in Test
B. Network Test
C. Restart Test
D. Shutdown Test
What’s In
__________________________________________________________________________________
You are done with Lesson 3 where you learned about solving common
network problems. So as a sort of review, kindly carry out the activity
below.
Direction: Write an opinion piece based on the topic. Follow the structure to
organize your thoughts.
Opinion:
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
________________
Reason and Example:
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
39
________________
What’s New
__________________________________________________________________________________
Before you start the lesson on server stress test, you need to do the
activity below.
Have you experienced being burnt out? Tell a situation you experienced about being
burnt out and what did you realize about the experience?
40
load. It’s best to uncover unstable components sooner rather than later, while they’re
still under warranty.
Running stress tests can also let you know if you need additional cooling in
your computer. If a graphics card or overclocked CPU consistently overheats and
shuts down during a stress test, it is time to dump the stock cooler, add a few case
fans, and possibly even consider liquid cooling.
The system functionality tests are individual tests of the capabilities of the
system. Some tests are run for every system, and some tests only run if the capability
exists in the system.
The System Stress Test consists of several server scenario workloads that
operate from the user level address space that is applied to the system to exercise
the system hardware, system-specific devices and drivers, network and storage
adapters and drivers, and any filter drivers that might be part of the system
configuration, such as multipath storage drivers, storage or file system filter drivers,
or intermediate layer network drivers.
3. Shutdown/Restart Test
The server test also includes a shutdown and restart test. This test signals the
system to shut down and restart. The test records the event log information related to
shutting down and restarting the system, such as vetoes that prevent shutdown, the
startup event, and any driver errors that are received after restarting the system. This
test makes sure that all device drivers in the system comply with system shutdown,
do not veto, and cleanly restart in the system without conflicting with other drivers.
41
What’s More
__________________________________________________________________________________
Direction: Perform the procedure of burn-in testing below. Follow the procedures
given. Write a reflection right after. Guide questions are provided. Write
your observations in the activity notebook.
42
3. If you have a slow
internet connection and
were looking to test a
network intensive
program, use the
networking tab info;
otherwise select the
performance tab.
Here are some live
graphs of your
computer. These will go
up when we test it.
5. Watch the
RAM/memory part -
RAM ranges from
256 MB to 512 MB to
1 GB to 2 GB and
even 4 GB. Note:
512 MB is 1/2 GB. If
you have KB's of
RAM, it's time to
upgrade. When you
open a program and
see the small box
with the programs
name while it is
loading, the program
is loading from the
hard disk to the RAM. The more RAM you have, the more programs you can
43
run at once.
6. Processor/CPU
- the spikier
graph
represents the
processor or
CPU of your
computer. Do
you have
enough "Intel"
inside? If the
computer
doesn't
respond as fast
as you like
when you click
something, you
may consider a
new computer with a faster processor.
7. If you already
tested your
computer, you
may wish to do so
again if you did not
read about RAM
and CPU first.
Close all programs
and wait for the
CPU to settle, then
If you see that
your processor of
RAM maxes out
and hits the top of
the graph area
under normal
activity, you
should consider
more RAM, or a new computer with a faster processor.
Guide Questions:
1. How was the experience doing the burn-test or stress test?
2. What was the result of the stress-test of your computer?
3. What would you like to recommend to the owner of the computer?
44
Your performance will be assessed according to this rubric:
Criteria Score
Adherence to instruction 10
Details 10
Accuracy 10
TOTAL 30
__________________________________________________________________________________
What you just did to the previous activity was neat. The next activity is
designed to process what you have learned from the lesson. You can do
it.
Direction: Answer the question below. Write your answer in your activity notebook.
Why is it necessary to perform stress test in your computer? Give at least two points
of its importance.
45
What I Can Do
__________________________________________________________________________________
What you just did to the previous activity was great enough. Keep up the
good work. The following task will showcase your skills and knowledge
gained and applied in real-life concerns and situations.
Direction: Carefully read the situation below and assess what type of stress test
should be applied. Write your answer in activity notebook.
Criteria Score
Accuracy 10
Details 10
Reasoning 10
TOTAL 30
46
Assessment
_________________________________________________________________________________
Direction: Identify the answer on each item. Write your answer in your activity
notebook.
1. What do you call of a server stress test that test on the capability of each
computer?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test
2. What do you call of a server stress test signals the system to shutdown and
restart?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test
3. What do you call of a server stress test that has workloads that operate in user
level?
A. System functionality tests
B. System stress test
C. Shutdown/Restart Test
D. Stress Server Test
4. What do you call of a type of test where a computer, device or component is run
for an extended length of time to identify any potential problems?
A. Burn-in Test
B. Network Test
C. Restart Test
D. Shutdown Test
47
Additional Activities
_________________________________________________________________________________
Direction: Give your opinion about the chart below. Would you agree to it? Why or
why not? Write your answer in a separate sheet.
Criteria Score
Accuracy 10
Details 10
Reasoning 10
TOTAL 30
48
Assessment
_________________________________________________________________________________
POST-TEST
Direction: Read each question in the left-hand column of the chart. Mark a check
opposite each question to indicate your answer.
I can… YES NO
- Explain what is meant by reactive network
troubleshooting
- Describe a systematic approach to problem solving
network situations
- Give examples of reactive network troubleshooting
- Identify the purpose of proactive network
troubleshooting
- Give examples of proactive network
troubleshooting approach
- Appreciate the importance of network security as a
proactive approach to network troubleshooting
- Identify common networking problems
- Solve network problems
- Perform network troubleshooting
- Repair of materials, components, or parts
- Replace defective components, or parts
- Use appropriate PPE
- Create contingency plan
- Respond to unplanned events or conditions
- Perform server stress test
49
Answer Key
_________________________________________________________________________________
Lesson 1
50
Answer Key
_________________________________________________________________________________
Lesson 4
51
References
Bay Networks, Inc., 1995. Network Management with Optivity for Windows.
Billerica, Massachusetts: Bay Networks, Inc.
Becta, 2003. Preventive Maintenance. ICT Advice. Updated last March 2004.
Available from: http://www.becta.org.uk/tsas.
“Cisco Press.” > Objectives | Cisco Press, March 12, 2012. Available from:
https:// www.ciscopress.com/articles/article.asp?p=2086239&seqNum=4 IT
[Accessed 12 June 2020].
Craft, Melissa, Poplar, Mark A., Watts, David V. and Willis, Will, 1999. Network +.
Scottsdale, Arizona: The Coriolis Group, LLC.
Groth, David, Bergensen, Ben and Catura-Houser, Tim, 1999. Network+ Study
Guide. Alameda, California: Sybex Inc.
52
“How to Maintain Your Server.” Boost IT, May 15, 2020. Available from:
https://www.boostitco.com/how-to-maintain-your-server/ [Accessed 12 June
2020].
“Repair vs Rectify - What's the Difference?” WikiDiff, August 17, 2020. Available
from: https://wiki diff.com/repair/rectify.
53
Sheldon, Tom, 1998. LANTIMES Encyclopedia of Networking, Electronic Edition.
Berkeley, Califoria: Osborne/McGraw-Hill.
TESDA Online Program: Log in to the site. Available from: https:// www.e-
tesda.gov.ph/course/view.php?id=73 [Accessed 16 August 2020].
Viloria, Leah and Reyes, Clint, 2020. Analysis and Design of Cybersecurity for
Salawagan National High School, Technical Report, MIT 315 IT Specialization.
Xavier University-Ateneo de Cagayan, Faber Hall.
wikiHow. “How to Stress Test a Computer.” wikiHow. wikiHow, August 10, 2018.
Available from: https:// www. wiki how .com/Stress-Test-a-Computer.
54