TVL - Computer Systems Servicing: Quarter 2 - Module 1: Set Network Configuration
TVL - Computer Systems Servicing: Quarter 2 - Module 1: Set Network Configuration
TVL – Computer
Systems Servicing
Quarter 2 – Module 1:
Set Network Configuration
Week 1-2
SELF-LEARNING MODULE
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
SELF-LEARNING MODULE
This module was collaboratively designed, developed and reviewed by educators both
from public and private institutions to assist you, the teacher or facilitator in helping
the learners meet the standards set by the K to 12 Curriculum while overcoming
their personal, social, and economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration their
needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of
the module:
As a facilitator you are expected to orient the learners on how to use this module.
You also need to keep track of the learners' progress while allowing them to manage
their own learning. Furthermore, you are expected to encourage and assist the
learners as they do the tasks included in the module.
ii
For the learner:
The hand is one of the most symbolized part of the human body. It is often used to
depict skill, action and purpose. Through our hands we may learn, create and
accomplish. Hence, the hand in this learning resource signifies that you as a learner
is capable and empowered to successfully achieve the relevant competencies and
skills at your own pace and time. Your academic success lies in your own hands!
This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in the
module.
iii
Assessment This is a task which aims to evaluate your
level of mastery in achieving the learning
competency.
1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don't forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.
We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!
iv
Lesson
This module was designed to help you with your journey in the world of
Information Technology. In addition it is also here to further help you master the
nature of Computer Systems Servicing. I am sure that you have used a computer
and had delved into the internet at least once in your lifetime. Was there ever a time
when the performance of your computer suddenly lagged? It can be frustrating at
times, especially when you are doing your research among others. Hence it is
important to do what we can in order to avoid such slackening of the system.
One of the ways to make sure there is no lagging of the system, is to make
sure that the network is configured correctly. Therefore, it is necessary that you learn
how to do this. Setting-Up Computer Networks (SUCN) are divided into four Learning
Outcomes which you will find below.
In addition, after going through this module, you are expected to:
1. Configure Peer to Peer Network
2. Share Folders and Printers
3. Inspect Network Configuration
4. Diagnose Network Problems
v
What I Know
Before we further delve into the realm of Information Technology, let us have
a quick check of your schema on the topic we are to explore. Let us see how much
you know about Network configuration.
Directions: Write the letter of the correct answer in a clean sheet of paper.
3. Which of the following does NOT belong to the group of permission level?
a. Reader Level c. Contributor Level
b. Utilization Level d. Co-Owner Level
4. Network tools make troubleshooting easier and minimize the time for
restoration. Which of these is NOT an example of network software tools?
a. Obkio c. Protocol Analyzer
b. Solar Winds d. Trouble Fix
6. What is the BEST way to protect your devices such as routers, switches and
database servers as they store crucial data?.
a. Use High-level password c. Use CHKDSK
b. Use DELETE command d. Use DxDiag
7. What particular radio button are you going to select in a sharing tab window?
a. Share this folder c. Maximum Allowed
b. Do not share this folder d. Allow this number of users
vi
communicate with other devices in the IP network. What does IP stand
for?
a. Indigenous People c. International Plan
b. Internal Proxy d. Internet Protocol
10. Which is capable of simultaneously making sharing of settings for files and
multiple objects possible?
a. Network Permission c. Sharing Tab
b. Tracing Objects d. Sharing Wizard
14. After opening the control panel, choosing printers and other hardware, add
printer and faxes then add printer. What window will appear?
a. Specify Printer Window c. Add Printer Wizard
b. Network Setting Screen d. Printer and Faxes General Tab
15. Checking the router on the interface by showing IP interface and running
config commands falls on what particular issue?
a. Configuration c. Connectivity Issue
b. Group policy d. Registry Editor Issue
vii
What's In
Think
What words come to mind when you hear the word CONFIGURATION?
Use a separate sheet for your answer.
8
What's New
Let us find out how much you already know about Common Network
Problems by doing the following activity.
Directions: Name the following network problem and troubleshoting tools. Use a
separate sheet for your answer.
Problem Description
1. Improper configuration of IP addresses and subnet
mask and routing IP to the next hop, the source will
not be able to reach the destination IP through the
network.
2. The port or interface on which the link is established
does not shut down.
Access Select
network option
Right click
icon which
and select
which is ______ allows the
properties
display in change
option
system adapter
tray settings
Click Ok
Button on
Click the
______ properties ______ property ______
button screen
Access
Click on
network
Create a
and sharing _________ ________
Homegroup
center
button
window
Select local
Homegroup shared
Click finish
password is _______ options and
Button
shown enter
password
10
What is It
Definition of Terms
IP Address - A unique 32-bit number that represents a device or
interface (e-g., network interfere card) either on your
Intranet or on the Internet. These addresses are
normally expressed in dotted-decimal format, with
four groups of numbers separated by dots. An IP
address is actually composed of binary numbers but
for convenience, it is usually expressed in decimal
format.
Subnet - Logical subdivision of a larger network.
Subnet - 32-bit number that masks an IP address, and breaks
mask/CIDR/Default the IP address into a network address and a host
subnet address. It is made setting all network bits to 1s and
setting all host bits to 0s.
Sub netting - The process of dividing a large network into smaller
network by adding “1”s to the network bits is a subnet
mask.
Host - A computer or device connected to the network.
Network Address - The address where the hosts are connected.
Default gateway - A default access point or IP router that a network
hosts or computer uses to send information to
another network or the Internet.
DHCP - Hands out IP address to host and keeps addresses
unique. It also provides a database of addressing
assigned and task the burden of assigning addresses
statically away from administrators.
Private IP addresses - Special non-routable IP addresses that are used in the
translated to public internet IP addresses when the
device needs to talk to the internet.
CIDR prefix/notation - The shorter representation of an IP address and its
(Classes Inter- associated routing prefix. It is composed of a slash (/)
Domain Routing and a decimal number. The decimal number is the
Prefix) numbered of 1s in a subnet mask. For ex.
Count the 1s: There are 8 bits per group/octe, and the
first three groups are all 1, so there are 24 1s all in
all, therefore we have a “/24” or in verbal “CIDR
twenty four” or slash twenty four.
11
Sometimes in order to gain connectivity in certain networks where a DHCP
server is not running, the configuration of a static IP address is required. The steps
required to setup up a static IP address are rather straightforward, but the process
is a bit different from Windows Vista and XP. Let’s go through the steps now and
configure a static IPv4 address in Windows 7.
There are several views which are available for the control panel; by default
the category view is used. When using the category view the option that you need to
select is called View network status and Tasks, as highlighted below. This will bring
you to the Network and Sharing Center.
12
The second way to gain access to the Network and Sharing Center is to utilize
the network icon which is displayed in the system tray when a network interface has
been enabled. When this icon is right-clicked the option to open the Network and
Sharing Center is given as shown below:
Once the Network and Sharing Center is open there is an option which allows
the change of adapter settings which is shown in the upper left hand corner of the
window.
13
wired and wireless interface is shown as examples. For the purposes of this article
the wired interface will be used as the interface being given a static IP Address.
Once the properties option is selected the interface properties windows will be
displayed. This screen gives the option to configure a number of different network
parameters. Since we want to change the interface IPv4 IP address this option must
be selected from the window. Once this option is selected the properties button will
be enabled; press the properties button.
14
Once the properties button is pressed the IPv4 properties window is displayed
which shows that the interface is currently configured to obtain both its IP address
and its DNS server information automatically.
15
For the purpose of this article the IP address 192.168.1.100 is used with a
subnet mask of 255.255.255.0 and a default gateway of 192.168.1.1. The DNS server
which will be configured is 4.2.2.2.
Once these options have been entered on the screen simply press Ok on both
property screens and the configuration of a static IP is complete.
HOMEGROUP Configuration in Windows 7
Once this option is selected, the HomeGroup window is displayed. The first
computer to be configured with a HomeGroup will be given the option to create a
homegroup. Once a HomeGroup is configured on a network it will actively broadcast
its existence to the other computers on the network (HomeGroup requires IPv6 to be
enabled)
Once a HomeGroup has been created on a network, all other participating
computers must join it. In order to join the HomeGroup.
When using the Home location, network discovery and HomeGroup are
enabled which allows the easy networking of Windows machines. The Work location
is similar to the Home location but disables the use of the HomeGroup functionality.
The Public location is the most secure and disables the various sharing
functionalities which are enabled then in the other locations.
16
Once the setting is selected the Set Network Location window is opened which
enables the configuration of a different network location.
If you choose one of the last two options, then you’ll need to click on Advanced
System Settings on the left menu:
17
Now you’ll finally be on the right screen, which should say System Properties.
Click on the “Change” button to rename the computer, which will pop up this dialog:
18
Now you can finally change the name of the computer. You could also change
the name of the workgroup to something more descriptive as well. You’ll have to
reboot after you make this change.
Addressing in networking
What is IP Address?
The Internet Protocol Address is a unique address that computing devices
such as personal computers and tablets use to identify itself and communicate with
other devices in the IP network. (MAC) address is assigned to the host Network
Interface Card (NIC) and is known as the physical address.
IP Address Classes
IP-based networks are classified depending on the size of the network. They may be
classified into five classes, but the most commonly used and discussed are Classes
A, B, and C.
19
Table 1. Five Classes of IP Address
• 255.0.0.0: Class A, which indicates that the first octet of the IP address is the
network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP address
are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion
• Class D addresses are used for multicast groups. There is no need to
allocate octet or bits to separate network and host addresses. Class E
addresses are reserved for research use only.
20
Share files and folders over the network
Whether you plan to share files and folders with other people who share your
computer or with those who connect to your computer over the network (or both),
the process for setting up shared resources is the same as long as the Sharing Wizard
is enabled.
To make sure the Sharing Wizard is enabled, click the Start button, type
“folder” in the Search box, and then click Folder Options. Click the View tab. In the
Advanced settings box, scroll down the list and make sure the Use Sharing Wizard
(Recommended) check box is selected.
The process for setting up shared resources is the same as long as the Sharing
Wizard is enabled With the Sharing Wizard at the ready, follow these steps to share
files or folders:
1. In Windows Explorer, select the folders or files you want to share. (You can select
multiple objects.)
2. In the Command bar, click Share. (Alternatively, right-click, and then click Share.)
3. With the Sharing Wizard, it’s quick and easy to share files with other people.
4. In the file sharing box, enter the name of the user with whom you want to share
files or folders, and then click Add. You can type a name in the box or click the arrow
to display a list of available names. Repeat for each person you want to add. The list
includes all of the users who have an account on your computer, plus everyone.
• Reader Users with this permission level can view shared files and run shared
programs, but cannot change or delete files. Selecting. Reader in the Sharing
Wizard is equivalent to setting NTFS permissions to Read & Execute.
• Contributor This permission level, which is available only for shared folders
(not shared files), allows the user to view all files, add files, and change or
delete files that the user adds. Selecting. Contributor sets NTFS permissions
to Modify.
• Co-owner Users who are assigned the Co-owner permission have the same
privileges that you do as the Owner: They can view, change, add, and delete
files in a shared folder. Selecting. Co-owner sets NTFS permissions to Full
Control for this user.
21
• Double-click a share name to open the shared item.
• Open a search folder that shows all of the folders or files you’re sharing.
7. When you’re finished with these tasks, click done. Creating a share requires
privilege elevation. But, after a folder has been shared, the shared folder is available
to network users no matter who is logged on to your computer—or even when nobody
is logged on.
22
What's More
Legend:
B- Beginner D- Developing AP- Approaching Proficiency P- Proficient A- Advance
Recommended Equipment
• Linksys 300N router
• A computer running Window 7
• Ethernet patch cable
Procedures:
23
Step 1 - Plug one end of the Ethernet patch cable into “Port 1” at the back of the
router.
- Plug the other end of the Ethernet patch cable into the network port on the
NIC on your computer.
- Plug in the power cable of the router if it is not already plugged in.
- Turn on your computer and log on as an administrator. Click search.
- Type settings then press enter, choose Network and internet.
- Click on ‘ chage adapter options’
- Type settings then press enter, choose Network and internet.
- Click on ‘ chage adapter options
Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:” field?
2. What are the items listed in the “This connection uses the following items:” field?
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the fields of
the “Use the following IP address:” area?
- Click OK. The “Internet Protocol (TCP/IP) Properties” window closes.
- Click OK.
- Restart your computer.
Step 4 - Log on to Windows as an administrator.
- Check the lights at the back of the NIC. These lights will blink when there
is network activity, then Choose Search.
- Type cmd press enter.
- Type ipconfig/all, and then press the Enter key.
Activity Questions:
24
What I Have Learned
1. __________ It is the software that intercepts and records the data packet flow
between the source and the destination.
2. __________ It means the time for the process and is calculated in milliseconds.
3. __________ Allows users to read, write, rename, and delete files in the folder
and its subfolders, but not create new files.
4. __________ It contains trace events for Windows components.
5. __________ It simplifies and automates many of the common troubleshooting
steps and solution implementations for networking troubles
6. __________ is a number that is used to identify a device on the network.
7. __________ is a command used to find out the IP address of a certain network
you are connected to.
8. _________ Used for small networks, implemented by ISP’s for client
subscription.
9. _________ indicates the network portion of an IP address.
10. _________ It contains several types of files, including text, Windows Registry,
XML, and others that store additional troubleshooting information.
25
What I Can Do
Now its time to apply your knowledge in real-life situations. Answer the following
questions in complete sentences.
1. Why is there a need for you to know on how to configure computer network ?
___________________________________________________________________________
___________________________________________________________________________
2. What are the problems you encountered upon doing the network
configuration?
___________________________________________________________________________
___________________________________________________________________________
3. Why is it important to know how to share files and folders over the network?
___________________________________________________________________________
___________________________________________________________________________
26
Assessment
A B
_____1. Software Issue a. It sets NTFS permissions to Modify.
b. It allows users to read, write, rename, and delete files
_____2. Tracing in the folder and its subfolders, but not create new files.
c. The port or interface on which the device is connected
_____3.NTFS Permission or configured can be physically down or faulty due to
the source host not being able to communicate with the
_____4. Network Testing destination host.
d. Compatibility issues and version mismatch, the
_____5. Contributor transmission of IP data packets between the source
and destination is interrupted.
_____6. Sysdm.cpl e. It is the actual measurement of the network's state of
operation over some time.
_____7.Connectivity f. It is a command used to find out the IP address of a
Problem certain network you are connected to.
g. Is a predefined collection of providers for a specific
_____8. Share function, such as file sharing or wireless LAN access.
h. A permission that controls network access to a
_____9. Ipconfig particular resource.
i. They provide extremely granular control over an object.
_____10. Change For each user to whom you want to grant access, you
can specify exactly what they’re allowed to do.
j. It is very secure and it disables the various sharing
functionalities which are enabled in the other
locations.
k. A command route that you can take to open up system
properties in the quickest way.
27
Directions: Write the letter of the correct answer in a clean sheet of paper.
1. What action should you take, when you are analyzing and diagnosing problem in
a computer system and network?
a. Diagnose c. Testing
b. Examine d. Troubleshoot
2. The following are some of the guidelines for testing configured computer system
and network, EXCEPT;
a. Check the physical connection. c. Check body temperature
b. Verify that you can log in. d. Check network configuration
3. There are three routes to open up system properties. Which one is the quickest?
a. Open control panel in start Menu c. Gpedit.src
b. Sysdm.cpl d. Sysconfig
Additional Activities
28
Research different way of sharing network resources with following consideration;
i. Operating System version
ii. Network Adapter types ( wired or wireless)
iii. Brand of Network devices
Answer Key
29
30
"CSS Setting Up Computer Network Module" CBLM
Book
References
What I Know Whats New
1. A 1.Network Ip Issue
2. B 2.Port faulty
3. B 3.Obkio
4. D 4.Software Issue
5. C 5.Traffic Overload
6. A 6.Cable Problem
7. A 7.Connectivity Problem
8. C 8.Ping
9. D 9.Trace Route
10. D 10.Protocol Analyzer
11. C
12. D
13. A
14. C
15. A
What I have learned Formative Assessment
1. Protocol Analyzer Test I Test II
2. RTT
3. Change 1. D 1. D
4. ETL File 2. G 2. C
5. NDF 3. I 3. B
6. IP Address 4. E 4. B
7. IPconfig 5. A 5. A
8. Class C 6. K
9. Subnetmask 7. C
10. CAB File 8. H
9. F
10. B
Rosalie P. Lujero, Ronaldo V. Ramilo, Michael Angelo C. Gatchalian: ICT Learner's
Material Grade 10. Published by Department of Education-Instructional Materials
Council Secretariat(DepEd-IMCS)
Electronic Resources:
“Basic Network Troubleshooting Steps And Tools” Retrieved from
https://www.softwaretestinghelp.com/network-troubleshooting-steps-tools/
"File Sharing" Retrieved from
http://www.techopedia.com/definition/16256/file-sharing
"Fundamentals of PC repair" Retrieved from
http://www.ustudy.in/ce/hard/u1
"Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best Anti-virus
| Speeding Up Windows XP/Windows Vista/Windows 7 | Networking Tips | UNIX
and LINUX Usability | Installation Procedure Of Various Operating Systems |
computer repair | computer problems" Retrieved from
http://101-computer- troubleshooting.blogspot.com/2009/09/directx-diagnostic-
tooldxdiag.html-
"Ping Tim Fisher" Retrieved from
http://pcsupport.about.com/od/commandlinereference/p/pingcommand.htm-
"Inspect and Test Networks” Retrieved from
http://www.tesdaonlinecourse.gov
31
DISCLAIMER
This Self-learning Module (SLM) was developed by DepEd – Division of General
Santos City with the primary objective of preparing for and addressing the
new normal. Contents of this module were based on DepEd’s Most Essential
Learning Competencies (MELC). This is a supplementary material to be used
by all learners in General Santos City in all public schools beginning SY 2020-
2021. The process of LR development was observed in the production of this
module. This is version 1.0. We highly encourage feedback, comments, and
recommendations.
32
1