0% found this document useful (0 votes)
136 views

Tle Grade 9 - Icts CSS - Las - 4RTH QTR

The document provides information about using various command line tools to check network connectivity and configuration. It explains how to use the ping, ipconfig, tracert and netstat commands to test connectivity, view network adapter details and active connections. Examples are given for using each command along with screenshots of sample outputs.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views

Tle Grade 9 - Icts CSS - Las - 4RTH QTR

The document provides information about using various command line tools to check network connectivity and configuration. It explains how to use the ping, ipconfig, tracert and netstat commands to test connectivity, view network adapter details and active connections. Examples are given for using each command along with screenshots of sample outputs.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

9

Note: Practice Personal Hygiene protocols at all times 1


INFORMATION AND COMMUNICATIONS TECHNOLOGY
COMPUTER SYSTEMS SERVICING 9
Name of Learner: Grade Level:

Section: Date:

LEARNING ACTIVITY SHEET


CHECK NETWORK CONNECTIVITY OF EACH TERMINAL

Background Information for Learners


Ping is a network administration utility or tool used to test connectivity on an Internet Protocol (IP)
network. It also measures the latency or delay between two computers.
To test network connectivity with ping:
Open the Command Prompt or Terminal. Every operating system has a command line interface that
will allow you to run the Ping command. The Ping command operates virtually identically on all
systems.
• If using Windows, open the Command Prompt. Click the Start button and enter "cmd" into the
Search field. Windows 8 users can type "cmd" while on the Start screen. Press Enter to launch
the Command Prompt.
• If using Mac OS X, open the Terminal. Open your Applications folder, and then open the
Utilities folder. Select Terminal.
• If using Linux, Open a Telnet/Terminal window. It is most often found in the Accessories
folder in your Applications directory.
Type ping followed by an IP address or a website address then press Enter key to execute the
command. Here is a brief explanation of commonly used ping commands:
• ping 127.0.0.1 (This is a "loopback ping" - your computer trying to talk to itself. If the
loopback step fails, it might be because the TCP drivers are corrupted, the network adapter might
not be working, or another service is interfering with IP.)
• ping (This will ping the IP address of a device like a local computer, remote server or any
client that receives an IP address to verify that it is reachable and that you can communicate with
it properly.) Example: ping 192.168.1.1 (this is the default IP address of NETGEAR routers)
• ping (This command will test for the Internet connectivity and DNS functionality.)
Example: ping google.com
Ping test in Windows 10
1. Click the Search icon (magnifying glass)
in the bottom left-hand corner and type
"cmd" into the search bar or press windows
logo key + R then type cmd.

Note: Practice Personal Hygiene protocols at all times 2


2. Select the Command Prompt app - it will
be at the top of the list of search results as
the best match.

3. A black box with a flashing cursor will


open; this is the Command Prompt. Type
“ping” and then hit the Space bar on your
keyboard.

4. Type in the address you’d like to ping


and then hit the Enter key on your
keyboard. Wait for the ping results.

To obtain detailed information about your network adapters and connections, use
the ipconfig command. Open Command Prompt, type ipconfig, and press Enter.

Getting cmd nic info (information about the Network Interface Card) by running ipconfig
If you add the /all switch to the ipconfig command, you can get to a whole new level of detail: DNS
information, the MAC (Media Access Control) (in the Physical Address field), and other

Note: Practice Personal Hygiene protocols at all times 3


information about each network component. Check out the picture below to see a sample of what
you get from the "ipconfig /all" command.

Running ipconfig /all to get detailed NIC (Network Interface Card) information
You can get other useful cmd nic info from the netstat command, which lets you see the network
connections that are active between your system and any other systems on your network or the
internet.

Netstat shows the active network connections and open ports


Note: Practice Personal Hygiene protocols at all times 4
If you add the -a parameter to the netstat command, you can get a list with all the connections and
listening ports, as seen in the image below.

Netstat -a displays the active network connections, open ports and listening ports
Here are some of the most useful networking commands to know for managing and troubleshooting
your home network.
TRACERT (Trace route)
- it sends out a data packet as a way to troubleshoot any network issues you might have, but it instead
tracks the route of the packet as it hops from server to server.
Sample usage:

The command outputs a line-by-line summary of each hop, including the latency between you and that
particular hop and the IP address of that hop (plus domain name if available).

PATHPING
Similar to tracert except more informative, which means it takes a lot longer to execute. After
sending out packets from you to a given destination, it analyzes the route taken and computes packet loss
on a per-hop basis.
Sample usage and output:
Note: Practice Personal Hygiene protocols at all times 5
Use this switch to flush your DNS cache:
ipconfig /flushdns
Flushing the DNS cache can help when your internet is working, but a specific website or server is
unreachable for some reason (e.g. a website times out and won’t load).
GETMAC
Every device that’s compliant with IEEE 802 standards has a unique MAC address (Media Access Control).
The manufacturer assigns MAC addresses and stores them in the device’s hardware. Some people use MAC
addresses to limit which devices can connect to the network.
Sample usage and output:

NSLOOKUP
stands for Name Server Lookup. It packs a lot of power, but most users won’t need that power. For
regular folks like you and me, its main use is finding out the IP address behind a certain domain name.
Sample usage and output:

Note: Practice Personal Hygiene protocols at all times 6


NETSTAT
a tool for network statistics, diagnostics, and analysis.
Sample usage and output:

NETSH
stands for Network Shell. It’s a cmd command for networking that lets you view and configure
pretty much every network adapter on your system in more detail and granularity than any of the preceding
commands.

Note: Practice Personal Hygiene protocols at all times 7


see all commands within a context:

You can drill down one more layer to find all of the subcommands within those commands:

netsh wlan show drivers


Network Shell’s complex enough to deserve an entire article of its own. Just know that if you want
to get really technical with your network configuration, you’ll probably need to use this command-line
utility.

LO 2 Set Network configurations (TLE_IACSS9-12SUCN)

Activity 1
Direction: Read the questions carefully and choose the letter of your answer. Write the letter of your
answer before the number.
______ 1. If you want to test the connectivity on an Internet Protocol (IP) network, which of the
following command you will use?
a. cmd command c. ping command
b. loopback ping d. ip address
______ 2. If you want your computer trying to talk to itself, what do you call this step that tests the
TCP/IP protocol?
Note: Practice Personal Hygiene protocols at all times 8
a. Ping command c. ipconfig command
b. cmd command d. loopback ping
______ 3. You are the new IT admin, and you need to find the network configuration. What should
you use?
a. Ipconfig c. Ping
b. Cmd d. Netstat
______ 4. To get the most detailed network configuration, which of the following command should
you use?
a. ipconfig /all c. ipconfig /renew
b. ipconfig d. ipconfig /most
______ 5. You want to find out the IP address of a hostname, like google.com, what you should
use?
a. Nslookup c. tracert /ping
b. Ping d. cmd
______ 6. You want to find out different IP statistics such as current connections and any active
ports, what command should you use?
a. Netstat c. Ping
b. Naslookup d. Cmd

______ 7. It is similar to tracert except more informative, what networking command you should use?
a. Tracert c. Ping
b. Netstat d. Pathping
______ 8. If you wanted to ping a host but also follow the path at which it pings, what would you
use?
a. Tracert c. tracert /ping
b. Ping d. ipconfig /most
______ 9. To get the most detailed network configuration, use this command.
a. ipconfig /all c. ipconfig /renew
b. ipconfig
d. ipconfig /most

______ 10. If you want to see the network connections that are active between your system and any
other systems on your network or the internet. What network command will you use?
a. Tracert c. Ping
b. Netstat d. Pathping

Activity 2
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided
.

Note: Practice Personal Hygiene protocols at all times 9


Completeness (3 points) - Does your response directly answer each part of the
question(s)?
Knowledge (3 points) - Does your response clearly show you have read and understand
the lesson content by correctly defining key terms and summarizing concepts?
Analysis (2 points) - Does your response provide analysis to the larger concepts of the
lesson?
Writing Skills (2 points) - Do you write clearly, in complete sentences, with minimal
errors in grammar and spelling?

Reflection 1

Reflection
Complete the statement:
What I learned in this activity.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________

References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII

Note: Practice Personal Hygiene protocols at all times 10


2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. May 2016
4. Testing network connectivity with ping
https://kb.netgear.com/989/Testing-network-connectivity-with-ping
5. Command Prompt (CMD) - 8 network commands you should know
https://www.digitalcitizen.life/command-prompt-advanced-networking-commands

Answer Key
Activity 1
1. C
2. D
3. A
4. A
5. A
6. A
7. D
8. A
9. A
10. B

Activity 2
Answer may vary

Note: Practice Personal Hygiene protocols at all times 11


INFORMATION AND COMMUNICATIONS TECHNOLOGY
COMPUTER SYSTEMS SERVICING 9
Name of Learner: Grade Level:
Section: Date:

LEARNING ACTIVITY SHEET


DIAGNOSE AND REPAIR ANY PROBLEM OR FAULT IN THE NETWORK SYSTEM
Background Information for Learners
Basic Network Problems
• Cable Problem: The cable which is used to connect two devices can get faulty, shortened or can
be physically damaged.
• Connectivity Problem: The port or interface on which the device is connected or configured can
be physically down or faulty due to which the source host will not be able to communicate with
the destination host.
• Configuration Issue: Due to a wrong configuration, looping the IP, routing problem and other
configuration issues, network fault may arise and the services will get affected.
• Software Issue: Owing to software compatibility issues and version mismatch, the transmission
of IP data packets between the source and destination is interrupted.
• Traffic overload: If the link is over utilized then the capacity or traffic on a device is more than
the carrying capacity of it and due to overload condition the device will start behaving
abnormally.
• Network IP issue: Due to improper configuration of IP addresses and subnet mask and routing
IP to the next hop, the source will not be able to reach the destination IP through the network.

Network Troubleshooting Flowchart

Note: Practice Personal Hygiene protocols at all times 12


Steps Involved in Network Diagnostics
Here steps to troubleshoot and diagnose various network problems like IP, connectivity,
wireless connection, etc.
Troubleshooting IP Problems
In the TCP/IP protocol suite, if we are not able to reach at the destination IP address and not able to
find the route to reach the next hop at any point in the network, then we will use PING and
TRACEROUTE tools for troubleshooting the cause and location of the issue.
The generic steps to troubleshoot the IP related issues in the network include:
• Firstly, locate the pair of devices between the source and the destination host between which
the connectivity issue has occurred.
• Once you locate the devices using the tools, the fault can be due to a physical connectivity
issue. Thus, check the physical connections all over the path.
• There can be a fault in the LAN connectivity as well if you are working in a LAN network.
So, check the LAN connections. The local port can be faulty or down due to which the source
cannot be able to reach the destination IP.
• One of the reasons of the fault can be the router connectivity issue while traveling through
various paths to reach the destination. Hence check that if the router is defined properly at
each of the intermediate hops.
• Check the configuration settings.

Troubleshooting Local Connectivity Issues


Once on the broad level, if you find that there is an issue in the LAN connectivity, then in order to
locate the root cause and to resolve it, you should follow the below steps:
• If the destination and the source are of the identical subnet mask, then try to ping the
destination IP.
• Else, if the destination is of some other subnet mask then try to ping the gateway IP address
of the router.
• Now, if both the ping fails, then first check that in the configuration settings, if both the subnet
mask and route to be followed to reach the destination are defined properly in the routing table
or not?
• Once you are done with the configuration part and found everything OK, then check if your
source host is able to ping some another hop in the LAN network other than the destination
host or route to that?
• If you are not able to ping to another device then there can be many reasons for this. It may
even be a configuration issue, a physical connectivity issue, and repetitive IP address entry
issue.

Correcting the Repetitive IP address Entry Issue


For rectifying the duplicate entry of an IP issue, disconnect the doubtful device from the LAN
and also make the interface on which the device was connected shut down.
Now ping the device from some another device of the same subnet or LAN network. If the ping is
OK, then it indicates that the IP is being used by some other device as well on the network. From the
ARP table of the device, find out its MAC address and modify the IP address according to planning.
Note: Practice Personal Hygiene protocols at all times 13
But if the problem persists still, then there will be a physical connectivity or configuration issue in it.
Troubleshooting Physical Connectivity Issues
The list of faults that come under this category are:
1. Improper connection of cables
2. Router, switch or hub port is faulty or down.
3. Traffic overload on the link or particular interface.
4. Configuration issue at layer-1.

Let's take a look at the above in detail.


1) Checking Cable connectivity Issue: The cables are used for connections, based on the type of
connectivity. Thus, make sure that the suggested and suitable cable is used to make a physical
connection between any two devices.
If connections are found ok, then maybe the cable is faulty, so check the connectivity by replacing
the existing cable with a newer one. Still, if the problem persists, then check the port or interface on
which the link is terminated. There is a possibility for the port to be faulty.
2) Port Faulty Scenario: Check that the port or interface on which the link is established is not shut
down. Verify the duplex mode and speed as well. If the port is up and still the problem persists, then
there are indicator lights that are present on each of the device to show the running status of the port.
From the indicator lights, check if the port is physically radiating or down. If the port is physically
malfunctioning then it will appear by light status. In this situation, configure the link on some other
free port or interface.
3) Traffic overload: If there is more traffic than the carrying capacity at a link or interface then at
some point it will start behaving abnormally. Thus, verify these criteria to ensure smooth running.
4) Configuration Issue: Check the router configuration on the interface by show ip interface and
show running-config commands.
Troubleshooting Routing Problems
When we route the data packets in the network, then the chances for occurrences of fault are
usual. Thus, depending on the type of fault, we will prepare our plan for resolving the faults.
The kind of fault that occurs between the source and destination hosts while floating data
packets in a network are listed below:
• The route is not defined in the router between the source and destination.
• A wrong Routing protocol is used to find out the route to the next hop or destination.
• Software related fault at the router.
• Any filter or firewall may be barring the entry of data packets to the destination node.
• There may be configuration faults that arise at the source router end.

How to proceed for resolution:


• To find out the resolution, the first step is to locate the hop between the source and the
destination where the problem has occurred.
• The process verifies the IP connectivity and routing protocols connectivity at each hop starting
from the source host towards the destination one.

Note: Practice Personal Hygiene protocols at all times 14


• We can also use the traceroute tool to locate the hop where the problem has arise. But this is
not helpful in all the cases. Hence, it is better if we proceed with the first one.
• Once we locate the problematic hop, then login to that router via telnet and then try to ping
the source and destination host.
• If the ping is not successful, then verify the routing table for routes between the source and
destination. If routes are not defined then configure the IP routes with the subnet mask and
default route in the router.
• In condition, if the ping responses with only a few percentages of success, then there may be
multiple paths that are defined to reach the destination. But out of multiple paths, one is failing
to reach the destination. The cause for this is that a routing loop can occur in the path. To
rectify this, trace the looping hop, and correct the configuration.
• After rectification of the above steps, if still, the problem persists, then check the routing
protocol used, and change the protocol in accordance with the network.
• The configuration issues at a particular router can be checked using a command like show ip
interface for interface related faults, show ip access-group for finding out ant firewall or filter
is configured in the network and you can check what is allowed to pass through it, show
version for uptime and show running-config for the overall configuration.
Troubleshooting Upper-layer Faults
After checking the physical connectivity, Local connectivity, IP connectivity, and
Routing issues, if you are still not finding a resolution for the fault, then there is a possibility for the
fault to be the in transport and application layer protocol.
A fault can arise due to the following reasons:
• The data connection is down.
• A packet filter or firewall is blocking the incoming or outgoing traffic.
• Particular service on the server is down.
• There can be an authentication and access issue between the client and the server host.
• Software incompatibility or version mismatch issues between the source and the destination
host.

Depending upon the category of fault, we take the rectification steps.


• In the condition of firewall barring the traffic to flow through the network, we look out for a
way to move the source host in the network in such a way in which the firewalls can be avoided
or bypassed.
• For service down issues, take measures to make it up, or align another server to deliver the
service.
• For the authentication process issue, we can deploy checks with the help of the software where
the authentication is failing, and then based on the results you can rectify the issue.
• For version mismatch and compatibility issue, upgrade your system so that both will be
compatible with each other.

Troubleshooting Wireless Network Connection Issue

Note: Practice Personal Hygiene protocols at all times 15


Whenever you connect your Tablet, mobile phone or Laptop with the WI-FI device, and if you
are not able to connect then check all the LAN or WAN cable connections.
The Ethernet cable should be connected tightly and check the light status on the device. If it is
not green then the cable or port may be faulty. Thus, change the port and cable connections with a
newer one.

2) After verification of all of the above points, if the connection is still not through, then verify the
WI-FI network adaptor settings.
For windows laptop or PC, go to control panel, select the network connections option and
check what is the status on the wireless network adaptor? It should be enabled. If it is not enabled
then click on the enable key and mark the status as enabled.
Also, check if the airplane mode on a laptop or PC is disabled. If it is enabled, then it will not allow
connecting with a wireless network.
Network Adaptor Settings

3) After checking all the above settings, if the status is still not connected then check the wireless
access point and SSID settings. After correction of the desired settings, the status will change from not
connected to acquiring network address to connect. At this point, the client also allocates the IP address
to the requesting device.

Network Connection Settings

Note: Practice Personal Hygiene protocols at all times 16


4) If still, the problem persists, then click on the diagnose option from the wireless network connection
status menu to find out the cause.
5) After performing all the above troubleshooting steps, if you are not able to connect to the network
still, then there may be other reasons like some firewall or packet filter is barring you for using the
network, and there could be a problem with the authentication protocol used etc.
6) To resolve these issues, reconfigure all the network settings and verify the IP reachability by using
PING.
These are the basic troubleshooting steps. If you are still not able to connect to the network,
then you can restart your system and then try to connect and consult with some network settings expert.
LO 2 Install network cables (TLE_IACSS9- 12SUCN-IV)

Activity 1
Direction: Write true if the statement is correct but if it’s false, change the underlined word or
group of words to make the statement true. Write your answer on the space provided.
__________________ 1. If you are not able to reach at the destination IP address, then you will use
PING and LOOPBACK PING tools for troubleshooting the cause and location of the issue.
__________________ 2. In troubleshooting IP Problems, once you locate the devices using the tools,
the fault can be due to a PHYSICAL CONNECTIVITY issue.
__________________ 3. If you’re troubleshooting LOCAL CONNECTIVITY issues, if the
destination and the source are of the identical subnet mask, then try to ping the destination IP.
__________________ 4. For rectifying the duplicate entry of an IP issue, disconnect the doubtful
device from the LAN and also make the interface on which the device was connected shut down.

Note: Practice Personal Hygiene protocols at all times 17


__________________ 5. If you are checking cable connectivity issue, if connections are found ok,
then maybe the NETWORK is faulty, so check the connectivity by replacing the existing cable with
a newer one.
__________________ 6. In you are checking the configuration issue, check the router configuration
on the interface by show ip interface and show running – CONFIG COMMANDS.
__________________ 7. If you are connecting your Tablet, mobile phone or Laptop with the WI-FI
device, and if you are not able to connect then check all the LAN or WAN cable connections.
__________________ 8. The ETHERNET CABLE should be connected tightly and check the light
status on the device. If it is not green then the cable or port may be faulty.
__________________ 9. Troubleshooting Upper-layer Faults, a fault can arise due to HARDWARE
INCOMPATIBILITY or version mismatch issues between the source and the destination host.
__________________ 10. In troubleshooting Wireless Network Connection Issue, check if the
airplane mode on a laptop or PC is disabled. If it is DISABLED, then it will not allow connecting
with a wireless network.

Activity 2
Direction: Read each sentence carefully. Write whether the Network Problem is Cable Problem,
Connectivity Problem, Configuration Issue, Software Issue, Traffic overload, Network IP issue,
on the blank provided.

1. __________________________________ 2. ________________________________

3. _________________________________ 4. _________________________________

Note: Practice Personal Hygiene protocols at all times 18


5. _________________________________ 6. _________________________________

Activity 3
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided.
Completeness (3 points) - Does your response directly answer each part of the
question(s)?
Knowledge (3 points) - Does your response clearly show you have read and understand
the lesson content by correctly defining key terms and summarizing concepts?
Analysis (2 points) - Does your response provide analysis to the larger concepts of the
lesson?
Writing Skills (2 points) - Do you write clearly, in complete sentences, with minimal
errors in grammar and spelling?

Note: Practice Personal Hygiene protocols at all times 19


Reflection
Complete the statement:
What I learned in this activity.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. May 2016
4. Basic Network Troubleshooting Steps And Tools
https://www.softwaretestinghelp.com/network-troubleshooting-steps-tools/

Answer Key
Activity 1 Activity
1. False – TRACEROUTE 1. Connectivity Problem
2. True 2. Software Issue
3. True 3. Traffic overload
4. True 4. Configuration Issue
5. False – Cable
6. True 5. Cable Problem
7. True 6. Network IP issue
8. True
9. False – Software incompatibility
10. False - Enabled

Activity 3
1. answer may vary

Note: Practice Personal Hygiene protocols at all times 20


INFORMATION AND COMMUNICATIONS TECHNOLOGY
COMPUTER SYSTEMS SERVICING 9
Name of Learner: Grade Level:

Section: Date:

LEARNING ACTIVITY SHEET


CONFIGURE NETWORK INTERFACE CARD (NIC)
Background Information for Learners
A network interface card (NIC) is a hardware component without which a computer cannot be
connected over a network. It is a circuit board installed in a computer that provides a dedicated network
connection to the computer. It is also called network interface controller, network adapter or LAN
adapter.
Purpose
• NIC allows both wired and wireless communications.
• NIC allows communications between computers connected via local area network (LAN) as
well as communications over large-scale network through Internet Protocol (IP).
• NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware
circuitry so that the physical layer processes and some data link layer processes can run on it.
Types of NIC Cards

Internal Network Cards


In internal networks cards, motherboard has a slot for the network card
where it can be inserted. It requires network cables to provide network
access. Internal network cards are of two types:
1. Peripheral Component Interconnect (PCI) connection
2. Peripheral Component Interconnect (PCI) connection

External Network Cards


In desktops and laptops that do not have an internal NIC, external
NICs are used. External network cards are of two types: Wireless and USB
based. Wireless network card needs to be inserted into the motherboard,
however no network cable is required to connect to the network.

Note: Practice Personal Hygiene protocols at all times 21


Configuring Network Connections for Windows
The following steps show you how to configure your network adapter on a Windows 10 system:
1. Click the Start icon (or press the Start button on
the keyboard), and then tap or click Settings.

The Settings page appears.

2. Click Network & Internet.

The Network & Internet page


appears.

3. Click Ethernet.

The Ethernet settings page


appears.

4. Click Change Adapter Options.

The Network Connections


page appears.

This page lists each of your


network adapters. In this case,
Note: Practice Personal Hygiene protocols at all times 22
only a single wired Ethernet
adapter is shown. If the device has
more than one adapter, additional
adapters will appear on this page.
5. Right-click the connection that you want to
configure and then choose Properties from the
contextual menu that appears.

This action opens the Ethernet


Properties dialog box.

6. To configure the network adapter card settings,


click Configure.

The Properties dialog box for


your network adapter appears.

This dialog box has seven tabs that let you configure the adapter:
General: Shows basic information about the adapter, such as the device type and status.
Advanced: Lets you set a variety of device-specific parameters that affect the operation of the adapter.
About: Displays information about the device’s patent protection.
Driver: Displays information about the device driver that’s bound to the NIC and lets you update the
driver to a newer version, roll back the driver to a previously working version, or uninstall the driver.
Details: With this tab, you can inspect various properties of the adapter such as the date and version
of the device driver. To view the setting of a particular property, select the property name from the
drop-down list.
Note: Practice Personal Hygiene protocols at all times 23
Events: Lists recent events that have been logged for the device.
Power Management: Lets you configure power management options for the device.
When you click OK to dismiss the dialog box, the network connection’s Properties dialog box closes
and you’re returned to the Network Connections page. Right-click the network adapter and choose
Properties again to continue the procedure.
Review the list of connection items listed in the Properties dialog box.
Client for Microsoft Networks: This item is required if you want to access a Microsoft Windows
network. It should always be present.
File and Printer Sharing for Microsoft Networks: This item allows your computer to share its files
or printers with other computers on the network.
• Internet Protocol Version 4 (TCP/IPv4): This item enables the client computer to
communicate by using the version 4 standard TCP/IP protocol.
• Internet Protocol Version 6 (TCP/IPv6): This item enables version 6 of the standard TCP/IP
protocol. Typically, both IP4 and IP6 are enabled, even though most networks rely primarily
on IP4.
If a protocol that you need isn’t listed, click the Install button to add the needed protocol.
A dialog box appears, asking whether you want to add a network client, protocol, or service.
Click Protocol and then click Add. A list of available protocols appears. Select the one you want to
add; then click OK.
To remove a network item that you don’t need (such as File and Printer Sharing for Microsoft
Networks), select the item, and click the Uninstall button.
For security reasons, you should make it a point to remove any clients, protocols, or services that you
don’t need.

Note: Practice Personal Hygiene protocols at all times 24


To configure TCP/IP settings,
✓ click Internet Protocol (TCP/IP);
✓ click Properties to display the TCP/IP Properties dialog box;
✓ adjust the settings;
✓ and then click OK.
The TCP/IP Properties dialog box lets you choose among these options:
• Obtain an IP Address Automatically: Choose this option if your network has a DHCP server
that assigns IP addresses automatically. Choosing this option dramatically simplifies
administering TCP/IP on your network.
• Use the Following IP Address: If your computer must have a specific IP address, choose this
option and then type the computer’s IP address, subnet mask, and default gateway address.
• Obtain DNS Server Address Automatically: The DHCP server can also provide the address
of the Domain Name System (DNS) server that the computer should use. Choose this option
if your network has a DHCP server.
• Use the Following DNS Server Addresses: Choose this option if a DNS server isn’t available.
Then type the IP addresses of the primary and secondary DNS servers.

Network classes
Internet addresses are allocated by the InterNIC, the organization that administers the Internet.
These IP addresses are divided into classes. The most common of these are classes A, B, and C.
Classes D and E exist, but are not generally used by end users. Each of the address classes has a
different default subnet mask. You can identify the class of an IP address by looking at its first octet.
Following are the ranges of Class A, B, and C Internet addresses, each with an example address:
• Class A networks use a default subnet mask of 255.0.0.0 and have 0-127 as their first octet. The
address 10.52.36.11 is a class A address. Its first octet is 10, which is between 1 and 126,
inclusive.
• Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as their first octet.
The address 172.16.52.63 is a class B address. Its first octet is 172, which is between 128 and
191, inclusive.
• Class C networks use a default subnet mask of 255.255.255.0 and have 192-223 as their first
octet. The address 192.168.123.132 is a class C address. Its first octet is 192, which is between
192 and 223, inclusive.
In some scenarios, the default subnet mask values do not fit the needs of the organization,
because of the physical topology of the network, or because the numbers of networks (or hosts)
do not fit within the default subnet mask restrictions. The next section explains how networks
can be divided using subnet masks.

Subnetting

A Class A, B, or C TCP/IP network can be further divided, or subnetted, by a system


administrator. This becomes necessary as you reconcile the logical address scheme of the Internet
(the abstract world of IP addresses and subnets) with the physical networks in use by the real world.

Note: Practice Personal Hygiene protocols at all times 25


Default gateways

If a TCP/IP computer needs to communicate with a host on another network, it will usually
communicate through a device called a router. In TCP/IP terms, a router that is specified on a host,
which links the host's subnet to other networks, is called a default gateway. This section explains how
TCP/IP determines whether or not to send packets to its default gateway to reach another computer
or device on the network.

LO 2 Install network cables (TLE_IACSS9- 12SUCN)


Activity 1
Direction: Write the steps on how to configure your network adapter on a Windows 10 system.
Write the letter of your answer on the space provided.

_______ 1. Click Ethernet.


_______ 2. Click the Start icon (or press the Start button on the keyboard), and then tap or
click Settings.
_______ 3. Click Network & Internet.
_______ 4. To configure the network adapter card settings, click Configure.

_______ 5. Click Change Adapter Options.


_______ 6. Right-click the connection that you want to configure and then choose
Properties from the contextual menu that appears.

Activity 2
Direction: Identify the tabs of a dialog box to configure the network adapter:
1. ______________ 2. ____________________________

Note: Practice Personal Hygiene protocols at all times 26


3. ____________________________
4. _____________________________

5. ____________________________ 6. _____________________________

Note: Practice Personal Hygiene protocols at all times 27


Activity 3
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided.
Completeness (3 points) - Does your response directly answer each part of the
question(s)?
Knowledge (3 points) - Does your response clearly show you have read and understand
the lesson content by correctly defining key terms and summarizing concepts?
Analysis (2 points) - Does your response provide analysis to the larger concepts of the
lesson?
Writing Skills (2 points) - Do you write clearly, in complete sentences, with minimal
errors in grammar and spelling?

Note: Practice Personal Hygiene protocols at all times 28


Reflection
Complete the statement:
What I learned in this activity.
What I have learned.
________________________________________________________________________________
______________________________________________________________________
________________________________________________________________________________
______________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. 2016
4. What is network interface card (NIC)
https://www.tutorialspoint.com/what-is-network-interface-card-nic
5. Understanding TCP/IP addressing and subnetting basics
https://support.microsoft.com/en-ph/help/164015/understanding-tcp-ip-addressing-and-
subnetting-basics
6. Configuring Network Connections for Windows 10
https://www.dummies.com/programming/networking/configuring-network-connections-
windows-10/
Answer key

Activity 1 3. Driver
1. General 4. Detail
2. Advance 5. Events
6. Power Management

Activity 5. F
1. B 6. D
2. E 7. G
3. I 8. A
4. C 9. H
Activity 3
Answer may vary

Note: Practice Personal Hygiene protocols at all times 29


INFORMATION AND COMMUNICATIONS TECHNOLOGY
COMPUTER SYSTEMS SERVICING 9
Name of Learner: Grade Level:

Section: Date:

LEARNING ACTIVITY SHEET


CONFIGURE CLIENT DEVICE SYSTEMS SETTING
Background Information for Learners
Wireless Router Configuration
Now we can start to configure wireless router, and use Linksys E1200 Wireless Router as an
example. This router supports 802.11n and backward compatible with 802.11g, 802.11b and
802.11a standard. The supported authentications are WEP (Wired Equivalent Privacy), WPA (Wi-
Fi Protected Access) and WPA2 authentication with pre-shared key or RADIUS server. WPA2 is
the second version of the WPA standard. Using some encryption is always better than using none, but
WEP is the least secure of these standards, and you should not use it if you can avoid it. WPA2 is the
most secure of the three.

Ok, you need to key in username and password in order to log on to router management page. Not
sure about username and password? Check the router manual to find out.
These are general router settings that you need to configure:
• WAN (Wide Area Network) Setting
• LAN (Local Area Network) Setting
• DHCP (Dynamic Host Configuration Protocol) Setting
After that, these are additional wireless settings that you need to configure, so that you can connect
computer to it wirelessly.
• SSID and Other Basic Wireless Settings
• Wireless Network Authentication

WAN (Wide Area Network) Setting


First go to Setup tab and click Basic Setup, this is the place you set public IP address provided by
your ISP(Internet Service Povider) in order to access Internet. It can be one of these 6 options:
Automatic Configuration – DHCP - Choose this option to obtain an IP address automatically from
your ISP. (For most cable modem users). Optionally key in a name for this router. The default MAC
address is set to the WAN’s MAC address on the router.
Note: Practice Personal Hygiene protocols at all times 30
Sometimes you will need to clone MAC address under MAC Address Clone tab. This feature is
required by cable modem users with the service registration via computer network card’s MAC
address. That means the ISP will authenticate your network card’s MAC address whenever you use
the connection service. If so, you will need to click clone MAC address in order to clone the computer
network card’s MAC address to your network router. If you are not sure, check with your ISP technical
support. If you don’t know how to locate MAC address, click here to check MAC address of network
card.
Static IP - Choose this option to set static IP information provided to you by your ISP. You are
required to type in all network information manually if select this option. This option is mostly used
by business users. Lot of works if use this option, try to avoid this if possible.
PPPoE (Point to Point Protocol over Ethernet) - Choose this option if your ISP uses PPPoE. Your
ISP will provide you with a username and password. This option is typically used for most DSL
services.
PPTP (Point-to-Point Tunneling Protocol) - Same as PPPoE, This option is mostly used by DSL
service users with provided username, password and IP information.
L2TP (Layer 2 Tunneling Protocol) - This option is mostly used by DSL service users is Europe
with provided username, password and L2TP dedicated server information.
Telstra Cable: This option is mostly used by DSL service users with provided username, password
and Heart Beat dedicated server information.
As a cable modem user, I will choose Automatic Configuration – DHCP option. I won't clone MAC
address because the service registration is tied to cable modem's MAC address.

LAN (Local Area Network) Setting


At the same setup page, set up the IP address for the router. This will be the router/gateway IP
address that you will set on your network computers. The LAN IP address is private in your home
network and cannot be seen from the internet. I set my router with IP 192.168.1.1 and subnet mask
255.255.255.0. I also assign a name (Home-E1200) to the router.

Note: Practice Personal Hygiene protocols at all times 31


DHCP (Dynamic Host Configuration Protocol) Setting
Most of the routers has built-in DHCP server, so does this router. The DHCP server will automatically
assign an IP address to the computers in your wireless network, so that you don’t have to configure
them manually. At the same setup page, you must specify the starting IP address, number of users and
lease time. Lease time is the length of time for the IP assigned to the computer.
For my case, the starting IP Address is 192.168.1.150, maximum dhcp users is 50 and I set the Lease
Time for 1 day (0 minutes).

SSID (Service Set Identifier) and Other Basic Wireless Settings


Now proceed to click Wireless tab and you will see Basic Wireless Settings. These are unique
features for wireless router, it’s not available for those wired routers:
Manual way is used to configure this router.
Network Mode – Many different wireless operating modes are supported by this router, it can be
Mixed (802.11b/g/n), Wireless-B/G Only (802.11b/g), Wireless-G Only (802.11g), Wireless-B Only
(802.11b), Wireless-N Only (802.11n). In this case I select Wireless-G Only mode as most of my home
computers run with 802.11g wireless network adapter. Plan to upgrade all wireless adapters to support
802.11n soon.
Network Name (SSID) – The SSID is the network name of this wireless network and must be identical
for all devices in the network. When wireless clients (home computers or other wireless devices) first
start up, they scan the wireless frequency band for special beacon frames that contain SSID sent by
wireless routers or access points, finally connect to the network that preferred by users.
SSID is case-sensitive and must not exceed 32 alphanumeric characters. Change it and don’t use
default SSID due to security concern. I set it as home-network.
Wireless Channel - There are 13 wireless channels (1-13) supported. All devices in your wireless
network must use the same channel in order to function correctly. I select 11 in this case. If not too
sure which channel to use, you can make use of this inSSIDer wireless scanning tool to identify good
channel with no interference.

Note: Practice Personal Hygiene protocols at all times 32


Wireless SSID Broadcast - If you enable this feature, the router will broadcast SSID and will be
detected by wireless clients in the network. If you enable this feature, make sure you enable wireless
network authentication shown in section below.

Click WI-FI Protected Setup option if your wireless client supports this feature, you can either press
WI-FI Protected Setup button on client to join the wireless network or register the PIN for the client
to join the wireless network.

Wireless Network Authentication


This router supports WPA/WPA2 mixed mode, WPA2, WPA or legacy WEP authentication
with pre-shared key and RADIUS authentication.
Usually home users will use WEP, WPA personal or WPA2 personal security mode. Use WPA2
personal, WPA personal or WPA2/WPA Mixed Mode if supported by your wireless adapter, then
set pre-shared key for authentication. Choose AES as your WPA or WPA2 algorithm if required.
You can only use WPA2 Enterprise, WPA Enterprise or WPA/WPA2 Enterprise Mixed Mode if you
have set up RADIUS server. This is the authentication with RADIUS server instead of pre-shared key.
Note: Practice Personal Hygiene protocols at all times 33
If use WEP option, you need to set passphrase with 64- and 128-bits encryption. However my advice
is you should not use WEP if possible as it’s too vulnerable.

You don't have to follow all settings I used above, you can just tune the wireless router according to
your needs.
Please note if your wireless router supports latest WPA3 wireless security standard, then you should
use it as it allows users to choose passwords that are easier to remember and protects data traffic even
if a password is compromised after the data was transmitted.
One last thing that I would like to tell you, if you wish to connect all home computers to access to
Internet via this wireless router, please select NAT or Gateway mode in Setup->Advanced
Routing page and save the settings.

Wireless Setup - Connecting Wireless Router


Try to place the router in position that will best cover your wireless network. Anyway, if you
are not sure where is the best position to place, just leave it next to DSL/Cable modem to ease the
setup, you can always reposition it later to get optimized performance once you have built up your
wireless network.
Here is how to do physical setup, connect your cable/DSL modem to the WAN port of your
wireless router by using straight Ethernet cable, so that the computers which are connected to wireless
router later can access to Internet via the modem. Also, you need to ensure that your cable/DSL modem
is configured in bridge mode, so that it can work well after connecting to wireless router. If you need
more idea, here is an example of configuring DSL modem in bridge mode, feel free to take a look.

Note: Practice Personal Hygiene protocols at all times 34


After that, use another straight cable to connect wireless router’s LAN port to your computer’s Ethernet
port. Usually there are up to 4 or 5 LAN ports on wireless router for you to connect to computers with
network cable.
The reason for connecting wireless router to your computer is to configure the router for the first time
through web browser. You can remove the cable after completing wireless router configuration.

After completing physical network setup, we need to decide what IP addresses should be used for
wireless router and computers, so that each computer on network and wireless router are able to
communicate with each other by using IP address later. If you want, you can click here for more
explanation to do IP logical network setup and design.
For the wireless network setup, I use IP address 192.168.1.1-254, netmask 255.255.255.0. I also plan
to assign 192.168.1.1 to wireless router and this IP address is default gateway for other computer on
wireless network.
LO 3 Set router/Wi-fi/wireless access point/repeater configuration (TLE_IACSS9- 12SUCN)

Activity 1
Direction: Put a ✓ if you think the answer is correct otherwise X if the answer is incorrect.

When you are given the task to set up a new 802.11n wireless home router. To do a good job, what
you must consider when configuring the router?

_______ 1. Enable MAC address filtering.

_______ 2. Change the default router’s name, login id and password.

_______ 3. Use the highest level of security mode supported by the clients.

_______ 4. Change SSID.

_______ 5. Use Static IP instead of PPPoE.

Note: Practice Personal Hygiene protocols at all times 35


_______ 6. Enable SSID broadcast.

_______ 7. Choose the channel with the least interference.

_______ 8. Enable remote management for convenience.

_______ 9. Use ‘NO-network’ as passphrase.

_______ 10. Change the DHCP

Activity 2
Direction: In this activity you will create a Wireless Setup (Connecting Wireless Router) using the
objects below.

A Computer Desktop A wireless router A Modem an Internet

Reflection 4
Complete the statement:
What I learned in this activity.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
___________________________________

Note: Practice Personal Hygiene protocols at all times 36


References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. 2016
4. Wireless Router Configuration/Wireless Setup - Connecting Wireless Router
https://www.home-network-help.com/wireless-router.html

Answer Key
Activity 1
1. ✓
2. ✓
3. ✓
4. ✓
5. X
6. X
7. ✓
8. X
9. X
10. X

Note: Practice Personal Hygiene protocols at all times 37


INFORMATION AND COMMUNICATIONS TECHNOLOGY
COMPUTER SYSTEMS SERVICING 9
Name of Learner: Grade Level:

Section: Date:

LEARNING ACTIVITY SHEET


CONFIGURE SECURITY/FIREWALL/ADVANCED SETTINGS
Background Information for Learners
Basic router security
Every router should have a strong password to help keep out the bad guys. Some new routers come
with default passwords, but you should change these during setup. Creating a new, complex, unique
password for your wireless router is easy. It should only take a couple of minutes. Specific instruction s
vary from one router to another, but the basic idea is this:
1. All wireless routers have a numerical address. If you’ve lost the instructions, you can probably
find yours by searching online for your router’s model number.
2. In Security Settings, create a name for the router, and a password, and then select a type of
encryption, like WAP2. Do not name your router something that can easily be associated with
you, such as your last name.
3. Make sure you choose a complex password that you can remember, but one that’s not easy to
guess.
4. Don’t forget to save the updated information when prompted. Your router is now secured
against roaming cybercriminals.
Different types of encryption
Depending on your router, you might have options for different kinds of encryption. The most
common router encryption types are WEP, WPA and WPA2. Commercial routers from brands like
Netgear, Linksys, and ASUS often include:
• Wired Equivalent Privacy (WEP): This is the oldest and most popular form of router
encryption available. However, it is the least secure of all encryption protocols. It uses radio-
waves that are easy to crack. For every data packet that is transmitted it uses the same
encryption key.
• Wi-Fi Protected Access (WPA): The Wi-Fi Alliance came up with WPA to offer an
encryption protocol without the shortcomings of WEP. It scrambles the encryption key
thereby getting rid of the problems caused by hackers cracking the radio-waves. This is also
a less secure form of encryption, partly because of legacy hardware and firmware that still
used WEP as their main protocol. However, it is a significant improvement over WEP.
• Wi-Fi Protected Access 2 (WPA2): This encryption type is currently the most secure and
most recent form of encryption available. You should always select WPA2 if it is available. It
not only scrambles the encryption key but is also does not allow the use of Temporal Key
Integrity Protocol or TKIP which is known to be less secure then AES.
Note: Practice Personal Hygiene protocols at all times 38
• Advanced Encryption Standard: When possible, you’ll want to use AES on top of WPA2
or WPA. This is the same type of encryption used by the federal government to secure
classified information. Routers made after 2006 should have the option to enable this on top
of WPA2.
Setting up WEP, WPA or WPA2 Personal wireless security on a Linksys wireless router
Step 1:
Access the router’s web-based setup page by opening a web browser such as Internet Explorer,
Google Chrome or Safari. On the Address bar, enter your router’s local IP Address then press
[Enter]. When the login prompt appears, enter your router’s User name and Password.
NOTE: The default local IP Address of Linksys routers is 192.168.1.1, while the default
password is “admin” and user name field is left blank.

QUICK TIP: If you personalized the router's User name and Password, use those credentials
instead. If you have lost or forgotten them, you need to reset the router.
Step 2:
You will now be redirected to the main screen of the setup page. On the setup page, click
the Wireless tab then click the Wireless Security sub-tab.

Step 3:
On the Configuration View section, click the Manual radio button.

Other router models, especially the older versions do not have the Manual option and may
require you to scroll down the page until you reach the Wireless Security section instead.

Step 4:
You can now select from the four (4) options.

Note: Practice Personal Hygiene protocols at all times 39


Your Linksys router supports four (4) of the most commonly used wireless security modes which
you can choose from: WEP, WPA Personal, WPA2 Personal, and WPA2/WPA Mixed
Mode. Here’s a table that best compares the different security types for your reference:
Security Rank Number of
Characters
WEP Basic 40/64-bit (10
Wired Equivalent Protocol characters)
128-bit (26
characters)

WPA Personal Strong 8-63 characters


Wi-Fi Protected Access®
Personal
WPA2 Personal Strongest 8-63 characters
Wi-Fi Protected Access® 2
Personal

WPA2/WPA Mixed Mode WPA2: 8-63 characters


Strongest
WPA: Strong

WPA, WPA2, and WPA2/WPA security modes are highly recommended over WEP for a higher
level of security. Follow the instructions below to know how to set up each security mode.

WPA2/WPA Mixed Mode


Step 1:
On the Security Mode field, select WPA2/WPA Mixed Mode and enter your Passphrase.
NOTE: The Passphrase must consist of at least eight (8) characters and is case-sensitive.

NOTE: WPA2/WPA Mixed Mode is also referred to as PSK2-Mixed for some Linksys
routers. Refer to the image below for an example.

Note: Practice Personal Hygiene protocols at all times 40


Step 2:
Click .

WPA2 Personal
Step 1:
On the Security Mode field, select WPA2 Personal and enter your Passphrase.
NOTE: The Passphrase must consist of at least eight (8) characters and is case-sensitive.

NOTE: WPA2 Personal is also referred to as PSK2 for some Linksys routers. Refer to the
image below for an example.

Step 2:
Click .
WPA Personal
Step 1:
On Security Mode, select WPA Personal and enter your Passphrase.
NOTE: The Passphrase must consist of at least eight (8) characters and is case-sensitive.

NOTE: WPA Personal is also referred to as WPA Pre-Shared Key or PSK Personal for some
Linksys routers. Refer to the images below for an example.
WPA Pre-Shared Key

Note: Practice Personal Hygiene protocols at all times 41


NOTE: The WPA Shared Key in the image above is the network password you will use to
connect wirelessly.
PSK Personal

NOTE: The Pre-shared Key in the image above is the network password you will use to
connect wirelessly.
Step 2:
Click .
NOTE: If you encounter a problem in selecting the type of security you wish to have, you
should reset your router. If problem still persists, you should upgrade your router's firmware to
its latest version.

What Is a Firewall?
A firewall is the digital equivalent of a traffic cop that polices your network boundaries. It can be
used to prevent traffic from entering and/or leaving your network.
There are several different types of firewalls, both hardware and software-
based. Operating systems often feature a software-based firewall, while the firewall in your router is
hardware-based.

Firewalls help prevent internet-borne, port-based attacks. Firewalls can also stop an infected computer
inside your network from attacking other computers by preventing malicious traffic from leaving your
network.

All routers offer basic firewall protection, but many have more sophisticated firewall functionality.

Note: Practice Personal Hygiene protocols at all times 42


Windows has had a built-in software-based firewall since Windows XP, while Mac OS X and later
has a firewall that must be enabled.

Check if Your Router Has a Built-In Firewall


To make sure your router has a built-in firewall, open a browser window and log into your router's
administrative console by typing in the router's IP address. Your router is likely to have what is known
as a non-routable internal IP address, such as 192.168.1.1 or 10.0.0.1.
Below are some of the standard admin interface addresses used by some of the more common wireless
router manufacturers. Consult your specific router's manual for the correct address.
• Linksys: 192.168.1.1 or 192.168.0.1
• D-Link: 192.168.0.1 or 10.0.0.1
• Apple: 10.0.1.1
• ASUS: 192.168.1.1
• Buffalo: 192.168.11.1
• Netgear: 192.168.0.1 or 192.168.0.227
After you log in to your router's administrative console, look for a configuration page
labeled Security or Firewall. This indicates that your router has a built-in firewall as one of its
features.
Enable and Configure Your Router's Built-In Firewall
1. Access your router's configuration page.
2. Locate an entry labeled Firewall, SPI Firewall, or something similar.
3. Select Enable.
4. Select Save, and then Apply.
5. After you select Apply, your router will likely state that it is going to reboot in order to apply
the settings.
6. Configure your firewall by adding firewall rules and access control lists that meet your
connectivity and security needs.

When you have completed setting up your firewall the way you want it, test your firewall to ensure
that it is doing what you're expecting it to.

Advanced router settings


If you want to get deep down and dirty with your router you can check the port options. A port on a
router is ‘virtual’ and basically allows data to flow in and out of the router as well as letting software

Note: Practice Personal Hygiene protocols at all times 43


applications download. Routers automatically manage network traffic traveling via their virtual ports
and your router ports will be automatically set.
Router configuration pages differ across different manufacturers but the option to open or block a set
of ports should be available on all of them. Opening and closing ports allows you to set what network
traffic comes into your router, and of course your computer. But the following ports should always
be kept open:
• Port number 80 enables internet access (HTTP) for example browsing websites
• Port number 443 enables secure internet access (HTTPS) required when shopping and
banking online
• Port number 25 is the port through which you can access emails (SMTP)
These ports are enough for normal browsing and email work. And if you want to really tighten security
you can set the router to have only these ports open.
That said additional ports may be needed depending on your software needs, for instance downloading
specific software. Thankfully in these cases the software itself opens the required port.
However, please remember a firewall, whether it’s hardware-based on your router or software-based
as part of your internet security software, won’t protect you if your click on a malicious link in an
email or on a website. By clicking on these types of links you’re actually inviting the malware into
your system, like holding your front door open for a burglar.

LO 3 Set router/Wi-fi/wireless access point/repeater configuration (TLE_IACSS9- 12SUCN)

Activity 1
Direction: Identify the missing words or group of words on Setting up WEP, WPA or WPA2
Personal wireless security on a Linksys wireless router. Answers are provided in the box.
Wireless Security Configuration View Wireless Web Browser
Web Page Manual IP Address WEP
WAP Personal WPA2 Personal Username Password

Step 1:
Access the router’s web-based setup page by opening a ___________ such as Internet Explorer,
Google Chrome or Safari. On the Address bar, enter your router’s local __________ then press
[Enter]. When the login prompt appears, enter your router’s _________ and ________________.
Step 2:
You will now be redirected to the main screen of the setup page. On the setup page, click
the __________ tab then click the ___________ sub-tab.
Step 3:
On the _________________ section, click the _________ radio button.
Step 4:
You can now select from the four (4) options.

Note: Practice Personal Hygiene protocols at all times 44


Your Linksys router supports four (4) of the most commonly used wireless security modes which
you can choose from: _______, _____________, _________________, and WPA2/WPA Mixed
Mode.
Activity 2
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided.
Completeness (3 points) - Does your response directly answer each part of the
question(s)?
Knowledge (3 points) - Does your response clearly show you have read and understand
the lesson content by correctly defining key terms and summarizing concepts?
Analysis (2 points) - Does your response provide analysis to the larger concepts of the
lesson?
Writing Skills (2 points) - Do you write clearly, in complete sentences, with minimal
errors in grammar and spelling?

Reflection
Complete the statement:
What I learned in this activity.
____________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

Note: Practice Personal Hygiene protocols at all times 45


References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. 2016
4. Router security: How to setup Wi-Fi router securely
https://us.norton.com/internetsecurity-how-to-how-to-securely-set-up-your-home-wi-fi-
router.html
5. Step-by-step guide to configuring your router as a firewall - to give you extra protection
https://www.bullguard.com/blog/2015/12/step-by-step-guide-to-configuring-your-
router-as-a-firewall-to-give-you-extra-protection
6. Setting up WEP, WPA or WPA2 wireless security
https://www.linksys.com/ca/support-article?articleNum=139152
7. How to Enable Your Wireless Router's Built-in Firewall
https://www.lifewire.com/how-to-enable-your-wireless-routers-built-in-firewall-
2487668

Answer Key

Activity 3
Step 1:
Access the router’s web-based setup page by opening a web browser such as Internet Explorer,
Google Chrome or Safari. On the Address bar, enter your router’s local IP Address then press
[Enter]. When the login prompt appears, enter your router’s User name and Password.
Step 2:
You will now be redirected to the main screen of the setup page. On the setup page, click
the Wireless tab then click the Wireless Security sub-tab.
Step 3:
On the Configuration View section, click the Manual radio button.
Step 4:
You can now select from the four (4) options.
Your Linksys router supports four (4) of the most commonly used wireless security modes which
you can choose from: WEP, WPA Personal, WPA2 Personal, and WPA2/WPA Mixed
Mode.

Activity 2
Answers may vary

Note: Practice Personal Hygiene protocols at all times 46


INFORMATION AND COMMUNICATIONS TECHNOLOGY
COMPUTER SYSTEMS SERVICING 9
Name of Learner: Grade Level:

Section: Date:

LEARNING ACTIVITY SHEET


UNDERTAKE FINAL INSPECTION OF THE CONFIGURATION
Background Information for Learners
Testing Your Computer Network
You’ve set up all your network switches, plugged in all the cables, and configured all your
computers. One task remains before you can declare your network finished: You must verify that the
network works as expected.
Here are a few simple tests you can conduct to make sure your network is functional.
Check the physical connections.
Check that the Link light — the little red or green light next to the RJ-45 port — is lit on every
computer. You must check this light both on the computer itself and on the switch or router the
computer is plugged into. If this light is not on, you have a connection problem — most likely a bad
cable.
Verify that you can log on.
When you’re sure the physical connections are good, you should attempt to log on to each of your
network computers using a valid domain user account.
Check the network configuration.
Click the Start button, type cmd and press Enter. Then, enter the command ipconfig /all and press
Enter.
This command will spit out numerous lines of information. The line you’re looking for should
resemble this:

IPv4 Address. . . . . . . . . . . : 192.168.1.125(Preferred)

If this part of the output does not show a valid IP address, you need to check that your IP
configuration is set correctly and that your DHCP server is working.
Verify that the computers can ping each other.
Another basic test you should perform is to use the ping command from a command prompt to make
sure that the computers on your network can contact one another.

Note: Practice Personal Hygiene protocols at all times 47


Checking Network Configuration
If hardware isn't at fault, you may have a fundamental network configuration problem. Often the Event
Log or Device Manager gives these problems away, but if they don't, you can use another batch of
tools to check the computer's network configuration.
ipconfig
If your computer can't communicate with others on your LAN, after you check the Event Log and
Device Manager, use the ipconfig command-line utility to see whether your computer has a valid IP
address. Check other computers on the LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs, Accessories, Command
Prompt), type the following command:

ipconfig /all

The results should look something like this:


Windows IP Configuration
Host Name . . . . . . . . . . . . . . : myvpc-hb
Primary Dns Suffix . . . . . . . : mycompany.com
Node Type . . . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : Yes
WINS Proxy Enabled. . . . . . : No

Ethernet adapter Local Area Connection:


Connection-specific DNS Suffix . :
Description . . . . . . . . . . . . . . : Intel 21140-Based PCI Fast Ethernet Adapter
Physical Address. . . . . . . . . . : 00-03-FF-DD-CA-5F
DHCP Enabled. . . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::ed10:dff9:693c:803d%8(Preferred)
IPv4 Address. . . . . . . . . . . . . . .: 192.168.15.108(Preferred)
Subnet Mask . . . . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . . . . .: Friday, October 20, 2006 5:55:11 PM
Lease Expires . . . . . . . . . . . . . . : Friday, October 27, 2006 5:55:23 PM
Default Gateway . . . . . . . . . . . : 192.168.15.1
DHCP Server . . . . . . . . . . . . . . : 192.168.15.1
DHCPv6 IAID . . . . . . . . . . . : 201327615
DNS Servers . . . . . . . . . . . : 192.168.15.1
NetBIOS over Tcpip. . . . . . . . : Enabled

(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that mention Tunnel
adapters.)
The most important items to look for are the following:
• Host name—this should be set to the desired name for each computer. If you can correspond
with some computers but not others, be sure that the ones that don't work are turned on and
correctly named. Make sure that you don't have two computers with the same name, and that
none of the computer names is the same as the workgroup name.
Note: Practice Personal Hygiene protocols at all times 48
• IP address—this should be set appropriately for your network. If your LAN uses Internet
Connection Sharing, the address will be a number in the range 192.168.0.1 through
192.168.0.254. If your LAN uses DHCP for automatic configuration, your network manager can
tell you whether the IP address is correct. Networks with cable/DSL sharing routers usually use
numbers starting with 192.168.x where x is a number from 0 to 15.
If you see a number in the range 169.254.0.1 through 169.254.255.254, your computer is set for
automatic configuration, but no DHCP server was found, so Windows has chosen an IP address
by itself. This is fine if your LAN uses this automatic configuration system. However, if there
should have been a DHCP server, or if you use Internet Connection Sharing or a hardware Internet
Connection router, this is a problem. Restart the ICS computer or the router, and then restart your
computer and try again.
• Network mask—this usually looks like 255.255.255.0, but other settings are possible. At the
least, all computers on the same LAN should have the same network mask.
Each computer on the same LAN should have a similar valid IP address and the same network mask.
If they don't, check your network configuration. The built-in Windows "Repair" function may also be
used to help fix problems with DHCP-based (automatic) IP address assignment.

Computer
You can check your computer's identification and workgroup or domain membership setup from the
Computer window. To do so, click Start, Computer. Look in the Details pane at the bottom of the
screen for the computer name and domain or workgroup name, as shown in Figure A.

Figure A. Your computer's name and workgroup or domain membership is displayed at the bottom
of the Computer window.
On a Windows Workgroup network, the workgroup name should be the same on all computers on
your workgroup LAN. All of the computer names must be different from each other.
Note: Practice Personal Hygiene protocols at all times 49
NOTE:
None of your computers can use the workgroup or domain name as its computer name. For
example, if your workgroup is MSHOME, you can't also name a computer MSHOME. If
you find this on one of your computers, change that computer's name.
Network Connections
You can manually check all installed network protocols and services and their configuration by
viewing Network Connections and viewing the properties for Local Area Connection. To view
this screen, click Start, Network. At the top of the Network window, click Network and Sharing
Center. In the left pane of that window, click Manage Network Settings. Then, right-click your
Local Area Connection icon (or the appropriate wireless connection icon) and select Properties.
Confirm that each required protocol is installed and correctly configured. In general, the settings on
each computer on your LAN should match, except that the IP address differs (usually only in the last
of its four dot-separated numbers). If your LAN uses Automatic IP address configuration, you need
to use the ipconfig command, described earlier, to check the settings.
To Check Network Status on Windows 10
1st Method
1. The Network icon in the lower right corner of the screen can tell you a lot about your
network connection and the state it’s in.

2. The Network icon represents the current status of your network connection. Depending on the
current status of your connection, the appearance of this icon will change. The following are
the different icons you might see and their corresponding meanings.

Represents an Ethernet connection and successful connection to the internet.

Represents an Ethernet connection with no connection to the internet.

No network adapters are detected or enabled.

You’re connected to WiFi and the Internet.

Note: Practice Personal Hygiene protocols at all times 50


Connected to WiFi, but no Internet connection is detected (also known as
limited connectivity).
A wireless adapter is detected and there are wireless networks in range, but
you’re not connected to one.
Your wireless network adapter is recognized, but no WiFi networks are found
and you’re not connected to WiFi.
3. If you want to see even more information about your connection status, click the Network
icon itself regardless of what status it currently displays.

or

4. This will bring up the Network menu. Within your network menu, you can see the status of
your current connection. If your device is capable of connecting to WiFi, you will also see a
list of wireless networks your device is currently in range of.

o The status underneath each network name represent either your device's current
connection status to that network, or additional attributes of that network.
▪ Connected, secured: This means you are connected to this WiFi network, and the
network is secured with a password.
▪ Connected: This means you are connected to this WiFi network. This network may
not be password protected.
▪ Secured: This is an available WiFi network that requires a password to
successfully connect to.
▪ Open: This is an available WiFi network with no password required.
Note: Practice Personal Hygiene protocols at all times 51
o The icons to the left of each network name indicate an individual network's signal
strength. This will vary depending on your physical distance from each network's point of
origin, among other factors.

WiFi network with very strong signal (Best).

WiFi network with strong signal (Good).

WiFi network with weak signal strength (OK).

WiFi network with very weak signal (Worst).

This WiFi network is not password-protected (Open


network).
2nd Method
1. Select the Start button.

2. Select Settings.

Note: Practice Personal Hygiene protocols at all times 52


3. Select Network & Internet.

4. Select Status. Your current connection status will be displayed on the right side of the
screen.

LO 4: Inspect and test the configured computer networks (TLE_IACSS912SUCN)

Activity 1
Direction: Identify the following questions by completing the letters in the box .
1. This is a command-line utility to see whether your computer has a valid IP address.
i c g

2. This address should be set appropriately for your network.


p _ a s

3. This basic test from a command prompt to make sure that the computers on your network can
contact one another.
p

Note: Practice Personal Hygiene protocols at all times 53


4. This icon represents the current status of your network connection
e _ i

5. This name should be set to the desired name for each computer.
s _ e

Activity 2
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided.
Completeness (3 points) - Does your response directly answer each part of the
question(s)?
Knowledge (3 points) - Does your response clearly show you have read and understand
the lesson content by correctly defining key terms and summarizing concepts?
Analysis (2 points) - Does your response provide analysis to the larger concepts of the
lesson?
Writing Skills (2 points) - Do you write clearly, in complete sentences, with minimal
errors in grammar and spelling?

Reflection
Complete the statement:
Note: Practice Personal Hygiene protocols at all times 54
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________

References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. 2016
4. How to Check Connection on Windows 10
https://www.support.com/how-to/how-to-check-connection-on-windows-10-10937
5. Checking Network Configuration
https://www.informit.com/articles/article.aspx?p=1151312&seqNum=4
6. Testing Your Computer Network
https://www.dummies.com/programming/networking/testing-your-computer-network/

Answer Key
Activity 1
1. ipconfig
2. IP Address
2. ping
4. network icon
5. Host name

Activity 2
Answer may vary
Prepared by:

MARK ANTHONY M. FERNANDEZ


Teacher I

Note: Practice Personal Hygiene protocols at all times 55

You might also like