Tle Grade 9 - Icts CSS - Las - 4RTH QTR
Tle Grade 9 - Icts CSS - Las - 4RTH QTR
Section: Date:
To obtain detailed information about your network adapters and connections, use
the ipconfig command. Open Command Prompt, type ipconfig, and press Enter.
Getting cmd nic info (information about the Network Interface Card) by running ipconfig
If you add the /all switch to the ipconfig command, you can get to a whole new level of detail: DNS
information, the MAC (Media Access Control) (in the Physical Address field), and other
Running ipconfig /all to get detailed NIC (Network Interface Card) information
You can get other useful cmd nic info from the netstat command, which lets you see the network
connections that are active between your system and any other systems on your network or the
internet.
Netstat -a displays the active network connections, open ports and listening ports
Here are some of the most useful networking commands to know for managing and troubleshooting
your home network.
TRACERT (Trace route)
- it sends out a data packet as a way to troubleshoot any network issues you might have, but it instead
tracks the route of the packet as it hops from server to server.
Sample usage:
The command outputs a line-by-line summary of each hop, including the latency between you and that
particular hop and the IP address of that hop (plus domain name if available).
PATHPING
Similar to tracert except more informative, which means it takes a lot longer to execute. After
sending out packets from you to a given destination, it analyzes the route taken and computes packet loss
on a per-hop basis.
Sample usage and output:
Note: Practice Personal Hygiene protocols at all times 5
Use this switch to flush your DNS cache:
ipconfig /flushdns
Flushing the DNS cache can help when your internet is working, but a specific website or server is
unreachable for some reason (e.g. a website times out and won’t load).
GETMAC
Every device that’s compliant with IEEE 802 standards has a unique MAC address (Media Access Control).
The manufacturer assigns MAC addresses and stores them in the device’s hardware. Some people use MAC
addresses to limit which devices can connect to the network.
Sample usage and output:
NSLOOKUP
stands for Name Server Lookup. It packs a lot of power, but most users won’t need that power. For
regular folks like you and me, its main use is finding out the IP address behind a certain domain name.
Sample usage and output:
NETSH
stands for Network Shell. It’s a cmd command for networking that lets you view and configure
pretty much every network adapter on your system in more detail and granularity than any of the preceding
commands.
You can drill down one more layer to find all of the subcommands within those commands:
Activity 1
Direction: Read the questions carefully and choose the letter of your answer. Write the letter of your
answer before the number.
______ 1. If you want to test the connectivity on an Internet Protocol (IP) network, which of the
following command you will use?
a. cmd command c. ping command
b. loopback ping d. ip address
______ 2. If you want your computer trying to talk to itself, what do you call this step that tests the
TCP/IP protocol?
Note: Practice Personal Hygiene protocols at all times 8
a. Ping command c. ipconfig command
b. cmd command d. loopback ping
______ 3. You are the new IT admin, and you need to find the network configuration. What should
you use?
a. Ipconfig c. Ping
b. Cmd d. Netstat
______ 4. To get the most detailed network configuration, which of the following command should
you use?
a. ipconfig /all c. ipconfig /renew
b. ipconfig d. ipconfig /most
______ 5. You want to find out the IP address of a hostname, like google.com, what you should
use?
a. Nslookup c. tracert /ping
b. Ping d. cmd
______ 6. You want to find out different IP statistics such as current connections and any active
ports, what command should you use?
a. Netstat c. Ping
b. Naslookup d. Cmd
______ 7. It is similar to tracert except more informative, what networking command you should use?
a. Tracert c. Ping
b. Netstat d. Pathping
______ 8. If you wanted to ping a host but also follow the path at which it pings, what would you
use?
a. Tracert c. tracert /ping
b. Ping d. ipconfig /most
______ 9. To get the most detailed network configuration, use this command.
a. ipconfig /all c. ipconfig /renew
b. ipconfig
d. ipconfig /most
______ 10. If you want to see the network connections that are active between your system and any
other systems on your network or the internet. What network command will you use?
a. Tracert c. Ping
b. Netstat d. Pathping
Activity 2
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided
.
Reflection 1
Reflection
Complete the statement:
What I learned in this activity.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
_____________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
Answer Key
Activity 1
1. C
2. D
3. A
4. A
5. A
6. A
7. D
8. A
9. A
10. B
Activity 2
Answer may vary
2) After verification of all of the above points, if the connection is still not through, then verify the
WI-FI network adaptor settings.
For windows laptop or PC, go to control panel, select the network connections option and
check what is the status on the wireless network adaptor? It should be enabled. If it is not enabled
then click on the enable key and mark the status as enabled.
Also, check if the airplane mode on a laptop or PC is disabled. If it is enabled, then it will not allow
connecting with a wireless network.
Network Adaptor Settings
3) After checking all the above settings, if the status is still not connected then check the wireless
access point and SSID settings. After correction of the desired settings, the status will change from not
connected to acquiring network address to connect. At this point, the client also allocates the IP address
to the requesting device.
Activity 1
Direction: Write true if the statement is correct but if it’s false, change the underlined word or
group of words to make the statement true. Write your answer on the space provided.
__________________ 1. If you are not able to reach at the destination IP address, then you will use
PING and LOOPBACK PING tools for troubleshooting the cause and location of the issue.
__________________ 2. In troubleshooting IP Problems, once you locate the devices using the tools,
the fault can be due to a PHYSICAL CONNECTIVITY issue.
__________________ 3. If you’re troubleshooting LOCAL CONNECTIVITY issues, if the
destination and the source are of the identical subnet mask, then try to ping the destination IP.
__________________ 4. For rectifying the duplicate entry of an IP issue, disconnect the doubtful
device from the LAN and also make the interface on which the device was connected shut down.
Activity 2
Direction: Read each sentence carefully. Write whether the Network Problem is Cable Problem,
Connectivity Problem, Configuration Issue, Software Issue, Traffic overload, Network IP issue,
on the blank provided.
1. __________________________________ 2. ________________________________
3. _________________________________ 4. _________________________________
Activity 3
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided.
Completeness (3 points) - Does your response directly answer each part of the
question(s)?
Knowledge (3 points) - Does your response clearly show you have read and understand
the lesson content by correctly defining key terms and summarizing concepts?
Analysis (2 points) - Does your response provide analysis to the larger concepts of the
lesson?
Writing Skills (2 points) - Do you write clearly, in complete sentences, with minimal
errors in grammar and spelling?
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. May 2016
4. Basic Network Troubleshooting Steps And Tools
https://www.softwaretestinghelp.com/network-troubleshooting-steps-tools/
Answer Key
Activity 1 Activity
1. False – TRACEROUTE 1. Connectivity Problem
2. True 2. Software Issue
3. True 3. Traffic overload
4. True 4. Configuration Issue
5. False – Cable
6. True 5. Cable Problem
7. True 6. Network IP issue
8. True
9. False – Software incompatibility
10. False - Enabled
Activity 3
1. answer may vary
Section: Date:
3. Click Ethernet.
This dialog box has seven tabs that let you configure the adapter:
General: Shows basic information about the adapter, such as the device type and status.
Advanced: Lets you set a variety of device-specific parameters that affect the operation of the adapter.
About: Displays information about the device’s patent protection.
Driver: Displays information about the device driver that’s bound to the NIC and lets you update the
driver to a newer version, roll back the driver to a previously working version, or uninstall the driver.
Details: With this tab, you can inspect various properties of the adapter such as the date and version
of the device driver. To view the setting of a particular property, select the property name from the
drop-down list.
Note: Practice Personal Hygiene protocols at all times 23
Events: Lists recent events that have been logged for the device.
Power Management: Lets you configure power management options for the device.
When you click OK to dismiss the dialog box, the network connection’s Properties dialog box closes
and you’re returned to the Network Connections page. Right-click the network adapter and choose
Properties again to continue the procedure.
Review the list of connection items listed in the Properties dialog box.
Client for Microsoft Networks: This item is required if you want to access a Microsoft Windows
network. It should always be present.
File and Printer Sharing for Microsoft Networks: This item allows your computer to share its files
or printers with other computers on the network.
• Internet Protocol Version 4 (TCP/IPv4): This item enables the client computer to
communicate by using the version 4 standard TCP/IP protocol.
• Internet Protocol Version 6 (TCP/IPv6): This item enables version 6 of the standard TCP/IP
protocol. Typically, both IP4 and IP6 are enabled, even though most networks rely primarily
on IP4.
If a protocol that you need isn’t listed, click the Install button to add the needed protocol.
A dialog box appears, asking whether you want to add a network client, protocol, or service.
Click Protocol and then click Add. A list of available protocols appears. Select the one you want to
add; then click OK.
To remove a network item that you don’t need (such as File and Printer Sharing for Microsoft
Networks), select the item, and click the Uninstall button.
For security reasons, you should make it a point to remove any clients, protocols, or services that you
don’t need.
Network classes
Internet addresses are allocated by the InterNIC, the organization that administers the Internet.
These IP addresses are divided into classes. The most common of these are classes A, B, and C.
Classes D and E exist, but are not generally used by end users. Each of the address classes has a
different default subnet mask. You can identify the class of an IP address by looking at its first octet.
Following are the ranges of Class A, B, and C Internet addresses, each with an example address:
• Class A networks use a default subnet mask of 255.0.0.0 and have 0-127 as their first octet. The
address 10.52.36.11 is a class A address. Its first octet is 10, which is between 1 and 126,
inclusive.
• Class B networks use a default subnet mask of 255.255.0.0 and have 128-191 as their first octet.
The address 172.16.52.63 is a class B address. Its first octet is 172, which is between 128 and
191, inclusive.
• Class C networks use a default subnet mask of 255.255.255.0 and have 192-223 as their first
octet. The address 192.168.123.132 is a class C address. Its first octet is 192, which is between
192 and 223, inclusive.
In some scenarios, the default subnet mask values do not fit the needs of the organization,
because of the physical topology of the network, or because the numbers of networks (or hosts)
do not fit within the default subnet mask restrictions. The next section explains how networks
can be divided using subnet masks.
Subnetting
If a TCP/IP computer needs to communicate with a host on another network, it will usually
communicate through a device called a router. In TCP/IP terms, a router that is specified on a host,
which links the host's subnet to other networks, is called a default gateway. This section explains how
TCP/IP determines whether or not to send packets to its default gateway to reach another computer
or device on the network.
Activity 2
Direction: Identify the tabs of a dialog box to configure the network adapter:
1. ______________ 2. ____________________________
5. ____________________________ 6. _____________________________
Activity 1 3. Driver
1. General 4. Detail
2. Advance 5. Events
6. Power Management
Activity 5. F
1. B 6. D
2. E 7. G
3. I 8. A
4. C 9. H
Activity 3
Answer may vary
Section: Date:
Ok, you need to key in username and password in order to log on to router management page. Not
sure about username and password? Check the router manual to find out.
These are general router settings that you need to configure:
• WAN (Wide Area Network) Setting
• LAN (Local Area Network) Setting
• DHCP (Dynamic Host Configuration Protocol) Setting
After that, these are additional wireless settings that you need to configure, so that you can connect
computer to it wirelessly.
• SSID and Other Basic Wireless Settings
• Wireless Network Authentication
Click WI-FI Protected Setup option if your wireless client supports this feature, you can either press
WI-FI Protected Setup button on client to join the wireless network or register the PIN for the client
to join the wireless network.
You don't have to follow all settings I used above, you can just tune the wireless router according to
your needs.
Please note if your wireless router supports latest WPA3 wireless security standard, then you should
use it as it allows users to choose passwords that are easier to remember and protects data traffic even
if a password is compromised after the data was transmitted.
One last thing that I would like to tell you, if you wish to connect all home computers to access to
Internet via this wireless router, please select NAT or Gateway mode in Setup->Advanced
Routing page and save the settings.
After completing physical network setup, we need to decide what IP addresses should be used for
wireless router and computers, so that each computer on network and wireless router are able to
communicate with each other by using IP address later. If you want, you can click here for more
explanation to do IP logical network setup and design.
For the wireless network setup, I use IP address 192.168.1.1-254, netmask 255.255.255.0. I also plan
to assign 192.168.1.1 to wireless router and this IP address is default gateway for other computer on
wireless network.
LO 3 Set router/Wi-fi/wireless access point/repeater configuration (TLE_IACSS9- 12SUCN)
Activity 1
Direction: Put a ✓ if you think the answer is correct otherwise X if the answer is incorrect.
When you are given the task to set up a new 802.11n wireless home router. To do a good job, what
you must consider when configuring the router?
_______ 3. Use the highest level of security mode supported by the clients.
Activity 2
Direction: In this activity you will create a Wireless Setup (Connecting Wireless Router) using the
objects below.
Reflection 4
Complete the statement:
What I learned in this activity.
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
___________________________________
Answer Key
Activity 1
1. ✓
2. ✓
3. ✓
4. ✓
5. X
6. X
7. ✓
8. X
9. X
10. X
Section: Date:
QUICK TIP: If you personalized the router's User name and Password, use those credentials
instead. If you have lost or forgotten them, you need to reset the router.
Step 2:
You will now be redirected to the main screen of the setup page. On the setup page, click
the Wireless tab then click the Wireless Security sub-tab.
Step 3:
On the Configuration View section, click the Manual radio button.
Other router models, especially the older versions do not have the Manual option and may
require you to scroll down the page until you reach the Wireless Security section instead.
Step 4:
You can now select from the four (4) options.
WPA, WPA2, and WPA2/WPA security modes are highly recommended over WEP for a higher
level of security. Follow the instructions below to know how to set up each security mode.
NOTE: WPA2/WPA Mixed Mode is also referred to as PSK2-Mixed for some Linksys
routers. Refer to the image below for an example.
WPA2 Personal
Step 1:
On the Security Mode field, select WPA2 Personal and enter your Passphrase.
NOTE: The Passphrase must consist of at least eight (8) characters and is case-sensitive.
NOTE: WPA2 Personal is also referred to as PSK2 for some Linksys routers. Refer to the
image below for an example.
Step 2:
Click .
WPA Personal
Step 1:
On Security Mode, select WPA Personal and enter your Passphrase.
NOTE: The Passphrase must consist of at least eight (8) characters and is case-sensitive.
NOTE: WPA Personal is also referred to as WPA Pre-Shared Key or PSK Personal for some
Linksys routers. Refer to the images below for an example.
WPA Pre-Shared Key
NOTE: The Pre-shared Key in the image above is the network password you will use to
connect wirelessly.
Step 2:
Click .
NOTE: If you encounter a problem in selecting the type of security you wish to have, you
should reset your router. If problem still persists, you should upgrade your router's firmware to
its latest version.
What Is a Firewall?
A firewall is the digital equivalent of a traffic cop that polices your network boundaries. It can be
used to prevent traffic from entering and/or leaving your network.
There are several different types of firewalls, both hardware and software-
based. Operating systems often feature a software-based firewall, while the firewall in your router is
hardware-based.
Firewalls help prevent internet-borne, port-based attacks. Firewalls can also stop an infected computer
inside your network from attacking other computers by preventing malicious traffic from leaving your
network.
All routers offer basic firewall protection, but many have more sophisticated firewall functionality.
When you have completed setting up your firewall the way you want it, test your firewall to ensure
that it is doing what you're expecting it to.
Activity 1
Direction: Identify the missing words or group of words on Setting up WEP, WPA or WPA2
Personal wireless security on a Linksys wireless router. Answers are provided in the box.
Wireless Security Configuration View Wireless Web Browser
Web Page Manual IP Address WEP
WAP Personal WPA2 Personal Username Password
Step 1:
Access the router’s web-based setup page by opening a ___________ such as Internet Explorer,
Google Chrome or Safari. On the Address bar, enter your router’s local __________ then press
[Enter]. When the login prompt appears, enter your router’s _________ and ________________.
Step 2:
You will now be redirected to the main screen of the setup page. On the setup page, click
the __________ tab then click the ___________ sub-tab.
Step 3:
On the _________________ section, click the _________ radio button.
Step 4:
You can now select from the four (4) options.
Reflection
Complete the statement:
What I learned in this activity.
____________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
Answer Key
Activity 3
Step 1:
Access the router’s web-based setup page by opening a web browser such as Internet Explorer,
Google Chrome or Safari. On the Address bar, enter your router’s local IP Address then press
[Enter]. When the login prompt appears, enter your router’s User name and Password.
Step 2:
You will now be redirected to the main screen of the setup page. On the setup page, click
the Wireless tab then click the Wireless Security sub-tab.
Step 3:
On the Configuration View section, click the Manual radio button.
Step 4:
You can now select from the four (4) options.
Your Linksys router supports four (4) of the most commonly used wireless security modes which
you can choose from: WEP, WPA Personal, WPA2 Personal, and WPA2/WPA Mixed
Mode.
Activity 2
Answers may vary
Section: Date:
If this part of the output does not show a valid IP address, you need to check that your IP
configuration is set correctly and that your DHCP server is working.
Verify that the computers can ping each other.
Another basic test you should perform is to use the ping command from a command prompt to make
sure that the computers on your network can contact one another.
ipconfig /all
(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that mention Tunnel
adapters.)
The most important items to look for are the following:
• Host name—this should be set to the desired name for each computer. If you can correspond
with some computers but not others, be sure that the ones that don't work are turned on and
correctly named. Make sure that you don't have two computers with the same name, and that
none of the computer names is the same as the workgroup name.
Note: Practice Personal Hygiene protocols at all times 48
• IP address—this should be set appropriately for your network. If your LAN uses Internet
Connection Sharing, the address will be a number in the range 192.168.0.1 through
192.168.0.254. If your LAN uses DHCP for automatic configuration, your network manager can
tell you whether the IP address is correct. Networks with cable/DSL sharing routers usually use
numbers starting with 192.168.x where x is a number from 0 to 15.
If you see a number in the range 169.254.0.1 through 169.254.255.254, your computer is set for
automatic configuration, but no DHCP server was found, so Windows has chosen an IP address
by itself. This is fine if your LAN uses this automatic configuration system. However, if there
should have been a DHCP server, or if you use Internet Connection Sharing or a hardware Internet
Connection router, this is a problem. Restart the ICS computer or the router, and then restart your
computer and try again.
• Network mask—this usually looks like 255.255.255.0, but other settings are possible. At the
least, all computers on the same LAN should have the same network mask.
Each computer on the same LAN should have a similar valid IP address and the same network mask.
If they don't, check your network configuration. The built-in Windows "Repair" function may also be
used to help fix problems with DHCP-based (automatic) IP address assignment.
Computer
You can check your computer's identification and workgroup or domain membership setup from the
Computer window. To do so, click Start, Computer. Look in the Details pane at the bottom of the
screen for the computer name and domain or workgroup name, as shown in Figure A.
Figure A. Your computer's name and workgroup or domain membership is displayed at the bottom
of the Computer window.
On a Windows Workgroup network, the workgroup name should be the same on all computers on
your workgroup LAN. All of the computer names must be different from each other.
Note: Practice Personal Hygiene protocols at all times 49
NOTE:
None of your computers can use the workgroup or domain name as its computer name. For
example, if your workgroup is MSHOME, you can't also name a computer MSHOME. If
you find this on one of your computers, change that computer's name.
Network Connections
You can manually check all installed network protocols and services and their configuration by
viewing Network Connections and viewing the properties for Local Area Connection. To view
this screen, click Start, Network. At the top of the Network window, click Network and Sharing
Center. In the left pane of that window, click Manage Network Settings. Then, right-click your
Local Area Connection icon (or the appropriate wireless connection icon) and select Properties.
Confirm that each required protocol is installed and correctly configured. In general, the settings on
each computer on your LAN should match, except that the IP address differs (usually only in the last
of its four dot-separated numbers). If your LAN uses Automatic IP address configuration, you need
to use the ipconfig command, described earlier, to check the settings.
To Check Network Status on Windows 10
1st Method
1. The Network icon in the lower right corner of the screen can tell you a lot about your
network connection and the state it’s in.
2. The Network icon represents the current status of your network connection. Depending on the
current status of your connection, the appearance of this icon will change. The following are
the different icons you might see and their corresponding meanings.
or
4. This will bring up the Network menu. Within your network menu, you can see the status of
your current connection. If your device is capable of connecting to WiFi, you will also see a
list of wireless networks your device is currently in range of.
o The status underneath each network name represent either your device's current
connection status to that network, or additional attributes of that network.
▪ Connected, secured: This means you are connected to this WiFi network, and the
network is secured with a password.
▪ Connected: This means you are connected to this WiFi network. This network may
not be password protected.
▪ Secured: This is an available WiFi network that requires a password to
successfully connect to.
▪ Open: This is an available WiFi network with no password required.
Note: Practice Personal Hygiene protocols at all times 51
o The icons to the left of each network name indicate an individual network's signal
strength. This will vary depending on your physical distance from each network's point of
origin, among other factors.
2. Select Settings.
4. Select Status. Your current connection status will be displayed on the right side of the
screen.
Activity 1
Direction: Identify the following questions by completing the letters in the box .
1. This is a command-line utility to see whether your computer has a valid IP address.
i c g
3. This basic test from a command prompt to make sure that the computers on your network can
contact one another.
p
5. This name should be set to the desired name for each computer.
s _ e
Activity 2
Direction. Read each question carefully. In your own words, try to answer all the questions. Write
your answer on the space provided.
Completeness (3 points) - Does your response directly answer each part of the
question(s)?
Knowledge (3 points) - Does your response clearly show you have read and understand
the lesson content by correctly defining key terms and summarizing concepts?
Analysis (2 points) - Does your response provide analysis to the larger concepts of the
lesson?
Writing Skills (2 points) - Do you write clearly, in complete sentences, with minimal
errors in grammar and spelling?
Reflection
Complete the statement:
Note: Practice Personal Hygiene protocols at all times 54
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
References:
1. Competency-Based Learning Module for Computer Systems Servicing NCII
2. Technical Education and Skill Development Authority Training Regulation for Computer
Systems Servicing NCII
3. Curriculum Guide for Information and Communication Technology – Computer Systems
Servicing NCII s. 2016
4. How to Check Connection on Windows 10
https://www.support.com/how-to/how-to-check-connection-on-windows-10-10937
5. Checking Network Configuration
https://www.informit.com/articles/article.aspx?p=1151312&seqNum=4
6. Testing Your Computer Network
https://www.dummies.com/programming/networking/testing-your-computer-network/
Answer Key
Activity 1
1. ipconfig
2. IP Address
2. ping
4. network icon
5. Host name
Activity 2
Answer may vary
Prepared by: