0% found this document useful (0 votes)
196 views

CSS CBLM

This document provides competency-based learning materials for setting up computer servers. It contains instructions for trainees on how to use the materials to learn independently. The materials cover creating user folders, configuring user access and security settings, installing and configuring network services, testing operations, and performing documentation and deployment procedures. Upon completing the activities and assessments, trainees will earn a Certificate of Achievement for achieving competency in setting up computer servers.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views

CSS CBLM

This document provides competency-based learning materials for setting up computer servers. It contains instructions for trainees on how to use the materials to learn independently. The materials cover creating user folders, configuring user access and security settings, installing and configuring network services, testing operations, and performing documentation and deployment procedures. Upon completing the activities and assessments, trainees will earn a Certificate of Achievement for achieving competency in setting up computer servers.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

COMPETENCY-BASED LEARNING MATERIAL

SECTOR ELECTRICAL AND ELECTRONICS

QUALIFICATION TITLE COMPUTER SYSTEMS SERVICING NCII

UNIT COMPETENCY Set up Computer Servers

MODULE TITLE Setting-up Computer Servers

DAYAG COMPUTER LEARNING SCHOOL


HOW TO USE THIS
COMPETENCY-BASED LEARNING MATERIAL (CBLM)
Welcome to the competency-based learning material for the module:
“Setting up Computer Network.” This module contains training materials
and activities for you to accomplish.

The unit of competency “Setting up Computer Network” contains the


knowledge, skills and attitudes required for Computer Systems Servicing
NC II.

You are required to go through a series of learning activities in order to


complete each learning outcomes of the module. In each learning outcome,
there are instructional sheets (information sheets, operation sheets, job
sheets, task sheets) for further reading to help you better understands the
required activities. Follow the activities at your own pace and answer the
self-check at the end of each learning outcome. If you have questions,
please feel free to ask for the assistance of your trainer/facilitator.

This module was prepared to help you achieve the required competency:
Lay tiles on plain and curved surfaces for walls and other. This will be the
source of information for you to acquire the knowledge and skills in this
particular module with minimum supervision or help from your trainer.
With the aid of this material, you will acquire the competency independently
and at your own pace.

Remember to:

Work through all the information and complete the activities in each section.
Do what is asked in the Instructional sheet (Task sheet, Operation sheet,
and Job sheet) and complete the Self-check. Suggested references are
included to supplement the materials provided in this module.

Most probably, your trainer will also be your supervisor or manager. He/
she are there to support you and show you the correct way to do things.
Ask for help. You will be given plenty of opportunities to ask questions and
practice on the job. Make sure you practice your new skills during regular
work shifts. This way, you will improve both your speed and memory and
also your confidence.

Use the self-check questions at the end of each section to test your own
progress. When you feel confident that you have had sufficient practice, ask

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 2 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
your trainer to evaluate you. The result of your assessment/evaluation will
bePicture
recorded
4 in the Achievement chart and Progress chart.
...
You need to be competent in this module before you can move to the next
competency. A Certificate of Achievement will be awarded to you after
passing the Institutional Competency Evaluation.

DCLS Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 3 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
Dayag
Computer Systems Servicing NC II

LIST OF CORE COMPETENCIES

No. Unit of Competency Module Title Code

Install Computer Systems Installing Computer


1 ELC724331
and Networks Systems and Networks

Setting-up Computer
2 Set-up Computer Networks ELC724332
Networks

Setting-up Computer
3 Set-up Computer Servers ELC724333
Servers

Maintain and Repair Maintaining and


4 Computer Systems and Repairing Computer ELC724334
Networks Systems and Networks

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 4 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
MODULE CONTENT

UNIT OF COMPETENCY : Set-up Computer Servers

UNIT CODE : ELC724333

MODULE TITLE : Setting up Computer Servers

UNIT DESCRIPTOR : This unit covers the outcomes required in


setting-up computers servers for LAN and
small-office home-office (SOHO) systems. It
consists of competencies to set-up user
access configures network services as well as
to perform testing, documentation and pre-
deployment procedures.

NOMINAL DURATION : 40 hours

SUMMARY OF LEARNING OUTCOMES:

Upon completion of this module, the trainee/student must be able to:

LO1. Set-Up User Access


LO2. Configure Network Services
LO3. Performing Testing, Documentation and Pre-deployment
Practices

ASSESSMENT CRITERIA:

1. Created user folder in accordance with network operating system


(NOS) features.

2. Configured user access level based on NOS features and established


network access policies/end-user requirements.

3. Performed security check in accordance with established network


access policies/end-user requirements.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 5 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
4. Checked normal functions of server in accordance with
manufacturer’s
Picture 4 instructions.
...
5. Installed/updated required modules /add-ons based on NOS
installation procedures.

6. Confirmed network services to be configured based on user/system


requirements.

7. Checked operation of network services based on user/system


requirements.

8. Responded to unplanned events or conditions in accordance with


established procedures.

9. Undertaken pre-deployment procedures based on enterprise policies


and procedures.

10. Undertaken operation and security check based on end-user


requirements.

11. Prepared/completed reports according to enterprise policies and


procedures.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 6 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...
LEARNING OUTCOME SUMMARY

Learning Outcome #1 Set-Up User Access

CONTENTS:

1. Creating user folder


2. User access configuration
3. Checking security

ASSESSMENT CRITERIA:
1. User folder is created in accordance with network operating system
(NOS) features
2. User access level is configured based on NOS features and
established network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.

CONDITION:

The following resources should be provided:

2.1 PC or Workstation network and server


2.2 Network operating system (NOS)
2.3 Network printer
2.4 Tools and test instruments
2.5 Appropriate software application programs
2.6 PPE

ASSESSMENT METHODOLOGY:

Competency in this unit may be assessed through:

Methodologies:

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 7 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
 Hands-on
...
 Lecture/discussion

 Direct observation

 Practical demonstration w/ oral questioning (performance


based)

Assessment Methods:

 Hands-on

 Direct observation

 Practical demonstration with oral questioning

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 8 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

LEARNING EXPERIENCES

Learning Outcome #1 Install Network Cables

Learning Activities Special Instructions

Read Information Sheet If you have some problem on the content of


1.1
3.1-1 ”Set-up User the information sheet don’t hesitate to
Access”. approach your facilitator.
If you feel that you are now knowledgeable
on the content of the Information Sheet,
you can now answer self-check provided in
the module.
1.2 Answer Self Check 3.1- Check answers with Answer key 3.1-1
1
1.3 Listen to your trainer
facilitating a video
demonstrating how to
assign different file and
folder permissions to
user accounts.
1.4 Perform Task Sheet Check performance using Performance
3.1-1 Checklist 3.1-1

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 9 of
Computer Systems 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

INFORMATION SHEET 3.1-1

CREATING USER FOLDER

Learning Objectives:

After reading this Information Sheet, you must be able to:

1. Differentiate user profiles/accounts.


2. Differentiate File and Folder permissions.
3. Create user folders as to network environment setting.
4. Configure File and Folder permissions.
==============================================================

Introduction:

Computer Network

What is Network

A network is the interconnection of computers, devices and peripherals to


allow them to communicate, share or print data and information.

There are two types of networks:

1. Local Area Network (LAN)

The Local Area Network or LAN is


the interconnection of computers and
devices using a hub, switch or router
within a small area such as building,
school, office or home.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 10
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
2. Wide Area Network (WAN)
Picture 4
...
The Wide Area Network or WAN is
the interconnection of a number of
local area networks over a large area
such as province, city, or country.
WANs usually utilize high end
technologies and high capacity
network equipment.

Network Model

Types of Network Model

1. The client – Server Model

The Client-Server model consists of one or more servers that provide


services / applications or resources to one or more individual computers
called clients. The client and server communicates using a computer
network. An example of a Client – Server Model is the Internet.

A server is a computer providing one or


more services (printing, file, data and
information sharing, email, and other
applications) to serve other computers
and devices. A server machine runs the
different programs or applications and
services which share their resources with
clients.

A client does not share any of its


resources but requests a server's content
or service function. A client is a computer
or device that is requesting a service or
resources from a server. The client
computer sends the request to the server
machine.

2. The Peer-to-Peer Model

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 11
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
The Peer
Picture 4 -to -peer model consists of two or more connected computers
...sharing similar capabilities, services and resources. Peers are both
providers and users of resources in contrast to the client-server model
where only servers provide or supply(send), and clients request and
consume(receive) the service.

Network Topology

What is a Network Topology?

It is a representation of structure of a network that deal with the different


types of interconnectivity.

Types of Network Topologies

Network Topologies are categorized into the following basic types:

1. Bus Topology

The Bus Topology uses a common cable to connect all the computers. A
computer wanting to communicate with another computer on the network
sends the message to all computers through the cable, but only the target
computer accepts the message.

2. Ring Topology
2. Ring Topology
Computers that are using the Ring
Topology form a ring when
interconnecting to each other. A

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 12
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
computer in the ring topology transmits the message, either clockwise or
counterclockwise
Picture 4 through the computer on either side. The message is then
passed
... on from computer to computer until it reaches the intended
recipient.
3. Start Topology

The Star Topology uses a central


device such as a hub, switch or a
router to connect a computer /
computers to the network. All
communication requests are
transmitted through the central
device before reaching the intended
target computer.

4. Mesh Topology

The Mesh Topology employs


network redundancy which means
messages sent can take several
routes from source to destination.
When one hub, switch or router is
unavailable, the message is
rerouted to another device until the
messages reaches its destination.
The internet employs the mesh
routing topology.

https://www.derekduck.com/page/238

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 13
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

SELF-CHECK 2.1-1

TRUE OR FALSE TEST:

Instructions: Read and choose whether the statement is true or false.

1. Local Area Network the interconnection of computers and devices


using hub switch or router within a small area.

2. Wide Area Network the interconnection of a number of local area


networks over a large area such as province, city or country

3. The Peer-to-Peer model that consists of one or more servers that


provide services/applications or resources to one or more individual
computers called client.

4. The Client Server model that consists of two or more connected


computer sharing similar capabilities, services and resources

5. Computers that are using the ring topology form a ring when
interconnecting to each other.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 14
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

ANSWER KEY 2.1-1

1. True

2. True

3. False

4. False

5. True

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 15
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

INFORMATION SHEET 3.1-2

USER ACCESS CONFIGURATION

Learning Objectives:

After reading this Information Sheet, you must be able to:

1. Identify and familiarize with the tools, equipment, testing devices and
materials used in networking.

Introduction:

In performing the different required task in setting-up computer networks it


needs the following tools, equipment, testing devices and materials .

Tools
Side Cutter Pliers – a tool used for cutting or trimming of
connecting wires or terminal leads in the circuit board

Long nose Pliers – Used for holding, bending and


stretching the lead of electronics component or connecting
wire.

Crimping Tool - a tool made of metal with plastic-rubber


handle, to press into small folds, to frill, to corrugate.

Flat Screw Driver – a tool used to drive or fasten negative


slotted screws

Philips Screw Driver - a tool used to drive or fasten


positive slotted screws

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 16
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4 Punch Down Tool - is a small hand tool used by
... telecommunication and network technicians. It is used for
inserting wire into insulation-displacement connectors on
punch down blocks, patch panels, keystone modules, and
surface mount boxes.
EQUIPMENT

Monitor - a computer monitor or display screen is an


output device that enables the user to view text, graphics
and videos.

Keyboard - a keyboard is an input device that allows the


user to enter instructions and information into a computer.

Mouse - a mouse is an input device that controls the


movement of the cursor or pointer and enables the user to
move and select items that are displayed on the monitor.

System Unit - it is the main part of the computer system


and houses the Central Processing Unit (CPU),
motherboard, memory, storage devices, expansion cards
and the power supply etc.

Printer - is device that accepts text and graphic output


from a computer and transfers the information to paper.

Hub Switch – A hub switch is a common connection point


for devices in a network. Hub switch are commonly used to
connect segments of a LAN and it contains multiple ports.

Router - is a networking device that forwards data from one


network to another.

Patch Panel – is a device or unit featuring a number of


jacks use of connecting and routing circuits for monitoring,
interconnecting, and testing circuits in a convenient,
flexible manner.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 17
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

Testing Devices

Volt-Ohms-Millimeter (VOM) - a measuring instrument


used by technician for measuring: current, voltage,
resistance

LAN Tester- is a device used to test the network connection.

Materials

UTP Cable - Short for Unshielded Twisted Pair, a UTP cable


is a cable used in computer networking that consists of two
shielded wires twisted around each other.

RJ 45 – use in making LAN cable for networking.

https://klariti.com/2017/06/17/what-is-a-work-instruction/
https://www.productionmachining.com/blog/post/the-reason-for-work-instructions

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 18
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

SELF-CHECK 2.1-2

MULTIPLE CHOICE test:

Instructions: : Read the question carefully and write only the letter of the
correct answer in your answer sheet.

1. A tool made of metal with plastic-rubber handle, to press into small


folds, to frill, to corrugate.
a. Tweezers
b. Cutter
c. Crimping tool
d. Flat screw driver

2. A tool used to drive or fasten negative slotted screws.


a. Tweezers
b. Cutter
c. Crimping tool
d. Flat screw driver

3. It is a tool use to hold small sensitive part of a computer.


a. Tweezers
b. Cutter
c. Crimping tool
d. Flat screw driver

4. It is a device that accepts text and graphic output from a computer


and transfers the information to paper.
a. Printer
b. Monitor
c. Mouse
d. Hub switch

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 19
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
5. A device or unit featuring a number of jacks use of connecting and
Picturerouting
4 circuits for monitoring, interconnecting, and testing circuits in
... a convenient, flexible manner.
a. Printer
b. Patch panel
c. Mouse
d. Hub switch

ANSWER KEY 2.1-2


1. C

2. D

3. A

4. A

5. B

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 20
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

INFORMATION SHEET 3.1-3

CHECKING SECURITY
Learning Objectives:

After reading this Information Sheet, you must be able to:

1. observe and apply PPE and OHS policies and procedures in Computer
Systems Servicing.

==============================================================

Introduction

Occupational Health and Safety Policy

Occupational health and safety is a


cross-disciplinary area concerned
with protecting the safety, health and
welfare of people engaged in work.
The goal of all occupational health
and safety programs is to foster a
safe work environment. As a
secondary effect, it may also protect
co-workers, family members,
employers, customers, suppliers,
nearby communities, and other
members of the public who are
impacted by the workplace
environment. It may involve
interactions among many subject
areas, including occupational

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 21
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
medicine, occupational (or industrial) hygiene, public health, safety
engineering,
Picture 4 chemistry, health physics.
...

Safety practices should be learned early and always adhered to when


working with any electrical device, including personal computers and
peripherals. This is for the protection of not only the people working with
them, but also for the devices themselves. The basis for this process begins
with your Occupational Health and Safety Policies.

Personal Safety While Working Along With PC’s

While working inside your computer, do not attempt to service the computer
except as explained in this guide and elsewhere in product documentation.
Always follow the instructions closely.

Computer equipment can be dangerous, and you or others can be injured or


even killed if you don’t follow proper safety guidelines when working along
PC’s. The following are some precautionary measures to take before working
with any computer equipment:

Before you start to work on the computer, perform the following steps in the
sequence indicated:

1. Turn off the computer and all peripherals.

2. Touch an unpainted metal surface on the computer chassis, such as


the metal around the card-slot openings at the back of your computer,
before touching anything inside your computer.

3. Disconnect the computer and peripherals from their electrical outlets.


Doing so reduces the potential for personal injury or shock. Also
disconnect any telephone or telecommunication lines from the
computer.

NOTE: Before disconnecting a peripheral from the system or removing a


component from the system board, verify that the standby power light-
emitting diode (LED) on the system board has turned off.

While you work, periodically touch an unpainted metal surface on the


computer chassis to dissipate any static electricity that might harm
internal components.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 22
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
In addition, it is recommended that you periodically review the safety
instructions
Picture 4 in your System Information Guide.
...

Additional Safety tips:

 Wear shoes with non-conductive rubber soles to help reduce the chance of
being shocked or seriously injured in an electrical accident.

 Do not work on components that are plugged into their power source.

 Do not remove expansion cards from a computer when it is turned on.

 Remove all jewelry when working inside any computer related equipment.

 Be sure not to mix electronic components and water.

 When you shut down your computer, be sure to shut it down properly. Do
not turn it off with the case switch.

 Don’t eat or drinks while working.

Personal Protective Devices

1. Anti-Static Devices – These are the devices use to protect computer


units from Electro Static Discharge

- Anti – static Wrist Strap

- Anti-Static Mat

- Anti-static Bag

2. Power Surge Protector Devices – An appliance designed to protect


electrical devices from voltage spikes. A surge protector attempts to
regulate the voltage supplied to an electric device by either blocking or by
shorting to ground voltages above a safe threshold.

- Automatic Voltage Regulator (AVR)

- Uninterruptible Power Supply (UPS)

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 23
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

SELF-CHECK 2.1-2

ENUMERATION test:

Direction: Enumerate six (6) occupational health and safety policies and
procedures.

1.

2.

3.

4.

5.

6.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 24
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

Answer Key 2.1-3

1. Turn off the computer and all peripherals.

2. Touch an unpainted metal surface on the computer chassis, such as the


metal around the card-slot openings at the back of your computer, before
touching anything inside your computer.

3. Disconnect the computer and peripherals from their electrical outlets.

4. Wear shoes with non-conductive rubber soles to help reduce the chance
of being shocked or seriously injured in an electrical accident.

5. Do not work on components that are plugged into their power source.

6. Do not remove expansion cards from a computer when it is turned on.

7. Remove all jewelry when working inside any computer related equipment.

8. Be sure not to mix electronic components and water.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 25
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

Information Sheet 2.1-4

CABLE SPLICING AND CRIMPING

Learning Objective:

After reading this Information Sheet, you must be able to:

1. Perform cable splicing and crimping.

Introduction:

How to make a Network Cable

The steps below are general Ethernet Category 5 (commonly known as Cat
5e) cable construction guidelines. For our example, we will be making a
Category 5e patch cable, but the same general method will work for making
any category of network cables.

Procedures:

1. Prepare all tools, materials needed.

2. Unroll the required length of network cable and add a little extra
wire, just in case. If a boot is to be fitted, do so before stripping away the
sleeve and ensure the boot faces the correct way.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 26
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

3. Carefully remove the outer jacket of the


cable. Be careful when stripping the jacket as to
not nick or cut the internal wiring. One good way to
do this is to cut lengthwise with snips or a knife
along the side of the cable, away from yourself,
about an inch toward the open end.

4. Inspect the newly revealed wires for any


cuts or scrapes that expose the copper wire
inside. If you have breached the protective
sheath of any wire, you will need to cut the
entire segment of wires off and start over at
step one. Exposed copper wire will lead to
cross-talk, poor performance or no connectivity at
all. It is important that the jacket for all
network cables remains intact.

5. Untwist the pairs so they will lay flat


between your fingers. The white piece of
thread can be cut off even with the jacket and
disposed (see Warnings). For easier handling,
cut the wires so that they are 3/4" (19 mm)
long from the base of the jacket and even in
length.

6. Arrange the wires based on the wiring specifications you are


following. There are two methods set by the TIA, 568A and 568B. Which
one you use will depend on what is being connected. A straight-through
cable is used to connect two different-layer devices (e.g. a hub and a PC).
Two like devices normally require a cross-over cable. The difference between
the two is that a straight-through cable has both ends wired identically with
568B, while a cross-over cable has one end wired 568A and the other end
wired 568B

7
 white/orange white green
 Orange green
 white/green white orange

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 27
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
 blue blue
 white/blue
Picture 4 white/blue
... green orange
 white/brown white brown
 brown brown

8. You can also


use the mnemonic 1-2-3-6/3-6-1-2 to
remember which wires are switched.

9. Press all the wires flat and parallel between your thumb and
forefinger. Verify the colors have remained in the correct order. Cut the top
of the wires even with one another so that they are 1/2" (12.5 mm) long from
the base of the jacket, as the jacket needs to go
into the 8P8C connector by about 1/8", meaning
that you only have a 1/2" of room for the
individual cables. Leaving more than 1/2"
untwisted can jeopardize connectivity and quality.
Ensure that the cut leaves the wires even and
clean; failure to do so may cause the wire not to
make contact inside the jack and could lead to
wrongly guided cores inside the plug.

10. Keep the wires flat and in order as you push them into the RJ-45
plug with the flat surface of the plug on top. The white/orange wire
should be on the left if you're looking down at the jack. You can tell if all the
wires made it into the jack and maintain their positions by looking head-on
at the plug. You should be able to see a wire located in each hole, as seen at
the bottom right. You may have to use a little effort
to push the pairs firmly into the plug. The cabling
jacket should also enter the rear of the jack about
1/4" (6 mm) to help secure the cable once the plug
is crimped. You may need to stretch the sleeve to
the proper length. Verify that the sequence is still
correct before crimping.

11. Place the wired plug into the crimping tool.


Give the handle a firm squeeze. You should hear a
ratcheting noise as you continue. Once you have

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 28
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
completed the crimp, the handle will reset to the open position. To ensure all
pins are4 set, some prefer to double-crimp by repeating this step.
Picture
...
12. Repeat all of the above steps with the other end of the cable. The
way you wire the other end (568A or 568B) will depend on whether you're
making a straight-through, rollover, or cross-over cable.

13. Test the cable to ensure that it will function


in the field. Miswired and incomplete network
cables could lead to headaches down the road. In
addition, with power-over-Ethernet (PoE) making its
way into the marketplace, crossed wire pairs could
lead to physical damage of computers or phone
system equipment, making it even more crucial that
the pairs are in the correct order. A simple cable
tester can quickly verify that information for you.

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 29
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

JOB SHEET 2.1-4

Title: Cable Splicing and Crimping

Learning Objective: Given personal computer, you are going to perform


cable splicing and crimping
Materials and Equipment:
Crimping tools, RJ 45, UTP cable, LAN tester
Steps and Procedures:

1. Prepare all tools, materials needed


2. Unroll the required length of network cable and add a little extra
wire
3. Carefully remove the outer jacket of the cable
4. Inspect the newly revealed wires for any cuts or scrapes that expose
the copper wire inside
5. Untwist the pairs so they will lay flat between your fingers
6. Arrange the wires based on the wiring specifications
7. Press all the wires flat and parallel between your thumb and
forefinger
8. Keep the wires flat and in order as you push them into the RJ-45
plug with the flat surface of the plug on top
9. Repeat all of the above steps with the other end of the cable
10. Test the cable to ensure that it will function in the field

ASSESSMENT METHODS:

Demonstration
Performance Criteria checklist

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 30
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

PERFORMANCE CRITERIA CHECKLIST 2.1-4

CRITERIA

DID I…? YES NO

Prepare all tools, materials needed

Unroll the required length of network cable and add a


little extra wire
Remove the outer jacket of the cable

Inspect the newly revealed wires for any cuts or scrapes


that expose the copper wire inside
Untwist the pairs between your fingers

Arrange the wires based on the wiring specifications

Press all the wires flat and parallel between your thumb
and forefinger
Keep the wires flat and in order

Test the cable to ensure that it will function in the field

Comments/Recommendations:

___________________________________________________________

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 31
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Trainee’s Signature: ______________________________
Picture 4
Trainer’s Signature: ______________________________
...

INFORMATION SHEET 2.1-5

NETWORK CABLES AND CABLE RACEWAY

REFERENCES

https://www.productionmachining.com/blog/post/the-reason-for-work-instructions

https://www.lazada.com.ph/products/ppe-jacket-and-pants-hazmat2piece-
washablemicrofibersuitbykdci2237419852s10078601859.html?
exlaz=d_1:mm_150050845_51350205_2010350205::12:12598959962!
121452561322!!!pla-297612067635!c!297612067635!10078601859!
492357028&gclid=Cj0KCQjw8eOLBhC1ARIsAOzx5cGnBuIi2qPACSd7a7nm3
M9M_m_7RtFeu_hddAcS6FmuTsiFegyvd84aAhXqEALw_wcB

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 32
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag
Picture 4
...

Date Developed: Document No.


Setting up Computer April, 2022 Validated by:
Servers
Developed by:
Page 33
Computer Systems of 33
Servicing NC II
Marie Carmelie P.
DCLS Dayag

You might also like