css-9 Module Q3-Week-1-4
css-9 Module Q3-Week-1-4
9
Technical Vocational Education
Information and Communications Technology
(Computer System Servicing)
Quarter 3 - Module 1 (WEEK 1 and 2)
Configuring Computer System and Network
0
WEEK 1
Lesson
Safety Precautions Related
1 to Networks
This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.
This module was designed and written with you in mind. It is here to help you
master configuring computer systems and networks. The scope of this module
permits it to be used in many different learning situations. The language used
recognizes the diverse vocabulary level of students. The lessons are arranged to
follow the standard sequence of the course. But the order in which you read them
can be changed to correspond with the textbook you are now using.
The module is designed to give you the proper procedures used in configuring
computer systems and networks.
What’s In
When you install a new device or program, you sometimes need to configure,
which means that you need to set various switches and jumpers (for hardware) and
to define values of parameters (for software). Thanks to technological
advancements, such as plug-and-play, much of this configuration is now performed
automatically.
What’s New
You are now ready to explore configuring computer system and networks but first
you need to bear in mind the safety procedures related to networks. Your
understanding on the basic safety procedures below will help you better understand
the safety precautions in configuring computer system and network.
1
Mark asterisk * is the statement suggest a safety measures and if does not.
___1. Wear safety googles while working on computer cables and wire.
___2. Do not bring any food inside the workplace.
___3. Do not follow safety guidelines inside the working area.
What is It
• Read the labels on the ladder, and follow any safety instructions written on it.
• Never stand on the top rung of the ladder. You could easily lose your balance
and fall.
• Make sure that people in the area know you will be working there. Cordon off
the area with caution tape or safety cones.
• When you are using a ladder that leans up against a wall, follow the instructions
written on the ladder, and have someone hold the ladder to help keep it steady.
The tools required to install copper and fiber-optic cable may cause danger
through improper use. When working with cables, strictly follow these safety rules:
Make sure that the tools you are using are in good working condition.
Watch what you are doing, and take your time.
Make sure that you do not cut yourself or place anyone in danger.
Always wear safety glasses when cutting, stripping, or splicing cables of any
kind. Tiny fragments can injure your eyes.
Wear gloves whenever possible, and dispose any waste properly.
Use common sense when installing cables and fixing network problems. Call
for assistance for tasks that you cannot do on your own.
Fiber-Optic Safety
Chemicals
The solvents and glues used with fiber optics are dangerous. You should
handle them with extreme care. Read the instructions on the label, and follow them
carefully. Also, read the material safety data sheet (MSDS) that accompanies the
chemicals to know how to treat someone in case of emergency.
Tools
When working with any tool, safety should always be your first priority. Any
compromise in safety could result in serious injury or even death. The tools used for
working with fiber optics have sharp cutting surfaces that are used to scribe glass.
2
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can
produce tiny fragments of glass or plastic that can penetrate your eyes or skin and
cause severe irritation. The fibers can be extremely difficult to see on your skin
because they are clear and small.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The
light is a color that humans cannot see. It can damage your eyes before you can
feel it.
What’s More
3
What I Have Learned
1. Installing network cables, whether copper or fiber optic, can be
dangerous.
2. A safe work space is clean, organized and well-lit.
3. Follow basic safety guidelines to prevent cuts, burns, electrical shock and
damage to eyesight.
4. Follow safety guidelines to protect equipment and lives.
Assessment
Post Test
True or False
Direction: Write T if the statement is correct and F if otherwise.
_____1. Installing network cables, whether copper or fiber optic, can be dangerous
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables can
produce tiny fragments of glass that can penetrate your eyes.
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14.Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.
WEEK 2
Lesson
Networking Devices, Media
2 and Connector
What I Need to Know
After dealing with the safety precautions related to networks, you can now
proceed with the next session of this module which is networking devices, media
and connector.
4
What’s In
You have already discussed in your Grade 9 CHS class the different devices
used in networking and which provides you the knowledge on the common
networking cables that are essential in putting up a network. You are now ready to
proceed. Good luck and enjoy!
What’s New
To make data transmission more extensible and efficient than a simple
peerto-peer network, network designers use specialized network devices such as
hubs, switches, routers, and wireless access points to send data between devices.
What is It
Common Network Cables
A wide variety of networking cables are available. Coaxial and twisted-pair
cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit
data.
Twisted pair is a type of copper cabling that is used for telephone communications
and most Ethernet networks. A pair of wires forms a circuit that transmit data.
Source: https://medium.com/@bilby_yang/compasion-between-utp-and-stp-27f7ac1d61aa
Figure 1. UTP and STP cable
Two basic types of twisted pair cables:
• Unshielded twisted pair (UTP) is the cable that has two or four pairs
of wires. This type of cable relies solely on the cancellation effect
produced by the twisted-wire pairs that limits signal degradation
caused by electromagnetic interface (EMI) and radio frequency
interference (RFI).
• Shielded twisted pair (STP), each pair of wire is wrapped in metallic
foil to better shield the wires from noise. Four pairs of wires are then
wrapped in an overall metallic braid or foil. STP reduces electrical
noise from within the cable
Category Rating
UTP comes in several categories that are based on two factors:
5
The number of wires in the cable
The number of twists in those wires
• Category 3 is the wiring used for telephone systems and Ethernet LAN
at 10 Mega byte per second (Mbps).
• Category 3 has four pairs of wires.
• Category 5 and Category 5e have four pairs of wires with a transmission
rate of 100 Mbps.
• Category 5 and Category 5e is the most common network cables used.
• Category 5e has more twists per foot than Category 5 wiring.
Source: https://ph.rs-online.com/mobile/p/coaxial-cable/0822901/
Figure 2. Coaxial Cable
NeillConcelman” connectors, at the ends of the cables to make the connection.
Several types of coaxial cable exist:
Fiber optic cable has one or more optical fibers enclosed in a sheath or
jacket. Because it is made of glass, fiber-optic cable is not affected by EMI or
RFI.
Source: www.indiamart.com
Figure 3. Fiber Optic cable
6
These are the two types of glass fiber-optic cable:
1. Multimode is the cable that has a thicker core than single-mode
cable. It is easier to make, can use simpler light sources such as
Light Emitting Diodes (LEDs), and works well over distances of a
few kilometers or less.
2. Single-mode is the cable that has a very thin core. It is harder to
make, uses lasers as a light source, and can transmit signals
dozens of kilometers with ease.
What’s More
1. ____________
2. ____________
3. ____________
4. ____________
A B
___1. Twisted pair a. A cable that has two or four pairs of wire
___2. Coaxial cable b. Each pair of wire is wrapped in metallic foil.
___3. Fiber optic cable c. A copper-cored cable surrounded by a heavy shielding.
___4. UTP cable d. Is a type of copper cabling that is used for telephone
___5. STP cable communications.
7
e. A glass or plastic conductor that transmits information
using light.
Lesson
3 NETWORK DEVICES
NETWORK
A network consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
There are three basic types of networks which includes the following:
Networking Devices
Consist of, but are not limited to non-local printers, workstations, servers, webcams,
data loggers, instruments, dial-in devices, and, in general anything that requires an
Ethernet connection. These devices are supported on a best-effort basis
8
Ethernet switch is a device that gathers the signals from
devices that are connected to it, and then regenerates a
new copy of each signal.
9
Network firewall protects a computer network
from unauthorized access. Network firewalls
may be hardware devices, software programs,
or a combination of the two. Network firewalls
guard an internal computer network (home,
school, business intranet) against malicious
access from the outside. Network firewalls may
also be configured to limit access to the outside
from internal users.
ACTIVITY 1.2
1. HUB
2. ROUTER
3. NETWORK INTERFACE CARD
4. MODEM
5. NETWORK FIREWALL
WEEK 3
WEEK 1
Cross-Over Straight-Through
The picture below will serve as your guide in making the two important Ethernet
cables.
11
1. Cut into the plastic sheath 1 inch from the
end of the cut cable. The crimping tool has
a razor blade that will do the trick with
practice.
12
a tight compression fit. When you remove the cable from the crimper, that end is
ready to use.
For a standard "Straight-Through" cable, repeat all steps and wire color order on
the other end of cable. For a cross-over cable -
the other end will have a different color order
as shown by the crossover picture on page 84.
INTERNET
WEEK 1
2 PROTOCOLS
What is It
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also uses
protocols. Part of the protocol specifies where on the envelope the delivery address
needs to be written. If the delivery address is written in the wrong place, the letter
cannot be delivered. Internet protocol works in a similar way. Internet protocols are
sets of rules governing communication within and between computers on a network.
Protocol specifications define the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to arrive within
a certain amount of time so that computers do not wait indefinitely for messages
that may have been lost. Therefore, systems maintain one or more times during
transmission of data. Protocols also initiate alternative actions if the network does
not meet the timing rules. Many protocols consist of a suite of other protocols that
are stacked in layers. These layers depend on the operation of the other layers in
the suite to function properly.
IP Addressing
An IP address is a number that is used to identify a device on the network. Each
device on a network must have a unique IP address to communicate with other
network devices. Network devices are those that move data across the network,
including hubs, switches, and routers. On a LAN, each host (device that sends or
receives information on the network) and network device must have an IP address
within the same network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a label or
address for the person’s physical aspect—the body. A person’s mailing address,
on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Media Access Control (MAC) address is assigned to
the host Network Interface Card (NIC) and is known as the physical address. The
physical address remains the same regardless of where the host is placed on the
network in the same way that fingerprints remain with someone regardless of where
he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for
humans to read a binary IP address. For this reason, the 32 bits are grouped into
four 8-bit bytes called octets. An IP address, even in this grouped format, is hard
for humans to read, write, and remember. Therefore, each octet is presented as its
decimal value, separated by a decimal point or period. This format is called dotted-
decimal notation. When a host is configured with an IP address, it is entered as a
dotted-decimal number, such as 192.168.1.5.
15
Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101 . If you mistyped just 1 bit, the address
would be different, and the host may not be able to communicate on the network.
The logical 32-bit IP address is hierarchical and is composed of two parts. The first
part identifies the network, and the second part identifies a host on that network.
Both parts are required in an IP address. For example, if a host has an IP address
of 192.168.18.57, the first three octets, 192.168.18, identify the network portion of
the address, and the last octet, 57, identifies the host. This is called hierarchical
addressing , because the network portion indicates the network on which each
unique host address is located. Routers only need to know how to reach each
network, not the location of each individual host.
IP Purpose
Classes
Class A Used for large networks, implemented by large companies and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a
LAN use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address is the
network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP address
are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion
16
Table 7. Default Subnet Masks for Usable IP Addresses
Class A Network Host
Octet 1 2 3 4
Octet 1 2 3 4
Octet 1 2 3 4
Class D addresses are used for multicast groups. There is no need to allocate octet
or bits to separate network and host addresses. Class E addresses are reserved
for research use only.
IpConfig
Ipconfig is a command used to find out the IP address of a certain network you
are connected to.
3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be
useful because it shows the IP address, subnet mask and default gateway of a
network you are connected to.
17
Assigning a static IP Address
In a home network with several computers and devices, it is ideal to assign each of
them a specific address. This is for the purpose of avoiding problems when you do
troubleshooting which requires figuring out the IP address of each of them. It is also
a means to prevent address conflicts between the devices. You can also manage
them with ease if you have assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base computer
system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).
18
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog
box appears.
6. Type the IP address for your computer. Enter the appropriate IP Address in the
IP address section.
7. Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type
the router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.
19
The alternate Domain Name System (DNS) server’s IP address is something that
your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.
Assigning a Dynamic IP Address
If more than a few computers comprise the LAN, manually configuring IP addresses
for every host on the network can be time-consuming and prone to errors. In this
case, using a Dynamic Host Configuration Protocol (DHCP) server would
automatically assign IP addresses and greatly simplify the addressing process.
Ping
The ping is a Command Prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually
used as a simple way to verify that a computer can communicate over the network
with another computer or network device.
You will encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described below:
20
represents a set of public standards that specify how packets of information are
exchanged between computers over one or more networks Keep your workspace
clean and free of clutter.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the
protocol suite originally employed by Novell Corporation’s network operating
system, NetWare.
• NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on
small Windows NT networks. NetBEUI cannot be routed or used by routers to talk
to each other on a large network.
TCP/IP
HTTP IPX/SPX
Apple
NetBEUI
Talk
Internet
Protocol
IMAP FTP
SSH TelNet
SMTP
21
What’s More
Direction: Write the name of the protocol for each protocol define on the table below.
Protocol Definition Protocol
1 Provides connections to computers over
a
TCP/IP network
2.Sends e-mail over a TCP/IP network
3.Translates URLs to IP address
4. Automates assignment of IP address
on a network
5.Securely transports Web pages over a
TCP/IP network
6.Transport files over a TCP/IP network
I.P. Address
Ping
Ipconfig
TCP/IP
HTTP
22