0% found this document useful (0 votes)
85 views

css-9 Module Q3-Week-1-4

1. The document provides information on networking devices, media, and connectors used in computer networking. It discusses common network cables including coaxial cable, twisted pair cable, and fiber optic cables. 2. Twisted pair cable is a type of copper cabling used for telephone and Ethernet networks. It has pairs of wires that transmit data. The two basic types are unshielded twisted pair (UTP) and shielded twisted pair (STP). 3. UTP cable has two or four pairs of untwisted wires and relies on cancellation from wire twisting to limit signal degradation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

css-9 Module Q3-Week-1-4

1. The document provides information on networking devices, media, and connectors used in computer networking. It discusses common network cables including coaxial cable, twisted pair cable, and fiber optic cables. 2. Twisted pair cable is a type of copper cabling used for telephone and Ethernet networks. It has pairs of wires that transmit data. The two basic types are unshielded twisted pair (UTP) and shielded twisted pair (STP). 3. UTP cable has two or four pairs of untwisted wires and relies on cancellation from wire twisting to limit signal degradation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Grade

9
Technical Vocational Education
Information and Communications Technology
(Computer System Servicing)
Quarter 3 - Module 1 (WEEK 1 and 2)
Configuring Computer System and Network

0
WEEK 1
Lesson
Safety Precautions Related
1 to Networks

This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.

What I Need to Know

This module was designed and written with you in mind. It is here to help you
master configuring computer systems and networks. The scope of this module
permits it to be used in many different learning situations. The language used
recognizes the diverse vocabulary level of students. The lessons are arranged to
follow the standard sequence of the course. But the order in which you read them
can be changed to correspond with the textbook you are now using.

The module is designed to give you the proper procedures used in configuring
computer systems and networks.

After going through this module, you are expected to:


1. Inspect networking device and connectors;
2. create cross-over and straight-through cables;
3. assign IP address to clients and servers;
4. configure the assigned IP address to clients and servers;
5. create a peer-to-peer network

What’s In

When you install a new device or program, you sometimes need to configure,
which means that you need to set various switches and jumpers (for hardware) and
to define values of parameters (for software). Thanks to technological
advancements, such as plug-and-play, much of this configuration is now performed
automatically.

What’s New
You are now ready to explore configuring computer system and networks but first
you need to bear in mind the safety procedures related to networks. Your
understanding on the basic safety procedures below will help you better understand
the safety precautions in configuring computer system and network.

1
Mark asterisk * is the statement suggest a safety measures and if does not.
___1. Wear safety googles while working on computer cables and wire.
___2. Do not bring any food inside the workplace.
___3. Do not follow safety guidelines inside the working area.
What is It

Safety Precautions Related to Networks


Installation of network cables, whether copper or fiber-optic, can be dangerous. You
should wear clothing such as long pants, a long-sleeved shirt, sturdy shoes that
cover your feet, and gloves to protect you from those toxic materials. Most
importantly, wear safety glasses. If possible, ask building management, or someone
responsible for the building, if there are any dangerous materials or obstacles that
you need to be aware of before entering the ceiling area.

Safety precautions when using a ladder:

• Read the labels on the ladder, and follow any safety instructions written on it.
• Never stand on the top rung of the ladder. You could easily lose your balance
and fall.
• Make sure that people in the area know you will be working there. Cordon off
the area with caution tape or safety cones.
• When you are using a ladder that leans up against a wall, follow the instructions
written on the ladder, and have someone hold the ladder to help keep it steady.
The tools required to install copper and fiber-optic cable may cause danger
through improper use. When working with cables, strictly follow these safety rules:

Make sure that the tools you are using are in good working condition.
Watch what you are doing, and take your time.
Make sure that you do not cut yourself or place anyone in danger.
Always wear safety glasses when cutting, stripping, or splicing cables of any
kind. Tiny fragments can injure your eyes.
Wear gloves whenever possible, and dispose any waste properly.
Use common sense when installing cables and fixing network problems. Call
for assistance for tasks that you cannot do on your own.

Fiber-Optic Safety
Chemicals
The solvents and glues used with fiber optics are dangerous. You should
handle them with extreme care. Read the instructions on the label, and follow them
carefully. Also, read the material safety data sheet (MSDS) that accompanies the
chemicals to know how to treat someone in case of emergency.

Tools
When working with any tool, safety should always be your first priority. Any
compromise in safety could result in serious injury or even death. The tools used for
working with fiber optics have sharp cutting surfaces that are used to scribe glass.

2
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can
produce tiny fragments of glass or plastic that can penetrate your eyes or skin and
cause severe irritation. The fibers can be extremely difficult to see on your skin
because they are clear and small.

Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The
light is a color that humans cannot see. It can damage your eyes before you can
feel it.

What’s More

Activity 1. True or False


Directions: Identify whether each statement is True or False. If False, write its effects.

True or False Effects


1. A safe workplace is clean,
organized and well-lit.
2. Watch what you are doing, and
take your time.
3. Wear your safety glasses
sometimes when cutting,
stripping or splicing cables.
4. It is best practice that a fire
extinguisher and first aid kit be
available.
5. Wear gloves whenever possible
and dispose any waste properly.
6.Do not read on labels on the
ladder, and follow any safety
instructions written on it.
7.Never stand on the top rung of the
ladder, and follow any safety
instructions on it.
8.Make sure that people in the area
don’t have the idea that you will be
working there.
9.Cordon off the area with caution
tape or safety cones.
10.Make sure that the tools you are
using are in good condition.

3
What I Have Learned
1. Installing network cables, whether copper or fiber optic, can be
dangerous.
2. A safe work space is clean, organized and well-lit.
3. Follow basic safety guidelines to prevent cuts, burns, electrical shock and
damage to eyesight.
4. Follow safety guidelines to protect equipment and lives.

Assessment

Post Test
True or False
Direction: Write T if the statement is correct and F if otherwise.

_____1. Installing network cables, whether copper or fiber optic, can be dangerous
_____2. You should wear clothing such as mini skirts, short sleeved shirt when
working with toxic materials.
_____3. A safe workplace is clean, organized and well-lit.
_____4. Wear safety glasses if possible.
_____5. Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
_____6. No one should know that you will be working in your area.
_____7. Cordon off the area with caution tape or safety cones.
_____8. Wear gloves whenever possible, and dispose any waste properly.
_____9. You should handle solvents and glues used with fiber optics with
utmost care.
_____10. Keep your working tools in safe place.
_____11. The process of cutting and trimming the strands of fiber-optic cables can
produce tiny fragments of glass that can penetrate your eyes.
_____12. You should keep the work area full of clutter.
_____13. Use tape to pick up small fragments and dispose them off properly.
_____14.Use special detectors to help you tell if a fiber is energized.
_____15. Make it sure that fire extinguisher and first aid kit be available in a
workplace.

WEEK 2
Lesson
Networking Devices, Media
2 and Connector
What I Need to Know

After dealing with the safety precautions related to networks, you can now
proceed with the next session of this module which is networking devices, media
and connector.
4
What’s In
You have already discussed in your Grade 9 CHS class the different devices
used in networking and which provides you the knowledge on the common
networking cables that are essential in putting up a network. You are now ready to
proceed. Good luck and enjoy!

What’s New
To make data transmission more extensible and efficient than a simple
peerto-peer network, network designers use specialized network devices such as
hubs, switches, routers, and wireless access points to send data between devices.

What is It
Common Network Cables
A wide variety of networking cables are available. Coaxial and twisted-pair
cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit
data.
Twisted pair is a type of copper cabling that is used for telephone communications
and most Ethernet networks. A pair of wires forms a circuit that transmit data.

Source: https://medium.com/@bilby_yang/compasion-between-utp-and-stp-27f7ac1d61aa
Figure 1. UTP and STP cable
Two basic types of twisted pair cables:
• Unshielded twisted pair (UTP) is the cable that has two or four pairs
of wires. This type of cable relies solely on the cancellation effect
produced by the twisted-wire pairs that limits signal degradation
caused by electromagnetic interface (EMI) and radio frequency
interference (RFI).
• Shielded twisted pair (STP), each pair of wire is wrapped in metallic
foil to better shield the wires from noise. Four pairs of wires are then
wrapped in an overall metallic braid or foil. STP reduces electrical
noise from within the cable
Category Rating
UTP comes in several categories that are based on two factors:
5
 The number of wires in the cable
 The number of twists in those wires
• Category 3 is the wiring used for telephone systems and Ethernet LAN
at 10 Mega byte per second (Mbps).
• Category 3 has four pairs of wires.
• Category 5 and Category 5e have four pairs of wires with a transmission
rate of 100 Mbps.
• Category 5 and Category 5e is the most common network cables used.
• Category 5e has more twists per foot than Category 5 wiring.

Coaxial cable is a copper-cored cable surrounded by a heavy shielding.


Coaxial cable is used to connect the computers to the rest of the network.

Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet

Source: https://ph.rs-online.com/mobile/p/coaxial-cable/0822901/
Figure 2. Coaxial Cable
NeillConcelman” connectors, at the ends of the cables to make the connection.
Several types of coaxial cable exist:

• Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps,


with a maximum length of 500 meters.
• Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps,
with a maximum length of 185 meters.
• RG-59 is most commonly used for cable television in the U.S.
• RG-6 is higher-quality cable than RG-59, with more bandwidth and less
susceptibility to interference.

Fiber optic cable has one or more optical fibers enclosed in a sheath or
jacket. Because it is made of glass, fiber-optic cable is not affected by EMI or
RFI.

Source: www.indiamart.com
Figure 3. Fiber Optic cable

6
These are the two types of glass fiber-optic cable:
1. Multimode is the cable that has a thicker core than single-mode
cable. It is easier to make, can use simpler light sources such as
Light Emitting Diodes (LEDs), and works well over distances of a
few kilometers or less.
2. Single-mode is the cable that has a very thin core. It is harder to
make, uses lasers as a light source, and can transmit signals
dozens of kilometers with ease.

What’s More

Activity 1.1 Cable Wire Grouping


Direction: Complete the diagram of various type of cable wire
Twisted Pair Coaxial Cable Fiber Optic Cable

1. ____________ 1. ____________ 1._______________


2. ____________ 2. ____________ 2._______________
3. ____________
4. ____________

Category of UTP cable

1. ____________
2. ____________
3. ____________
4. ____________

What I Have Learned


Matching Type.
Direction: Match the cable type in column A with their meaning in column B.
Write the letter of the correct answer on separate sheet of paper.

A B
___1. Twisted pair a. A cable that has two or four pairs of wire
___2. Coaxial cable b. Each pair of wire is wrapped in metallic foil.
___3. Fiber optic cable c. A copper-cored cable surrounded by a heavy shielding.
___4. UTP cable d. Is a type of copper cabling that is used for telephone
___5. STP cable communications.

7
e. A glass or plastic conductor that transmits information
using light.

Lesson

3 NETWORK DEVICES

NETWORK
A network consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
There are three basic types of networks which includes the following:

Local Area Network (LAN)


Wide Area Network (WAN)

Local Area Network


A Local Area Network (LAN) is a network that is confined to a relatively small area. It
is generally limited to a geographic area such as a writing lab, school, or building.
Rarely are LAN computers more than a mile apart.
In a typical LAN configuration, one computer is designated as the file server. It stores
all of the software that controls the network, as well as the software that can be
shared by the computers attached to the network. Computers connected to the file
server are called workstations. The workstations can be less powerful than the file
server, and they may have additional software on their hard drives. On most LANs,
cables are used to connect the network interface cards in each computer.

Wide Area Network


Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the
United States, or the world. Dedicated transoceanic cabling or satellite uplinks may
be used to connect this type of network.

Networking Devices
Consist of, but are not limited to non-local printers, workstations, servers, webcams,
data loggers, instruments, dial-in devices, and, in general anything that requires an
Ethernet connection. These devices are supported on a best-effort basis

Hub is a small, simple, inexpensive device that joins


multiple computers together. Many network hubs
available today support the Ethernet standard. Other
types including USB hubs also exist, but Ethernet is
the type traditionally used in home networking.

8
Ethernet switch is a device that gathers the signals from
devices that are connected to it, and then regenerates a
new copy of each signal.

Bridge is a device filters data


traffic at a network boundary. Bridges reduce the
amount of traffic on a LAN by dividing it into two
segments.

Routers are small physical devices that join multiple


networks together.

Network gateway is an internetworking system


capable of joining together two networks that use
different base protocols. A network gateway can be
implemented completely in software, completely in
hardware, or as a combination of both.

Modem is a contraction of the terms modulator and


demodulator. Modems perform a simple function:
They translate digital signals from a computer into
analog signals that can travel across conventional
phone lines. The modem modulates the signal at the
sending end and demodulates at the receiving end.

Network interface is a device that connects a client computer,


server, printer or

other component to your network. Most often, a network


interface consists of a small electronic circuit board that is
inserted into a slot inside a computer or printer. Alternatively, some computers,
printers, or other services include network interfaces as part of their main circuit
board.

9
Network firewall protects a computer network
from unauthorized access. Network firewalls
may be hardware devices, software programs,
or a combination of the two. Network firewalls
guard an internal computer network (home,
school, business intranet) against malicious
access from the outside. Network firewalls may
also be configured to limit access to the outside
from internal users.

ACTIVITY 1.2

GIVE THE FUNCTIONS OF THE FOLLOWING DEVICES, USE SEAPARATE


SHEET OF PAPER/

1. HUB
2. ROUTER
3. NETWORK INTERFACE CARD
4. MODEM
5. NETWORK FIREWALL

Information and Communications Technology


(Computer System Servicing)
(WEEK 3 & 4)

WEEK 3
WEEK 1

Lesson FABRICATING NETWORK


1 CABLE (CROSS OVER AND
STRAIGHT THROUGH)

Creating Ethernet Cable


Ethernet cabling has been the standard in networking installation for years. It is the
fastest way of connecting PC to a peer or to your router or a central switch. This section
10
of the module will bring you back to the procedures in creating an Ethernet cable
specifically straight-through and cross-over. Try to recall the procedures as you go on
with the lesson.

Fabricating an Ethernet Cross-over and Straight-through Cable


In an Ethernet networking environment – like in a home or an office with multiple PCs
that are wired – the computers need to be connected to a central router to allow data
transfer. The router takes all the bits being sent out by the computers and relays them
onto the other devices on the network.
The straight-through Ethernet cable is used in local area network to connect a PC to a
network hub and router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network devices
directly, without the need for a router in the middle. It simply reverses some of the pins
so that the output on one computer is being sent to the input of another.
Bear in mind that safety precautions must always be applied and observed during the
fabrication of the said cables. Also, materials and tools to be used must always be
complete and functional to save time, money and effort.
The following items are the materials and tools used for making Ethernet cables:
✓ Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
✓ RJ45 crimpable connectors for Cat5e;
✓ RJ45 Crimping tool;
✓ Wire cutter, stripper or pliers; and
✓ Ethernet cable tester.

Cable Fabrication Procedures

Cross-Over Straight-Through

Cross-Over and Straight-Through Color Coding

The picture below will serve as your guide in making the two important Ethernet
cables.

11
1. Cut into the plastic sheath 1 inch from the
end of the cut cable. The crimping tool has
a razor blade that will do the trick with
practice.

2. Unwind and pair the similar


colors.

3. Pinch the wires between your fingers and


straighten them out as shown. The color
order is important to do this correctly.

4. Use wire cutter to make a straight cut


across the wires 1/2 inch from the cut
sleeve to the end of the wires.
5. Push the wires into the connector.
Each wire fits into a slot in the RJ45
connector. Note the position of the blue
plastic shielding. Also note how the wires
go all the way to the end.

6. Take view from the top. Make sure the


wires are all the way in. There should be
no short wires.

7. Crimping the Cable – carefully place the


connector into the Ethernet Crimper and cinch
down n on the handles tightly. The copper
splicing tabs on the connector will pierce into
each of the eight wires. There is also a locking
tab that holds the blue plastic sleeve in place for

12
a tight compression fit. When you remove the cable from the crimper, that end is
ready to use.
For a standard "Straight-Through" cable, repeat all steps and wire color order on
the other end of cable. For a cross-over cable -
the other end will have a different color order
as shown by the crossover picture on page 84.

8. Make sure to test the cables before installing


them. An inexpensive Ethernet cable tester
does this quite well.

ACTIVITY: Criss-Cross Puzzle


Directions: Complete the criss-cross puzzle and familiarize yourself of the cables
being described. Write your answer in a clean sheet of paper.

Across 4. used for telephone


1. each pair of wires is wrapped in metallic foil communications and Ethernet
3. one or more optical fibers enclosed in a sheath networks
or jacket 5. copper-cored cable
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all
purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
13
Lesson WEEK 4

INTERNET
WEEK 1

2 PROTOCOLS

What is It
Internet Protocols

A protocol is a set of rules. A letter sent through the postal system also uses
protocols. Part of the protocol specifies where on the envelope the delivery address
needs to be written. If the delivery address is written in the wrong place, the letter
cannot be delivered. Internet protocol works in a similar way. Internet protocols are
sets of rules governing communication within and between computers on a network.
Protocol specifications define the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to arrive within
a certain amount of time so that computers do not wait indefinitely for messages
that may have been lost. Therefore, systems maintain one or more times during
transmission of data. Protocols also initiate alternative actions if the network does
not meet the timing rules. Many protocols consist of a suite of other protocols that
are stacked in layers. These layers depend on the operation of the other layers in
the suite to function properly.

IP Addressing
An IP address is a number that is used to identify a device on the network. Each
device on a network must have a unique IP address to communicate with other
network devices. Network devices are those that move data across the network,
including hubs, switches, and routers. On a LAN, each host (device that sends or
receives information on the network) and network device must have an IP address
within the same network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a label or
address for the person’s physical aspect—the body. A person’s mailing address,
on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Media Access Control (MAC) address is assigned to
the host Network Interface Card (NIC) and is known as the physical address. The
physical address remains the same regardless of where the host is placed on the
network in the same way that fingerprints remain with someone regardless of where
he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for
humans to read a binary IP address. For this reason, the 32 bits are grouped into
four 8-bit bytes called octets. An IP address, even in this grouped format, is hard
for humans to read, write, and remember. Therefore, each octet is presented as its
decimal value, separated by a decimal point or period. This format is called dotted-
decimal notation. When a host is configured with an IP address, it is entered as a
dotted-decimal number, such as 192.168.1.5.

15
Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101 . If you mistyped just 1 bit, the address
would be different, and the host may not be able to communicate on the network.
The logical 32-bit IP address is hierarchical and is composed of two parts. The first
part identifies the network, and the second part identifies a host on that network.
Both parts are required in an IP address. For example, if a host has an IP address
of 192.168.18.57, the first three octets, 192.168.18, identify the network portion of
the address, and the last octet, 57, identifies the host. This is called hierarchical
addressing , because the network portion indicates the network on which each
unique host address is located. Routers only need to know how to reach each
network, not the location of each individual host.

Table 6. Five Classes of IP Address

IP Purpose
Classes
Class A Used for large networks, implemented by large companies and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing

Subnet Mask

The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a
LAN use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address is the
network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP address
are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion

16
Table 7. Default Subnet Masks for Usable IP Addresses
Class A Network Host

Octet 1 2 3 4

Class B Network Host

Octet 1 2 3 4

Class C Network Host

Octet 1 2 3 4

Class D addresses are used for multicast groups. There is no need to allocate octet
or bits to separate network and host addresses. Class E addresses are reserved
for research use only.

IpConfig

Ipconfig is a command used to find out the IP address of a certain network you
are connected to.

How to use the ipconfig command?


1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.

Figure 51. Command Prompt Window

3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be
useful because it shows the IP address, subnet mask and default gateway of a
network you are connected to.

17
Assigning a static IP Address
In a home network with several computers and devices, it is ideal to assign each of
them a specific address. This is for the purpose of avoiding problems when you do
troubleshooting which requires figuring out the IP address of each of them. It is also
a means to prevent address conflicts between the devices. You can also manage
them with ease if you have assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base computer
system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).

Figure 53. Wireless Network Connections Properties Dialog Box

18
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog
box appears.

Figure 54. TCP / IPV4 Dialog Box

6. Type the IP address for your computer. Enter the appropriate IP Address in the
IP address section.
7. Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type
the router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.

Figure 55. Assigning an IP Address


9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your computer find
web pages and other addresses on the internet.
10. Type the address for the alternate DNS server.

19
The alternate Domain Name System (DNS) server’s IP address is something that
your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.
Assigning a Dynamic IP Address
If more than a few computers comprise the LAN, manually configuring IP addresses
for every host on the network can be time-consuming and prone to errors. In this
case, using a Dynamic Host Configuration Protocol (DHCP) server would
automatically assign IP addresses and greatly simplify the addressing process.

Figure 56. Assigning a Dynamic IP Address

Dynamic Host Configuration Protocol (DHCP) is a software utility used to


dynamically assign IP addresses to network devices. This dynamic process
eliminates the need to manually assign IP addresses. A DHCP server can be set
up and the hosts can be configured to automatically obtain an IP address. When a
computer is set to obtain an IP address automatically, the other entire IP addressing
configuration boxes are dimmed or disabled. The server maintains a list of IP
addresses to assign, and it manages the process so that every device on the
network receives a unique IP address. Each address is held for a predetermined
amount of time. When the time expires, the DHCP server can use this address for
any computer that joins the network.

Ping
The ping is a Command Prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually
used as a simple way to verify that a computer can communicate over the network
with another computer or network device.

You will encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described below:

• TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of


protocols has become the dominant standard for internetworking. TCP/IP

20
represents a set of public standards that specify how packets of information are
exchanged between computers over one or more networks Keep your workspace
clean and free of clutter.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the
protocol suite originally employed by Novell Corporation’s network operating
system, NetWare.
• NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on
small Windows NT networks. NetBEUI cannot be routed or used by routers to talk
to each other on a large network.

TCP/IP

HTTP IPX/SPX

Apple
NetBEUI
Talk

Internet
Protocol

IMAP FTP

SSH TelNet

SMTP

Figure 1. Commonly Used Internet Protocol

• AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers.


It is composed of a comprehensive set of protocols that span the seven layers of
the Open Systems Interconnection (OSI) reference model.
• HTTP: Hypertext Transfer Protocol governs how files such as text, graphics,
sound, and video are exchanged on the World Wide Web (WWW).
• FTP: File Transfer Protocol provides services for file transfer and manipulation.
FTP allows multiple simultaneous connections to remote file systems.
• SSH: Secure Shell is used to securely connect to a remote computer. Telnet:
It is an application used to connect to a remote computer that lacks security features.
• POP3: Post Office Protocol is used to download e-mail from a remote mail
server.
• IMAP: Internet Message Access Protocol is also used to download e-mail from
a remote mail server.
• SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail
server.

21
What’s More

Direction: Write the name of the protocol for each protocol define on the table below.
Protocol Definition Protocol
1 Provides connections to computers over
a
TCP/IP network
2.Sends e-mail over a TCP/IP network
3.Translates URLs to IP address
4. Automates assignment of IP address
on a network
5.Securely transports Web pages over a
TCP/IP network
6.Transport files over a TCP/IP network

ACTIVITY: Write your answer on a separate sheet of paper.


A. Give the function of the following:

I.P. Address
Ping
Ipconfig
TCP/IP
HTTP

B. Write the process of assigning static I.P. ADDRESS

22

You might also like