Css 9 q2 w6 7 Mod4 Set Router Wifi Wireless Access
Css 9 q2 w6 7 Mod4 Set Router Wifi Wireless Access
9
Technical Vocational
Education
Computer Systems Servicing
Quarter 2-Week 6-7-Module 4
Set Router/Wi-fi/Wireless Access Point/
Repeater Configuration
SPTVE_CSYS9- SUCNIIe-g-7
English – Grade 7
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders. Every
effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Management Team:
Glenda S. Constantino
Project Development Officer II
Joannarie C. Garcia
Librarian II
Department of Education, Schools Division of Bulacan
Curriculum Implementation Division
Learning Resource Management and Development System (LRMDS)
Capitol Compound, Guinhawa St., City of Malolos, Bulacan
Email address: lrmdsbulacan@deped.gov.ph
9
Technical Vocational
Education
Computer Systems Servicing
Quarter 2-Week 6-7-Module 4
Set Router/Wi-fi/Wireless Access Point/
Repeater Configuration
SPTVE_CSYS9- SUCNIIe-g-7
Introductory Message
For the Facilitator:
This module was collaboratively designed, developed and reviewed by educators both from
public and private institutions to assist you, the teacher or facilitator in helping the learners
meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent learning
activities at their own pace and time. Furthermore, this also aims to help learners acquire the
needed 21st century skills while taking into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of the module:
As a facilitator, you are expected to orient the learners on how to use this module. You also
need to keep track of the learners9 progress while allowing them to manage their own learning.
Furthermore, you are expected to encourage and the learners as they do the tasks included
in the module.
This module was designed to provide you with fun and meaningful opportunities for guided
and independent learning at your own pace and time. You will be enabled to process the
contents of the learning resource while being an active learner
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Don9t forget to answer What I Know before moving on to the other activities included
in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult
your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!
5
89
Pre-Test:
Direction: Arrange the steps chronologically using the numbers. Write your
answer in your answer sheet.
Part I.
A. Steps In Connecting Cables (1-4)
1. ___ Connect an Ethernet cable from your modem to the wireless router (there is
usually a short Ethernet cable included with your wireless router for this purpose).
2. ___ Once you9ve acquired a wireless router, you9ll need to connect it to your
existing internet modem.
3. ___ Plug in the power cable for the wireless router.
4. ___ Wait at least 30 to 60 seconds, and make sure the lights on your router are
working correctly.
Part II:
Directions. Write T if the underlined word(s) is correct and F if it is incorrect.
Write your answer in your answer sheet.
1. ___ (WPA) protocol provides for increased security over that of the WEP
standard.
2. ___ 802.11a, 802.11b, 802.11g, and 802.11n are the most commonly used
wireless standards.
3. ___ CAT5 Ethernet cables should not run longer than 350 feet.
4. ___ WAN connection is required when you want to share your pc with others
in your Home Group.
5. ___ Routers and network adapters are typically created in WEP for Home and
small-business users.
1. ___ A terminator is placed at each end of the backbone to keep the signals from
bouncing back and being received again by the nodes in the network.
2. ___ Any data or messages will pass through adjacent nodes until it reaches the target
node.
3. ___ Data moves from one computer to the next in one direction only.
4. ___ Each computer connects to every other.
5. ___ Each device requires a single cable point-to-point connection between the device
and hub.
Directions: Supply a missing letter(s) in the following boxes below to complete the
word(s). Write your answer in your answer sheet.
1. W __ __ I
_ _
2. __ O U __ E R
_ _
7
3. N __ T __ __ R __
_ _ _ _
4. W __ R L __ __ S
_ _ _
5. __ T __ E R __ __ T
_ _ _ _
Here are some of the potential drawbacks in working with the wireless network:
✓ With wired connections, it9s often easy to determine who is connected to the network
and to restrict access to a specific building.
✓ Due to the nature of wireless communications, on the other hand, users can connect
to a network without having physical access to a building.
✓ Enabling their wireless network adapters, it is possible to view network activity
originating from other computers.
✓ The potential for intercepting data is high.
✓ There are technical issues such as finding the correct wireless network (especially in
environments where multiple networks exist) and providing the proper security
credentials to access it.
✓ There are numerous available standards and protocols related to wireless networks.
Other types of wireless networking hardware products are also available. For
example, because the range of wireless devices is limited based on the strength of
the signal, you can use network devices called repeaters to relay the signal to more
distant locations.
8
3. Obtain the network hardware. To create a LAN, you'll need a router and/or a network.
These pieces of hardware are the "hub" of your LAN, and all of your computers will be
connected to them.
✓ The easiest way to create a LAN where every computer has access to the internet is
to use a router, and then add a network switch if the router doesn't have enough ports.
A router will automatically assign an IP address to every computer that is connected
to it.
✓ Switches are similar to routers but do not
automatically assign IP addresses. Switches
typically have many more Ethernet ports than a
router has.
4. Connect your modem to the WAN port on the
router. This port may be labeled "INTERNET" instead.
This will provide internet access to every computer that
is connected to your LAN.
✓ You can skip this if you're setting up a LAN without internet access.
✓ You don't need a router at all to create a LAN, but it makes things easier. If you just
use a network switch, you'll need to manually assign IP addresses to each computer
after connecting them.
5. Connect the switch to a LAN port on the router
✓ If you're using a network switch to connect more computers, connect it to one of the
LAN ports on the router.
✓ You can use any open port on the switch to
make the connection. When connected,
the router will provide IP addresses for
every computer that is connected to either
device.
6. Find the Ethernet port on your PC.
✓ You can usually find this on the back of
your desktop tower, or along the side or
back of a laptop.
✓ Slim laptops may not have an Ethernet
port, in which case you'll need to either
use a USB Ethernet adapter or connect
wirelessly if your router allows it.
8. Plug the other end of the cable into an open LAN port.
✓ This can be any open LAN port on either the router or the switch, depending on your
LAN setup.
9. Test out your network (router only).
10
11
13. Click the Ethernet link at the top of the window. You'll see this next to
"Connections."
12
22. Open the Internet Protocol Version 4 properties on the next computer.
✓ Follow the steps above on the second computer to open the Internet Protocol Version
4 (TCP/IPv4) Properties window.
23. Click the Use the following IP address radio button.
24. Type 1 92 . 1 68 . 1 . 5 1 into the
IP address field.
✓ Notice that the final group of
numbers has incremented by 1.
25. Enter the same values for
Subnet mask and Default
gateway.
✓ These values should be the
same as they were on the first
computer (255.255.0.0 and
192.168.0.0 respectively).
13
26. Give each additional computer a unique IP. Repeat these steps for each additional
computer, incrementing the IP address by 1 each time (up to 255). The "Subnet mask"
and "Default gateway" fields should be the same on each computer.
Figure 1. Viewing a
list of available
wireless networks
The details also show whether the network is security-enabled or unsecured. You can
click Connect to connect to a particular wireless network. If security information is
required for the network (and it has not yet been stored on the local computer), Windows
Vista prompts you to provide the necessary details.
Figure 2. Providing
network security information
when connecting to a
wireless network.
It is also possible to access wireless network settings by right-clicking the wireless network
icon in the system tray (if it is available) and choosing the Connect or Disconnect option. The
Connect option automatically displays the wireless network connection screen. This method is
useful if multiple wireless networks are available, and you would like to change connections quickly.
14
15
Activity:
Directions: Write FACT if the statement is true and BLUFF if it is false. Write your
answer in your answer sheet.
Independent Activity 1:
Instructions:
1. Create a vlog performing the given steps below on how to configure wireless
settings.
a. On your start button, click control panel, click network, click network and
sharing center, on your access type internet click the wireless network
connection.
b. Click the Details button to view more information about the connection.
c. Look for the IPv4 Default Gateway IP address in the details window. Plug this
IP address into your web browser's address bar.
d. You9ll need to log in with your username and password combination.
✓ If you don’t know these, your router is probably using its default
combination – check the manual of your router or perform a web
search for its model number and <default password.=
✓ If you've previously changed the password and can't remember it, you
can reset your router's password to the default.
✓ Once you logged in, you can now browse your router configuration
pages and configure them in settings.
e. The most typical username
is <admin=. The most typical
passwords are <admin= and
<password=. Many routers
will only require a username
and a blank password, and
some allow you to leave all
fields blank. If you can9t
figure out the correct IP
address, your username, or
password, search for the
router model online to see
what the default login is. If it
has been changed, press
the Reset button on the back
of the router for (10 to 30
seconds as directed in the
instructions for the router
model) to restore factory
defaults and try again.
Open the wireless settings.
When you log in to your router,
you will be taken to the router's
main menu or status screen.
There will be several options to
choose from. The internet
17
section can usually be left at default settings unless you received specific
instructions from your internet service provider. The wireless section will
allow you to set up your wireless network.
i. Create a passphrase.
Once you9ve chosen your
security method, enter in a
passphrase for the network.
This should be a difficult
password, with a combination
of letters, numbers, and
symbols. Don9t use any
passwords that could be easily
deduced from your network
name or from knowing you.
18
Independent Assessment 1:
Directions: Supply a missing word(s) in the paragraph below on obtaining the
network hardware. Choose your answer inside the box, and write your answer in
your answer sheet.
Independent Activity 2:
Instructions:
19
Configuring Security/Firewall
1. Click control panel.
2. Click Network and Internet
3. Click Network and Sharing Center.
Independent Assessment 2:
Directions: Supply a missing word(s) in the paragraph below on Connecting to a
Wireless Network. Choose your answer inside the box, and write your answer in your
answer sheet.
20
Independent Activity 3:
Directions: Arrange the picture chronologically bae on the steps on how to View
Wireless Network Connection Status Details.
3. ____
1. ____
4. ____
5. ____
2. ____
21
Independent Assessment 3:
Directions: Supply a missing word(s) in the paragraph below on Test out your
network (router only). Choose your answer inside the box, and write your answer in
your answer sheet.
22
Instructions:
]\
Post Test:
Direction: Arrange the steps chronologically using the numbers. Write your
answer in your answer sheet.
Part I.
C. Steps In Connecting Cables (1-4)
1. ___ Connect an Ethernet cable from your modem to the wireless router (there is
usually a short Ethernet cable included with your wireless router for this purpose).
2. ___ Once you9ve acquired a wireless router, you9ll need to connect it to your
existing internet modem.
3. ___ Plug in the power cable for the wireless router.
4. ___ Wait at least 30 to 60 seconds, and make sure the lights on your router are
working correctly.
23
Part II:
Directions. Write T if the underlined word(s) is correct and F if it is incorrect. Write your
answer in your answer sheet.
1. ___ (WPA) protocol provides for increased security over that of the WEP standard.
2. ___ 802.11a, 802.11b, 802.11g, and 802.11n are the most commonly used wireless
standards.
3. ___ CAT5 Ethernet cables should not run longer than 350 feet.
4. ___ WAN connection is required when you want to share your pc with others in your Home
Group.
5. ___ Routers and network adapters are typically created in WEP for Home and small-
business users.
Instructions:
24
References
B. Electronic References:
Google. wikiHow, wikiHow Staff, <How to Configure Your PC to a Local Area Network=, Last
Updated: November 6, 2020
https://www.wikihow.com/Configure-Your-PC-to-a-Local-Area-Network
26
Appendices
CRITERIA RUBRICS
10 8 5 3 1
Quality of Answer The students The students The students The students The students
with Correct can can can can can answer
Usage of understand understand understand understand questions but
Grammar and answer the and and answer and answer the has a
questions answer the the questions questions difficulty in
correctly and questions slightly correct slightly constructing
clearly correctly correct with a ideas
explained minimal error in
usage grammar
Ideas and The students The students The students The students The students
Explanation can can can can explain have the
explain and explain his/her explain his/her his/her idea hardship to
expand his/her ideas ideas slightly explain his/her
ideas thoroughly idea
extremely
20 15 8 1
Student spent Student spent
Student spent
Student spent too an adequate an adequate
too much time
much time and/or amount of time amount of time
Adequate Time and/or too little
too little time on on computer on computer ____
Spent on Activity time on parts of
entire computer lab lab activity to lab activity to
computer lab
activity. ensure good ensure the best
activity.
results. results.
Student put a Student put a
Student put little to Student put little
good amount of great deal of
no effort towards effort towards
Effort effort towards effort towards ____
computer lab computer lab
computer lab computer lab
activity. activity.
activity. activity.
Student Student
Student completed Student
completed about completed
less than 1/2 of the completed all of
Completion of 1/2 of the about 80% of
computer lab the computer ____
Task computer lab the computer
activity by the due lab activity by
activity by the lab activity by
date. the due date.
due date. the due date.
Responses and
Responses and Responses and Responses and
information
information given information information
Reasonable given are
are entirely given are given are very
Response and reasonable ____
unreasonable unreasonable in reasonable
Information throughout
throughout the some areas of throughout all
most of the
activity. the activity. of the activity.
activity.
Responses and
Responses and Responses and
Responses and information
information information
information given given are neat,
Neatness, given are given are very
are entirely readable, and
Readability, and unreadable and neat, readable, ____
unreadable and legible
Legibility illegible and legible
illegible throughout throughout
throughout most throughout all
the activity. most of the
of the activity. of the activity.
activity.
Total----> _
27
28