CBLM Coc2
CBLM Coc2
CBLM Coc2
Sector:
ELECTRICAL AND ELECTRONICS
Qualification:
COMPUTER SYSTEM SERVICING NC II
Unit of Competency:
Core Competency 2
Module Title:
SET – UP COMPUTER NETWORKS
Technical Education and Skills Development Authority
East Service Road, South Superhighway, Taguig City
Welcome to the module “Computer Systems Servicing NCII”. This module contains
training materials and activities for you to complete.
The unit of competency “Set Up Computer Networks” Contains knowledge, skills and
attitudes required for a Computer Systems Servicing NCII course.
You are required to go through a series of learning activities in order to complete
each of the learning outcomes of the module. In each learning outcome, there are
information sheets, Job Sheets, Operation Sheets and Activity Sheets. Follow these
activities on your own and answer the self-check at the end of each learning activity.
If you have questions, don’t hesitate to ask your trainer for assistance.
No
UNIT OF COMPETENCY MODULE TITLE CODE
.
Install & Configure Installing & Configure
1. Computer Systems & Computer Systems & ELC724331
Networks Networks
Set – Up Computer Setting – Up Computer
2. ELC724332
Networks Networks
Set – Up Computer Setting – Up Computer
3. ELC724333
Servers Servers
Maintain and Repair Maintain and Repair
4. Computer Systems and Computer Systems and ELC724334
Networks Networks
Introduction:
Assessment Criteria
1. Cable Routes are determined and planned in accordance with network design and
actual installation site.
2. Network materials necessary to complete the work are identified and obtained in
accordance with established procedures and checked for correct operation and
safety.
3. Appropriate personal protective equipment is used and OHS policies and procedures
are followed.
4. Appropriate personal protective equipment is used and OHS policies and procedures
are followed
5. Copper cable splicing is performed based on Electronic Industries Alliance /
Telecommunications Industry Association (EIA/TIA) standards002E
6. Network cables and cable raceway are installed in accordance with established
procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage has
occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
9. Excess components and materials are disposed of based on WEEE directives and
3Rs waste management program.
11. Any fault or problem in the network system is diagnosed and remedied in line with
the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance with network
design.
13. Communication checking between terminals are carried out in accordance with OS
network configuration guides
14. Unplanned events or conditions are responded to in accordance with established
procedures
15. Client Device systems settings are configured in accordance with manufacturers'
instructions and end-user preferences
16. Local area network (LAN) port is configured in accordance with manufacturers'
instructions and network design
17. Wide area network (WAN) port is configured in accordance with manufacturers'
instructions and network design
18. Wireless settings are configured in accordance manufacturers' instructions, network
design and end-user preferences
19. Security/ Firewall/ Advance settings are configured in accordance with
manufacturers' instructions and end-user preferences
20. Final inspections are undertaken to ensure that the configuration done on the
computer networks conforms with the manufacturer's instruction/manual
21. Computer networks are checked to ensure safe operation.
22. Reports are prepared/ completed according to company requirements.
Assessment Criteria:
1. Cable routes are determined and planned in accordance with network design and actual
installation site.
2. Network materials necessary to complete the work are identified and obtained in
accordance with established procedures and checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct operation and
safety
4. Appropriate personal protective equipment is used and OHS policies and procedures are
followed.
5. Copper cable splicing is performed based on Electronic Industries Alliance/
Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with established
procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage has
occurred and complies with requirements 8. OHS standards and 5S principles are followed
according to enterprise requirements
9. Excess components and materials are disposed of based on WEEE directives and 3Rs
waste management program.
What is Network?
A network is a collection of interconnected devices, systems, or entities that can
communicate with each other to share resources, data, or services. The term can refer to
various types of networks, each with specific characteristics and purposes. Here are a few
common types of networks:
Types of Networks
1. Computer Networks:
Local Area Network (LAN): A network that connects devices in a limited area, such
as a home, office, or building.
Wide Area Network (WAN): A network that covers a broad area, connecting devices
across cities, countries, or even continents.
Wireless Networks: Networks that use wireless communication methods, like Wi-Fi or
Bluetooth, to connect devices without physical cables.
Internet: The global network of interconnected computer networks that use the
Internet Protocol (IP) to communicate.
2. Social Networks:
A network of individuals or organizations connected by social relationships, often
facilitated by platforms like Facebook, Twitter, or LinkedIn.
3. Telecommunications Networks:
Systems of electronic transmission that carry information in the form of voice, data,
and video across distances. Examples include the telephone network and mobile
networks.
4. Neural Networks:
Systems inspired by the human brain, consisting of interconnected nodes (neurons),
used in artificial intelligence and machine learning to process complex data patterns.
Components of a Computer Network
Resource Sharing: Networks allow multiple devices to share resources like printers,
files, and internet connections.
Communication: Networks enable communication through email, instant messaging,
and video conferencing.
Data Access: Users can access and retrieve data from other devices on the network.
Collaboration: Networks facilitate collaborative work by allowing multiple users to
work on the same documents and projects.
Security Considerations
Authentication: Verifying the identity of users and devices accessing the network.
Encryption: Protecting data as it travels across the network to prevent unauthorized
access.
Firewalls and Intrusion Detection Systems: Tools used to monitor and protect the
network from malicious activity.
In summary, a network is a vital infrastructure for connecting devices and systems,
enabling communication, resource sharing, and collaborative work across various domains
and applications.
Local Area Network (LAN): A network that connects devices in a limited area, such
as a home, office, or building.
Wide Area Network (WAN): A network that covers a broad area, connecting devices
across cities, countries, or even continents.
Metropolitan Area Network (MAN): A network that spans no more that 50 miles. It is
design to connect LAN’s spanning a town or city.
At a NAP, traffic from one network is routed and exchanged with other networks,
enabling data to travel across the internet.
Peering:
NAPs support peering agreements between ISPs, which allow them to exchange
traffic directly without having to go through a third party, improving speed and
reducing latency.
2. What network hardware device used to connect multiple devices within a local area
network (LAN) and manage data traffic between them efficiently?
3. Which of the following is the collection of computers and related Network hardware
that acts as the interface between the device and the network, enabling
communication through wired or wireless connections.?
Self-Check 1.1
1. Router – D.
2. Network Switch – A.
3. Network Interface Card – B.
4. Network Repeater – C.
5. Network Access Point – B.
Write the name & function on a separate sheet of paper of the following network
hardware pictures below.
Network Cable
Cable is the medium through which information usually moves from one network
device to another. There are several types of cable which are commonly used with LANs. In
some cases, a network will utilize only one type of cable, other networks will use a variety of
cable types. The type of cable chosen for a network is related to the network's topology,
protocol, and size.
Coaxial Cable
Wireless LAN’s
What is RJ45?
RJ stands for Registered Jacks. These are used in telephone and data jack wiring
registered with FCC. RJ-II is a 6-position, 4-conductor jack used in telephone wiring, and RJ-
45 is an 8-position, 8-conductor jack used in 10BaseT and 100BaseT Ethernet wiring.
1. T568A
2. T568B
Self-Check 1.2
1. The examples of Network Media are:
Unshielded Twisted Pair - UTP
Shielded Twisted Pair – STP
Coaxial Cable
Fiber Optic Cable
Wireless LAN’s
Comments / Suggestions
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
Assessment Criteria:
2. Any fault or problem in the network system is diagnosed and remedied in line with the
standard operating procedures.
3. Network interface card (NIC) settings are configured in accordance with network design.
Network Configuration
Network configuration is the process of setting a network's controls, flow and
operation to support the network communication of an organization and/ or network owner.
This broad term incorporates multiple configuration and setup processes on network
hardware, software and other supporting devices and components.
Patch Panel
A patch panel, patch bay, patch field or jack field is a device or unit featuring a
number of jacks, usually of the same or similar type, for the use of connecting and routing
circuits for monitoring, interconnecting, and testing circuits in a convenient, flexible manner.
Patch panels are commonly used in computer networking, recording studios, radio and
television.
Self-Check 2.1
Tools / Software: Wire Stripper, Ethernet Crimping Tool, RJ45 pins, Network Cable
Tester.
Equipment: Desktop workstation or Laptop
Steps/ Procedure:
8. Did Crimp the connector (RJ45 pin) properly to the UTP cable?
9. Did you Test your Ethernet Cable, verifying the proper LED
indicator output for Straight Through Cable ?
Comments / Suggestions
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
Assessment Criteria:
Resources:
Device Configuration
Router Configuration
The cause of the change WIFI name and wireless password is to protect the wireless
network. This article will guide you how to change the Wi-Fi name and wireless password.
Open a browser then type 192.168.0.1 in the Address bar, click on Enter.
Type the password as admin in the bars to login the setting page.
Self-Check 3.1
1. Login the homepage or the Network system of the router by using the default IP
Address of the router
2. Login to the page of the Router. The default credentials of the router are
admin(username) admin(password).
3. Go to advance on the home page to login the advance setting page.
4. Click on Wireless, then click on Wireless Basic Settings and making sure that
wireless is Enable. Making sure the SSID Broadcast was checked, otherwise the
wireless signal will not be found in your wireless bar of your computer. Also, you can
change the Primary SSID as you want.
5. Click on Wireless, then click on Wireless Security and choose the Security mode as
WPA-PSK, and then open the drop-down menu of the WPA Algorithms option then
select the type as AES and set a Security Key as you want. At last, let the other
options as defaulted and hit on the Save button to save the settings.
Assessment Criteria:
1. Final inspections are undertaken to ensure that the configuration done on the
computer networks conforms with the manufacturer’s instruction/manual.
2. Computer networks are checked to ensure safe operation.
3. Reports are prepared/completed according to company requirements.
Resources:
You’ve set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network finished: You must
verify that the network works as expected.
Here are a few simple tests you can conduct to make sure your network is functional.
IP Address (Version 4)
192.168.8.101
Default Gateway
192.168.8.1
IPv4 Address......................................192.168.1.125(Preferred)
Click the Start button, type cmd and press Enter. Then, enter the command PING
192.168.8.100 and press Enter.
2.
Static IP Addressing
the static IP addresses are those types of IP address that never change once they
are assigned to a device on a network. No doubt this type of addressing is cost
effective but could have a high security risk.
Dynamic IP Addressing
On the other hand, a Dynamic IP address changes each time the device logs in to
a network. This kind of IP address is very tough to trace and are thus used by
companies and business firms
What is an IP Address?
An Internet Protocol address (IP address) in layman’s terms is basically the address
given to your computer when it’s connected to a network. Technically speaking, an IP
address is a 32-bit number that signifies the address of both the sender and receiver of
packets on a network.
1. Static IP Address: As the name speaks, the static IP addresses are those types of
IP address that never change once they are assigned to a device on a network. No
doubt this type of addressing is cost effective but could have a high security risk.
Static IP addresses are mostly used by web, email and gaming servers who don’t
care much about hiding their locations.
2. Dynamic IP Address: On the other hand, a Dynamic IP address changes each time
the device logs in to a network. This kind of IP address is very tough to trace and are
thus used by companies and business firms.
You must be thinking as to who or what allocates this Dynamic IP address every time the
device logs in. Well, these IP addresses are assigned using DHCP (Dynamic Host
Configuration Protocol). Talking about DHCP in detail is beyond the scope of this article and
we will take it up in a future post.
1. Right click on Wi-Fi icon (Laptop) or LAN icon (PC) at the notification bar and select
Open Network and Sharing Center
5. Select Use the following IP address and enter the IP addresses from the command
prompt (IPCONFIG).
Note: If you change the default gateway and preferred DNS server, you will lose your
internet connection.
1.
2.
3.
4.
5.
C. What are the simple tests you can conduct to make sure your network is
functional?
Static IP Addressing
Dynamic IP Addressing
3. What are the simple tests you can conduct to make sure your network is
functional?