Chs LM Module3 q1 q2
Chs LM Module3 q1 q2
Chs LM Module3 q1 q2
Reminder! Just follow the instructions given in this module. Now let us start
exploring new things in this module.
36
There are three learning objectives (LO) in this module: (1) plan and
prepare for configuration; (2) configure computer systems and networks; and
(3) inspect and test configured computer systems and networks. These three
learning objectives (LO) contain sub-topics that discuss the details on
configuring computer systems and networks. This module has four essential
parts, namely: what to KNOW, what to PROCESS, what to REFLECT and
UNDERSTAND and finally, what to TRANSFER.
The competencies for this module are the following:
37
In order to master the listed competencies, you must gain knowledge
of the topics under what to KNOW, perform activities required under what
to PROCESS, accomplish additional tasks under what to REFLECT and
UNDERSTAND and finally show some evidences of your learning by
transferring what you have learned to a different context under
what to TRANSFER.
Pre Assessment
Before you proceed to the core of this module, challenge yourself first
and dig deep into your mind in order to answer the pre assessment exercises
prepared for you. Take time to answer it!
38
Test II. Multiple Choice
Directions: Write the letter of the correct answer in a clean sheet of paper.
1. What boot configuration utility allows setting the programs that will
run at startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Which of the following is an applet that controls the look of windows?
a. Appearance and Themes c. Performance and Maintenance
b. Network and Internet d. Sounds, Speech and Audio
5. Which of the following applets does not belong to performance and
maintenance category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following is a wizard used to configure MS Windows for
vision, hearing and mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. Which of the following tab in direct X Diagnostic tool displays your
current audio settings?
a. Input c. Sound
b. Music d. System
8. Which of the following networking cable category is the most
commonly used?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. What copper-cored cable is surrounded by a heavy shielding?
a. coaxial cable c. optical fiber
b. fiber optics d. twisted pair
10. What Ethernet cable is used to connect two devices directly?
a. cross- over c. both A and B
b. straight-through d. none of the options
11. Which of the following is a number used to identify a device on a
network?
a. Default gateway c. IP address
39
b. DNS Server d. Subnet mask
12. In which of the following IP address classes does 192.168.1.105
belong to?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13. What command is used to test the ability of the source computer to
reach a specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data? a.
Client server c. Peer to client
b. Peer to peer d. None of the options
15. Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
A B
1. Copper cabling used for a. Crimping tool
telephone communication b. Cross-over
2. Standard Ethernet cable c. Fiber-optic
3. Cable that has a very thin core d. Ipconfig
4. Cable that has a thicker core e. Multi-mode
5. Tool used for crimping RJ45 f. Ping
6. Connector for Cat 5e cable g. Protocol
7. Set of rules h. RJ45
8. Indicates the network portion of i. Single-mode
an IP address j. Straight-through
9. Command used find out the IP k. Subnet mask
address l. Twisted pair
10. Glass or plastic conductor
40
Test IV. ACRONYMS
Directions: Give the complete meaning of the following acronyms. Write your
answer in a separate sheet of paper.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC
B. Skills Checklist
Configuration Skills
Directions: Below is a matrix containing the most important skills that one must
have to configure computer systems and networks successfully. Check (∕) the
appropriate column which describes the level of your confidence in performing
the given tasks.
I can do it
I can do it confidently I am not
Competencies confidently but with confident
3 assistance 1
2
1. I can use the different
tools for configuration.
2. I can inspect
networking devices
and connectors.
3. I can create a cross-
over and straight-
41
through Ethernet
cable.
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the table below to
determine your initial competency on configuration of computer systems and
networks.
42
Don’t feel bad if you got a “not yet confident” in all of the
competencies. B ear in mind that this is just a p re assessment of
the knowledge and skills on the lessons to be presented. Also, it
will guide and inspire you to study harder as you go along with the
lessons.
43
Safety Procedures
44
Fire Safety Guidelines
Follow fire safety guidelines to protect equipment and lives. Turn off and
unplug the computer before beginning a repair to avoid damage to the
computer or electric shock to the technician. Fire can spread rapidly and be
very costly. Proper use of a fire extinguisher can prevent a small fire from
getting out of control. When working with computer components, always
consider the possibility of an accidental fire and prepare how to react. If there
is a fire, you should follow these safety procedures:
• Always have a planned fire escape route before beginning any work.
• Never fight a fire that is out of control or not contained.
• Get out of the building quickly in case of an out-of-control fire.
• Contact emergency services immediately for help.
Peer-to-Peer Activity
General Directions: Get a partner to perform the next activity. Identify whether
each statement is true or false. Gather picture evidences that make it true or
false. On the third column, show the effects of not following the safety
precautions through a picture presentation.
Example:
Turn off the power and unplug equipment before opening the case and
performing service.
True
45
1. A safe workplace is
clean, organized
and well-lit.
2. Before opening the
case and performing
services, one must
unplug the power
from the source.
3. It is a best practice
that a fire
extinguisher and first
aid kit be available
in the workplace.
4. You are allowed to
open the power
supply or a monitor.
5. You can eat inside the
laboratory.
Directions: Form a group of five members and research on the different safety
precautions used in computer laboratory. Interview/Observe a practitioner
while lending a quality service in computer hardware servicing. Use a video
camera to record the event stressing the safety guidelines and procedures in
the laboratory. You will be rated according to the following rubrics:
46
Content/Information The provided The provided The provided
(50%) information was information was, information was
not necessary or for the most part, necessary and
Technically sound not sufficient to necessary and sufficient to the
information the computer sufficient to the computer
Coherence of laboratory safety computer laboratory safety
information precautions. laboratory safety precautions.
precautions.
Quality of Video It lacks clarity Most part is well The video was
(30%) and/or does not organized, clear well organized,
• Clarity and present ideas in and presents clear and
cohesiveness of a coherent way. ideas in a presents ideas in
the video coherent way. a coherent way.
• Organization and
coherence of
ideas
Interview on Questions were Most of the All of the
practitioner (20%) not congruent questions were questions were
with the topic congruent with congruent with
• Congruency of and were not the topic and the topic and
questions to the delivered delivered delivered
topic clearly. clearly. clearly.
• Clarity of questions
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a role playing. You will be rated
based on the Rubrics written below:
47
Enthusiasm (10%)
-Facial expression
and body language
generates strong
enthusiasm
Interest and
Purpose (10%) -
Displays interesting
purpose
Speak Clearly
(10%)
-Group members
speaks clearly at all
times
Volume (10%) -
Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
48
Some of the built-in tools used in Microsoft system configuration involves
Microsoft System Configuration, Register Edit, Direct X and Control Panel
Applets.
49
Figure 4. General Tab
50
Boot Log. Stores all information from the boot
process in the file %SystemRoot% Ntbtlog.txt.
Base Video. Boots to the Windows graphical user
interface in minimal VGA mode. This loads
standard VGA drivers instead of display drivers
specific to the video hardware on the computer.
OS boot information. Shows driver names as drivers
are being loaded during the boot process.
Make all boot settings permanent. Does not track
changes made in System Configuration. Options
can be changed later using System Configuration,
but must be changed manually. When this option is
selected, you cannot roll back your changes by
selecting Normal startup on the General tab.
51
Table 3. Services Tab of System Config Utility
Warning:
Disabling services that normally run at boot time
might cause some programs to malfunction or result in
system instability. Do not disable services in this list
unless you know they are not essential to your
computer’s operation. Selecting Disable all will not
disable some secure Microsoft services required for the
operating system to start.
52
Table 4. Start Up Tab of System Config Utility
Note:
Disabling applications that normally run at boot time might
result in related applications starting more slowly or not running
as expected.
53
Figure 7. Startup Tab
54
Figure 8. Tools Tab
55
o HKEY_CURRENT_CONFIG - this branch points to the part of
HKEY_LOCAL_MACHINE appropriate for the current hardware
configuration.
o HKEY_DYN_DATA (Windows 95/98/Me only) - this branch points
to the part of HKEY_LOCAL_MACHINE, for use with Windows'
Plug-&-Play subsystem.
56
• Appearance and Themes: Applets that control the look of windows:
Display
Taskbar and Start menu
Folder options
• Network and Internet Connections: Applets that configure all the
connection types: Internet options
Network connections
• Add or Remove Programs: An applet to add or remove programs and
windows components safely
• Sounds, Speech, and Audio Devices: Applets that control all the
settings for sound:
Sounds and audio devices
Speech
Portable media devices
• Performance and Maintenance: Applets to find information about
your computer or perform maintenance:
Administrative tools
Power options
Scheduled tasks
System
• Printers and Other Hardware: Applets to configure devices
connected to your computer:
Game controllers
Keyboard
Mouse
Phone and modem options
Printers and faxes
Scanners and cameras
• User Accounts: Applets to configure options for users and their email:
E-mail
User accounts
• Date, Time, Language, and Regional Options: Applets to change
settings based on your location and language:
Date and time
Regional and language options
• Accessibility Options: A wizard used to configure windows for vision,
hearing, and mobility needs
• Security Center: Applet used to configure security settings for:
Internet options
Automatic updates
57
Windows firewall
1. Event Viewer
2. Safe Boot
3. List of services that 6. No GUI Boot
start when computer 7. OS Boot information
boots 8. Hide All Microsoft
4. Make all boot settings Services
permanent 9. Convenient List of
5. Normal startup Diagnostic Tools
10. Base Video
II. Applet Grouping
Directions: Complete the diagram of various Control Panel Applets with the
components included in their category.
58
59
Research and Explore
Directions: Conduct a research that identifies other available tools used for
computer system and network configuration. Use some other resources like the
World Wide Web and interview a practitioner (preferably an IT specialist or a
computer technician) to find out the different tools they use for configuration.
Your research will be rated according to the following criteria:
60
necessary
and sufficient
to discuss these
these issues. issues.
Quality of Writing The essay The essay The essay The essay
(25%) was not well was well was well was well
written, and written for written for written
• Clarity and contains some part, the most from
cohesiveness of many without part, without start to
sentences and spelling spelling, spelling, finish,
paragraphs No
errors, grammar or grammar or without
errors in spelling,
grammar and and/or use of use of spelling,
use of English grammar English English grammar or
• Organization and errors errors. errors. use of
coherence of and/or use The essay is The essay is English
ideas of English for some for the most errors.
errors. part well part well The essay
It lacks organized, organized, was well
clarity clear and clear and organized,
and/or does presents presents clear and
not present ideas in a ideas in a presents
ideas in a coherent coherent ideas in a
way. way. coherent
way.
61
coherent
way.
62
Oral Presentation
Directions: After the thorough research and exploration, you have to present
your work individually in an oral presentation. Your performance will be rated
based on the rubrics provided in this section.
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information in
a logical manner
4. Used complete sentence
5. Offered a concluding
statement
6. Spoke clearly, correctly,
distinctly, and confidently
7. Maintained eye contact
8. Maintained good and
proper posture
9. Utilized audio-visual
materials
10. Answered questions
sufficiently and received
comments openly
Total
Grand Total
Legend:
B- Beginner P- Proficient
D- Developing A- Advance
63
AP- Approaching Proficiency
64
2. Accessing and using Regedit:
Click on Start Button
In the search box, or Run window, type the following:
regedit and then press Enter.
65
Lastly, you can delete a key or value by clicking on it, and pressing Delete
on the keyboard, or by right-clicking on it, and choosing Delete.
Figure12.
Run Dialog Box
66
Figure13. System Tab of DX Diagnostic Tool
The System tab shows information about your computer and displays the
version of DirectX installed on your computer.
The DirectX Files tab shows the file name and the version number for each
DirectX file installed on your computer. It also shows the file names and the
version numbers of other files that are used by games that are running under
DirectX.
The Display tab lists your current display settings, and allows you to disable
DirectDraw, Direct3D, and AGP Texture Acceleration. You can also test
DirectDraw and Direct3D from the Display tab which will indicate that the
DirectX Graphics runtime files are installed and operating correctly. It will
also display your device's available memory and can tell you if your video
driver has passed Microsoft's Windows Hardware Quality Labs testing
standard. The DirectX Diagnostic Tool, however, cannot report memory that
is in use at the time that it starts and you may see less memory reported
than your video card actually has.
67
Figure14. Display Tab of DX Diagnostic Tool
The Sound tab displays your current audio settings and allows you to test
DirectSound. It will tell you if the audio driver are signed, meaning that it has
passed Microsoft's Windows Hardware Quality Labs testing standard. The
Hardware Sound Acceleration Level slider is used to correct audio glitches
that might be caused by some audio drivers. You can adjust the slider
settings and see if it provides better results in your application. Be sure not
to lower it too much or you may disable some audio features of your system.
If the tool detects a problem with your sound settings, a warning message
is displayed in the Notes box.
The Music tab displays your current MIDI settings, and allows you to test
the DirectMusic component of DirectX. Click on the Test DirectMusic button
to perform the test. If the DirectX Diagnostic Tool detects a problem with
DirectMusic, a warning message is displayed in the Notes box.
68
Figure15. Sound Tab of DX Diagnostic Tool
The Input tab lists the input devices connected to your computer such as
USB and PS2 devices. It also displays the input drivers installed on your
computer. If the DirectX Diagnostic Tool detects a problem with an input
device or an input device driver, a warning message is displayed in the
Notes box.
69
Figure16. Input Tab of DX Diagnostic Tool
The Network tab lists the registered DirectPlay Service Providers. These
are the connection methods that DirectPlay will operate across. A registry
problem here can normally be resolved by reinstalling DirectX. A registry
error here can normally be resolved by removing and reinstalling that
application. If the DirectX Diagnostic Tool detects a problem with a
DirectPlay Service Provider or Application, a warning message is displayed
in the Notes box.
The More Help tab allows you to further troubleshoot problems that the
other tabs could not resolve. Features include the DirectX troubleshooter,
sound troubleshooter, system information tool and the override tool which
will override DirectDraw’s refresh rate.
Directions: In this activity you will back up a computer registry. You will also
perform a recovery of a computer registry. The registry is also called System
State data. You will be given 1 hour to accomplish this activity.
70
Recommended Equipment:
A computer system running Windows XP is required for this exercise.
Procedures:
Step 1
Log on to the computer as yourself. Click Start >
Run.
Type ntbackup and then click OK. The “Backup or
Restore Wizard” window appears.
Step 2
Click Advanced Mode.
The Backup Utility window appears.
71
Step 3
Click Backup Wizard.
The “Welcome to the Backup Wizard” window appears.
Step 4
Click Next.
Click the Only back up the System State data radio button.
72
Step 5
Click Next.
The “Backup Type, Destination, and Name” window appears.
Step 6
Click Browse.
If you are asked to insert a disk into the floppy disk drive, click Cancel.
The “Save As” dialog box appears.
73
Step 7
Click the My Documents icon on the left side of the “Save As”
dialog box.
Click Save. The “Backup Type, Destination, and Name” window
re-appears.
Step 8
Click Next.
The “Completing the Backup Wizard” appears.
74
Figure 24. Type of Backup Window
The default backup type is “Normal”. If available, make sure that
“Backup Migrated Remote Storage Data” is not checked.
Step 10
Click Next.
The “How to Backup” window appears.
75
Step 12
Click Replace the existing backups, and then click Next.
The “When to Back Up” window appears.
Step 14
Click Finish.
The “Backup Progress” window appears.
76
Figure 29. Backup Progress Window
Step 15
Click Report.
The Notepad application window appears containing the report.
77
Figure30. Notepad Application Window
Close Notepad.
In the Backup Progress dialog box, click Close.
Close the Backup Utility.
Step 16
Click Start >Run.
Type regedit in the “open” field. The Registry Editor window appears.
78
Step 17
Expand the HKEY_CURRENT_USER Registry Key.
Expand the Control Panel Registry Key.
Expand the PowerCfg Registry Key.
Right-Click the Screen Saver. Stars Registry Key.
Click Delete.
Click File > Exit in the Registry Editor window.
Browse to the “My Documents” folder and locate the “backup.bkf” file.
Double-click the backup file to bring up the Backup Utility Wizard.
Click Next.
Step 18
Click the Restore files and settings radio button and then click
Next.
The “What to Restore” window appears.
79
Figure 33. Click System State Check box
Step 20
Click Next.
The “Completing the Backup or Restore Wizard” window appears.
80
Figure 35. Where to Restore Window
Step 22
The default restoration location is “Original location”. Click
Next.
The “Restoring System State will always overwrite current
System State unless restoring to an alternate location.”
Warning window appears.
Click OK.
Step 23
Click the Replace existing files if they are older than the backup
files radio button.
81
Figure 37. How to Restore Window
Step 24
Click Next.
The “Advanced Restore Options” window appears
Be sure that all three check boxes are selected, and then click Next.
82
Click Finish.
The system recovery begins by copying the files back to the
computer.
When prompted to restart the computer, click Yes. The computer will
restart.
Step 25
Click start > Run.
Type regedit in the “Open” field.
Click OK.
You should see the “Screen Saver Stars” Registry key in the Registry
Editor application window.
Click File > Exit.
Finish
Workmanship (15%)
-Utilized organized
materials and tools
while accomplishing the
task and exhibited time
management
Quality of work (40%) -
the windows registry was
fully backed up
83
After dealing with the preparations for configuration , you
can now proceed with the next section of this module which is
Configuring Computer System and Network.
This lesson is designed to give you the proper procedures
used in configuring computer systems and networks. At the end of
this lesson you should be able to:
Inspect networking devices and connectors;
Create a cross -over an d straight -through Ethernet
cables;
Assign and configure IP address to clients and
servers;
Create a peer-to-peer network;
Enable network security; and
Configure file and printer sharing.
84
advancements, such as plug-and-play, much of this configuration is now
performed automatically.
85
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain
hazards:
• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm
Specific types of tools and chemicals are used when working with fiber-optic
cable. These materials must be handled with care.
Chemicals
The solvents and glues used with fiber optics are dangerous. You should
handle them with extreme care. Read the instructions on the label, and follow
them carefully. Also, read the material safety data sheet (MSDS) that
accompanies the chemicals to know how to treat someone in case of
emergency.
Tools
When working with any tool, safety should always be your first priority.
Any compromise in safety could result in serious injury or even death. The tools
used for working with fiber optics have sharp cutting surfaces that are used to
scribe glass. Other tools pinch cables with high pressure to fasten connectors
to them. These tools can produce shards of glass that can splinter and fly into
the air. You must avoid getting them on your skin and in your mouth or eyes.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can
produce tiny fragments of glass or plastic that can penetrate your eyes or skin
and cause severe irritation. The fibers can be extremely difficult to see on your
skin because they are clear and small. When you work with fiber-optic cabling,
the working surface should be a dark mat so that you can see the tiny glass or
plastic fragments. The mat should also be resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiberoptic
fragments with your fingers. Use tape to pick up small fragments, and dispose
them off properly. Use a disposable container, such as a plastic bottle with a
screw-on lid, to store fiber fragments. Close the lid tightly before disposing the
container.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic
strands. The light is a color that humans cannot see. It can damage your eyes
before you can feel it. When you use a magnifier to inspect fiber-optic cable
86
and connectors, the light emitted from the fiber could be directed into your eyes.
When working with fiber, be sure to disconnect the light source. Use special
detectors to help you tell if a fiber is energized.
Caution:
Obtain proper training before you attempt to cut, strip, or splice
fiber-optic cable. An experienced technician should supervise you until
you become adequately skilled.
Until recently, cables were the only medium used to connect devices on
networks. A wide variety of networking cables are available. Coaxial and
twisted-pair cables use copper to transmit data. Fiber-optic cables use glass or
plastic to transmit data. These cables differ in bandwidth, size, and cost.
You need to know what type of cable to use based on the job requirements.
You also need to be able to troubleshoot and repair problems along the way.
Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a circuit
that transmits data. The pair is twisted to provide protection against crosstalk,
the noise generated by adjacent pairs of wires in the cable. Pairs of copper
87
wires are encased in color-coded plastic insulation and are twisted together.
An outer jacket protects the bundles of twisted pairs.
Source: www.lanshack.com
Figure 39. UTP and STP Cable
88
Category Rating
UTP comes in several categories that are based on two factors:
• The number of wires in the cable
• The number of twists in those wires
1. Category 3 is the wiring used for telephone systems and Ethernet
LAN at 10 Mega byte per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a
transmission rate of 100 Mbps.
4. Category 5 and Category 5e is the most common network cables
used.
5. Category 5e has more twists per foot than Category 5 wiring.
These extra twists further prevent interference from outside sources and
from the other wires within the cable.
Some Category 6 cables use a plastic divider to separate the pairs of
wires, which prevents interference. The pairs also have more twists than
Category 5e cable.
Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy shielding.
Coaxial cable is used to connect the computers to the rest of the network.
Source: www.phoneam.com
Figure 40. Coaxial Cable
Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet
NeillConcelman” connectors, at the ends of the cables to make the connection.
Several types of coaxial cable exist:
• Thicknet (10BASE5) is a coaxial cable used in networks operating at 10
Mbps, with a maximum length of 500 meters.
• Thinnet (10BASE2) is a coaxial cable used in networks operating at 10
Mbps, with a maximum length of 185 meters.
• RG-59 is most commonly used for cable television in the U.S.
• RG-6 is higher-quality cable than RG-59, with more bandwidth and less
susceptibility to interference.
89
Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits information
using light. Fiber optic cable has one or more optical fibers enclosed in a
sheath or jacket. Because it is made of glass, fiber-optic cable is not affected
by EMI or RFI. All signals are converted to light pulses to enter the cable and
are converted back into electrical signals when they leave it. This means that
fiber-optic cable can deliver signals that are clearer, and can go farther, without
compromising the clarity of signals.
Source: www.picstopin.com
Figure 41. Fiber Optic Cable
90
in creating an Ethernet cable specifically straight-through and cross-over. Try
to recall the procedures as you go on with the lesson.
Cross-Over Straight-Through
91
The picture below will serve as your guide in making the two important Ethernet
cables.
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping
tool has a razor blade that will do the trick with practice.
3. Pinch the wires between your fingers and straighten them out as shown. The
color order is important to do this correctly.
92
4. Use wire cutter to make a straight cut across the wires 1/2 inch from the cut
sleeve to the end of the wires.
5. Push the wires into the connector. Each wire fits into a slot in the RJ45
connector. Note the position of the blue plastic shielding. Also note how the
wires go all the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There should
be no short wires.
93
Figure 48. Step 7
8. For a standard "Straight-Through" cable, repeat all steps and wire color order
on the other end of cable. For a cross-over cable - the other end will have a
different color order as shown by the crossover picture on page 84.
9. Make sure to test the cables before installing them. An inexpensive Ethernet
cable tester does this quite well.
Criss-Cross Puzzle
Directions: Complete the criss-cross puzzle and familiarize yourself of the
cables being described. Write your answer in a clean sheet of paper.
CABLES
94
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks 5.
copper-cored cable
Now that you are equipped with the knowledge on the different cables
used in networking, you also need to know that fiber technologies and
connectors have changed through the years. In these videos, you will learn
about the different fiber connectors, copper connectors and their
characteristics. To watch the video presentations just type in the following URL:
95
1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
96
Here are the questions:
Materials:
6 meters Ethernet Cable Category 5e or Cat5e-standard wire for cabling;
RJ45 crimpable connectors for Cat5e; Tools:
RJ45 Crimping tool;
Wire cutter, stripper or pliers; and
Ethernet cable Tester / LAN Tester
Follow the procedures cited in this module and apply the safety
precautions to avoid injury or any unwanted incident. You will be given 30
minutes to complete the task. You will be rated using the performance rubrics
found on the next page.
97
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping
tool has a razor blade that will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as shown on
page 90. The color order is important to do this correctly.
4. Use scissors to make a straight cut across the wires 1/2 inch from the cut
sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic shielding.
Also note how the wires go all the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There should
be no short wires.
7. In crimping the cable – carefully place the connector into the Ethernet Crimper
and cinch down on the handles tightly. The copper splicing tabs on the
connector will pierce into each of the eight wires. There is also a locking tab
that holds the blue plastic sleeve in place for a tight compression fit. When you
remove the cable from the crimper, that end is ready to use.
8. For a standard straight-through cable, repeat all steps and wire color order on
the other end of cable. For a cross-over cable, the other end will have a different
color order as shown in the cross-over picture on page 89.
9. Make sure to test the cables before installing them. An inexpensive Ethernet
cable tester does this quite well.
98
Workmanship (15%) -
Organized materials and
tools while
accomplishing the task
and has time
management
Quality of Product
(40%)
-Produced a fully
functional Ethernet
Cable
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also
uses protocols. Part of the protocol specifies where on the envelope the
delivery address needs to be written. If the delivery address is written in the
wrong place, the letter cannot be delivered. Internet protocol works in a similar
way. Internet protocols are sets of rules governing communication within and
between computers on a network. Protocol specifications define the format of
the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to
arrive within a certain amount of time so that computers do not wait indefinitely
for messages that may have been lost. Therefore, systems maintain one or
more times during transmission of data. Protocols also initiate alternative
actions if the network does not meet the timing rules. Many protocols consist
of a suite of other protocols that are stacked in layers. These layers depend on
the operation of the other layers in the suite to function properly.
99
The main functions of protocols are:
• Identifying errors
• Compressing the data
• Deciding how the data should be sent
• Addressing the data
• Deciding how to announce sent and received data
To understand how networks and the Internet work, you must be familiar
with the commonly used protocols. These protocols are used to browse the
web, send and receive e-mail, and transfer data files. You will encounter other
protocols as your experience in IT grows, but they are not used as often as the
common protocols described here:
• TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of
protocols has become the dominant standard for internetworking. TCP/IP
represents a set of public standards that specify how packets of information are
exchanged between computers over one or more networks.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the
protocol suite originally employed by Novell Corporation’s network operating
system, NetWare. It delivers functions similar to those included in TCP/IP.
Novell in its current releases supports the TCP/IP suite. A large installed base
of NetWare networks continues to use IPX/SPX.
• NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on
small Windows NT networks. NetBEUI cannot be routed or used by routers to
talk to each other on a large network. NetBEUI is suitable for small peer-to-peer
networks, involving a few computers directly connected to each other. It can be
used in conjunction with another routable protocol such as TCP/IP. This gives
the network administrator the advantages of the high performance of NetBEUI
within the local network and the ability to communicate beyond the LAN over
TCP/IP.
100
Figure 50. Commonly Used Internet Protocol
101
• IMAP: Internet Message Access Protocol is also used to download e-mail from
a remote mail server.
• SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail
server.
The more you understand about each of these protocols, the more you will
understand how networks and the Internet work.
IP Addressing
An IP address is a number that is used to identify a device on the
network. Each device on a network must have a unique IP address to
communicate with other network devices. Network devices are those that move
data across the network, including hubs, switches, and routers. On a LAN, each
host (device that sends or receives information on the network) and network
device must have an IP address within the same network to be able to
communicate with each other.
A person’s name and fingerprints usually do not change. They provide
a label or address for the person’s physical aspect—the body. A person’s
mailing address, on the other hand, relates to where the person lives or picks
up mail. This address can change. On a host, the Media Access Control (MAC)
address is assigned to the host Network Interface Card (NIC) and is known as
the physical address. The physical address remains the same regardless of
where the host is placed on the network in the same way that fingerprints
remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very
difficult for humans to read a binary IP address. For this reason, the 32 bits are
grouped into four 8-bit bytes called octets. An IP address, even in this grouped
format, is hard for humans to read, write, and remember. Therefore, each octet
is presented as its decimal value, separated by a decimal point or period. This
format is called dotted-decimal notation. When a host is configured with an IP
address, it is entered as a dotted-decimal number, such as 192.168.1.5.
102
each unique host address is located. Routers only need to know how to
reach each network, not the location of each individual host.
IP Classes Purpose
Class A Used for large networks, implemented by large companies and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet masks
for usable IP addresses that are mapped to the first three classes of IP
addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address is
the network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion
Octet 1 2 3 4
Octet 1 2 3 4
103
Octet 1 2 3 4
IpConfig
Ipconfig is a command used to find out the IP address of a certain network you are
connected to.
3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will
be useful because it shows the IP address, subnet mask and default
gateway of a network you are connected to.
104
Figure 52. IP Configuration in CMD Window
Assigning a static IP Address
In a home network with several computers and devices, it is ideal to
assign each of them a specific address. This is for the purpose of avoiding
problems when you do troubleshooting which requires figuring out the IP
address of each of them. It is also a means to prevent address conflicts
between the devices. You can also manage them with ease if you have
assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base
computer system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).
105
Figure 53. Wireless Network Connections Properties Dialog Box
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog
box appears.
6. Type the IP address for your computer. Enter the appropriate IP Address in the
IP address section.
106
7. Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type
the router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.
107
Figure 56. Assigning a Dynamic IP Address
These are the IP address information that a DHCP server can assign to hosts:
• IP address
• Subnet mask
• Default gateway
• Optional values, such as a Domain Name System (DNS) server address
The DHCP server receives a request from a host. The server then
selects IP address information from a set of predefined addresses that are
stored in a database. After the IP address information is selected, the DHCP
server offers these values to the requesting host on the network. If the host
108
accepts the offer, the DHCP server leases the IP address for a specific period
of time.
Using a DHCP server simplifies the administration of a network because
the software keeps track of IP addresses. Automatically configuring TCP/IP
also reduces the possibility of assigning duplicate or invalid IP addresses.
Before a computer on the network can take advantage of the DHCP server
services, the computer must be able to identify the server on the local network.
You can configure a computer to accept an IP address from a DHCP server by
clicking the Obtain an IP address automatically option in the NIC configuration
window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain
an IP address, the Windows operating system automatically assigns a private
IP address. If your computer is assigned an IP address in the range of
169.254.0.0 to 169.254.255.255, it can communicate with only other computers
in the same range. An example of when these private addresses would be
useful is in a classroom lab where you want to prevent access outside to your
network. This operating system feature is called Automatic Private IP
Addressing (APIPA). APIPA continually requests an IP address from a DHCP
server for your computer.
Ping
The ping is a Command Prompt command used to test the ability of the
source computer to reach a specified destination computer. The ping command
is usually used as a simple way to verify that a computer can communicate
over the network with another computer or network device.
The ping command operates by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination computer and
waiting for a response. How many of those responses are returned, and how
long it takes for them to return, are the two major pieces of information that the
ping command provides.
-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
109
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32 byte
echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count Use this ping command option to specify the number of hops
between the computer and the target computer or device that
you would like to be recorded and displayed. The maximum
value for count is 9 so use the tracert command instead. If you
are interested in viewing all hops between two devices.
-s count Use this option to report the time, in Internet Timestamp format,
that each echo request is received and echo reply is sent. The
maximum value for count is 4 which means that only
the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only necessary if
target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with the -4 option, is
only necessary when pinging a hostname.
target This is the destination you wish to ping, which is either an IP address or
a hostname.
/? Use the help switch with the ping command to show detailed help about the
command's several options.
110
there. It does this at a very low level — only the most basic Internet functions
have to be up and running.
111
Figure 57. Step 3
112
Differing amounts of traffic on the communication lines or differing loads
on the server are common causes. You will see very different response
times depending on the access equipment you use.
Routing hop count — The part of the replies that says TTL=50 tells you
about the route the message took from one point to another. The
acronym TTL stands for Time to Live, which is a measure of how many
rerouting from one point to another the packet has to go through before
IP declares it undeliverable. The number following TTL (called the hop
count) is a number that usually starts at 255 and counts down by one
every time the message gets rerouted through an intermediary
computer.
I. Protocols
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on your notebook.
113
You will write which IP Address Class is appropriate in the IP Address Class
column in the chart below. An example has been provided for you.
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
3. http://www.professormesser.com/n10-005/networkingprotocols/
114
4. http://www.professormesser.com/n10-005/subnetting/
115
Configure an Ethernet NIC to use DHCP
Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address.
You need to follow the procedures given below and apply safety precautions in
accomplishing this task. While doing the activity, you have to answer activity
questions written after every step. Write your answer in a clean sheet of paper.
Your performance will be rated based on the performance rubrics.
Comprehension
(10%)
(Interview / Guide
questions were
answered correctly
according to the job
requirements.)
Grand Total
Legend: B-
Beginner
D- Developing
116
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
• Linksys 300N router
• A computer running Window XP Professional
• Ethernet patch cable
Procedures:
Step 1
Plug one end of the Ethernet patch cable into “Port 1” at the back of the
router.
Plug the other end of the Ethernet patch cable into the network port on
the NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click Start.
Right-click My Network Places, and then choose Properties.
The “Network Connections” window appears.
Step 2
Right-click Local Area Connection, and then choose Properties.
The “Local Area Connection Properties” window appears.
117
Figure 60. Local Area Connection Properties
Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:”
field?
2. What are the items listed in the “This connection uses the following
items:” field?
Step 3
Choose Internet Protocol (TCP/IP). Click Properties.
The “Internet Protocol (TCP/IP) Properties” window appears.
118
Figure 61. Internet Protocol (TCP/IP) Properties
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed
in the fields of the “Use the following IP address:” area? Answers
may vary. If the computer is configured to obtain an IP address
automatically, there will be no information in the fields.
119
Click OK.
Restart your computer.
Step 4
Log on to Windows as an administrator.
Check the lights at the back of the NIC. These lights will blink when there is
network activity.
Choose Start > Run.
Type cmd and click OK.
120
Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter
Local Area Network Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?
Recommended Equipment
• A computer with Windows XP Professional / Windows 7
• A Wireless NIC installed
• An Ethernet NIC installed
• Linksys WRT300N Wireless Router
• Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router with
an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
Choose start > Run, and type “cmd”. Press the Return key.
Type ipconfig.
121
What is the default gateway for the computer? Step 3
Open your browser. Type “192.168.1.1” in the “Address” field, and then press
Return.
Type “admin” in the “Password” field. The Setup screen appears. Step 4
122
Figure 67. Wireless Tab Window
Type “CHS#” in the “Network Name (SSID)” field, where # is the number assigned
by your instructor.
Click Save Settings.
The “Settings are successful” screen appears.
123
Figure 67. Settings are Successful Window
Step 4
Unplug the Ethernet patch cable from the rear of the computer.
Choose Start, and then right-click My Network Places. Choose Properties.
Double-click the wireless adapter, and then select View Wireless Networks.
Choose CHS, and then click the Connect button.
Open Internet Explorer, and then connect to the wireless router.
Log in to the wireless router.
Close Internet Explorer.
Peer-to-Peer Network
124
Figure 68. Peer-to-Peer Network
NOTE: For a direct network cable connection between two PCs (not with a
hub, switch or router), you need to have a cross-over cable.
125
2. For PCs with Windows XP, the home networking wizard can be used to set
up Windows for your network.
a. Click Start, and then Control Panel.
b. Select Network and internet connections.
c. Double-click Network setup wizard and follow the on-screen instructions.
.
NOTE : If the Network setup wizard is unsuccessful, continue with the steps below
.
3. Click Start, Control Panel, Network and Internet Connections, and then
Network Connections. At Network Connection Windows, you will see the Local
Area Connection Icon, Right click it and select Properties. Local Area
Connection window appears.
126
Figure 69. Network Connection Window
127
NOTE: If any of the above component is not installed, install them by
selecting Add or Install, and then selecting the missing component, and
clicking Add.
128
Figure 72. Assigning IP Address and Subnet Mask
Note: The Domain Name System (DNS) is optional. If you have a DNS
system and your connected to ISP you can input an IP address which
came from the DNS server.
Click Start, right-click My Computer, and then select Properties.
7. Click the Computer Name tab and click the Change button.
8. Enter a name that describes the PC in the Computer Description field. For
example, KIDSPC1, MOMSPC2, or WORKPC3.
129
9. Enter the workgroup name for your network. Use the same workgroup name for
all PCs on the network. Spelling is important in this step.
10. Repeat these steps for each PC on the network.
11. Wait two minutes after Windows opens on all PCs, and then double-click the
Network Neighborhood icon on the desktop. If all went well, you should see
all the PC names on the network when files and folders are being shared. If you
do not see them, press F5 to refresh the screen.
12. If after refreshing the network window, the other PCs still do not appear, check
the firewall settings that may be interfering with the communication.
130
Figure 73. Step 1
2. Select Change Setting (administrative permission will be required in this
procedure).
131
Figure 75. Step 3
132
Figure 77. Step 5
6. After Reboot ==> Right Click on My Network Place ==> Properties.
133
Figure 80. Step 8
134
Figure 82. Step 10
11. Now enter the assigned IP address and then click OK.
135
12. Now open My network place ==> Click to change then Select Turn on
network discovery and file sharing.
13. If you could see all computers in My Network place, you have successfully
configured a workgroup.
Client-Server Network
136
In a client/server network, the server provides the requested
information or service to the client. Servers on a client/server network
commonly perform some of the processing work for client machines, such as
sorting through a database before delivering only the records requested by the
client.
137
and shared printers. Each user must provide an authorized username and
password to gain access to network resources that he or she is permitted to
use. For data protection, an administrator performs a routine backup of all the
files on the servers. If a computer crashes, or data is lost, the administrator can
easily recover the data from a recent backup.
Comparison
Directions: Using the table below, cite the features of peer-to-peer and client /server
network.
Peer-to-peer Network Client/Server Network
1.
2.
3.
4. 5.
Peer-to-peer study
138
Format/Layout Followed Some format Most format All the
(15%) poorly the and layout and layout requirements
requirements related related related to
• Presentation of the related to requirements requirements format and
text format and were met. were met. layout were
• Structuring of text layout. strictly
• Requirements of
followed.
length, font and
style followed
Content/Information The research The The research The research
(50%) was not research was objective was objective
objective was and for the and
• All elements of the and poorly objective most part addresses
topics are addresses and for addresses an with an
addressed the issues some part in-depth indepth
• The information is
referred in addresses analysis of analysis all
technically sound
• Information based the proposed an in depth most issues the issues
on careful topic. analysis referred in referred in
research The provided The the proposed the proposed
Coherence of information provided topic. topic.
information was not information The provided The provided
necessary or was, for information information
not sufficient some part, was, for the was
to discuss necessary most part, necessary
these issues. and sufficient necessary and sufficient
to discuss and sufficient to discuss
these issues. to discuss these issues.
these issues.
139
Quality of Writing The essay The essay The essay The essay
(25%) was not well was well was well was well
written, and written for written for written
• Clarity and contains some part, the most from
cohesiveness many spelling without part, without start to
of sentences errors, and/or spelling, spelling, finish,
and
grammar grammar or grammar or without
paragraphs
No errors in errors and/or use of use of spelling,
spelling, use of English English grammar or
grammar and English errors. errors. use of
use of English errors. The essay is The essay is English
• Organization It lacks clarity for some for the most errors.
and coherence and/or does part well part well The essay
of ideas not present organized, organized, was well
ideas in a clear and clear and organized,
coherent presents presents clear and
way. ideas in a ideas in a presents
coherent coherent ideas in a
way. way. coherent
way.
References References Some of the Most of the All of the
(10%) were not references references references
Soundness of appropriately were were were
references used and appropriately appropriately appropriately
cited. used and used and used and
cited. cited. cited.
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information in
logical manner
140
4. Used complete sentence
5. Offered a concluding
summary
6. Spoke clearly, correctly,
distinctly, and confidently
7. Maintained eye contact
8. Maintained acceptable
posture.
9. Utilized audio-visual aids
10. Handled questions and
comments confidently
Total
Grand Total
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient A-
Advance
Hands-on Activity
Directions: Follow and perform the prescribed procedures in setting up a peer-
to-peer and client/server network for Windows XP and Windows 7. You will be
rated base on the performance indicators below:
Performance Indicators for Setting- up a peer-to-peer and client/server
network
Indicators Poor Fair (75- Good Very Excellent Total
(70- 74) 79) (80-84) Good (90-100) (score x
(85-89) %)
141
Safety
Procedures
(15%)
-Applied /
manifested safety
precautions while
working
Adherence to the
Procedures
(30%)
-Followed the
procedures
systematically
Workmanship
(15%) -Organized
materials and
tools while
accomplishing the
task and has time
management
Quality of
Service (40%)
-Had set-up a fully
functional peer-
topeer and
client/server
network.
Grand Total
Network Security
142
The Importance of Security in Computer System and Networks
Computer and network security help keep data and equipment safe by
giving only the appropriate people access. Everyone in an organization should
give high priority to security, because everyone can be affected by a lapse in
security.
Theft, loss, network intrusion, and physical damage are some of the
ways a network or computer can be harmed. Damage or loss of equipment can
mean a loss of productivity. Repairing and replacing equipment can cost the
company time and money. Unauthorized use of a network can expose
confidential information and reduce network resources.
An attack that intentionally degrades the performance of a computer or
network can also harm an organization’s production. Poorly implemented
security measures that allow unauthorized access to wireless network devices
demonstrate that physical connectivity is not necessary for security breaches
by intruders.
A technician’s primary responsibilities include data and network security.
A customer or an organization may depend on you to ensure that their data and
computer equipment are secure. You will perform tasks that are more sensitive
than those assigned to the average employee. You may have to repair, adjust,
and install equipment. You need to know how to configure settings to keep the
network secure, but still keep it available to those who need to access it. You
will ensure that software patches and updates are applied, antivirus software is
installed, and antispyware software is used. You may also be asked to instruct
users on how to maintain good security practices with computer equipment.
Security Attacks
To successfully protect computers and the network, a technician must
understand both of the following types of threats to computer security:
• Physical: Events or attacks that steal, damage, or destroy such equipment as
servers, switches, and wiring.
• Data: Events or attacks that remove, corrupt, deny access to, allow access to,
or steal information.
Threats to security can come from inside or outside an organization, and
the level of potential damage can vary greatly. Potential threats include the
following:
Internal: Employees who have access to data, equipment, and the network.
Internal attacks can be characterized as follows:
Malicious threats are when an employee intends to cause damage.
143
Accidental threats are when the user damages data or equipment
unintentionally.
External: Users outside an organization who do not have authorized
access to the network or resources. External attacks can be characterized
as follows:
Unstructured attacks, which use available resources, such as passwords
or scripts, to gain access to and run programs designed to vandalize.
Structured attacks, which use code to access operating systems and
software.
Physical loss or damage to equipment can be expensive, and data loss
can be detrimental to your business and reputation. Threats against data are
constantly changing as attackers find new ways to gain entry and commit their
crimes.
144
A Trojan horse technically is a worm. It does not need to be attached
to other software. Instead, a Trojan threat is hidden in software that appears to
do one thing, and yet behind the scenes it does another. Trojans often are
disguised as useful software. The Trojan program can reproduce or replicate
like a virus and spread to other computers. Computer data damage and
production loss could be significant. A technician may be needed to perform
the repairs, and employees may lose or have to replace data. An infected
computer could be sending critical data to competitors while at the same time
infecting other computers on the network.
Security Procedures
You should use a security plan to determine what will be done in a critical
situation. Security plan policies should be constantly updated to reflect the
latest threats to a network.
A security plan with clear security procedures is the basis for a technician
to follow. Security plans should be reviewed each year. Part of the process of
ensuring security is conducting tests to determine areas where security is weak.
Testing should be done on a regular basis. New threats are released daily.
Regular testing provides details of any possible weaknesses in the
current security plan that should be addressed. A network has multiple layers
of security, including physical, wireless, and data. Each layer is subject to
security attacks. The technician needs to understand how to implement security
procedures to protect equipment and data.
145
Source: www.computerflu.com
Figure 87. Most Commonly Known Anti Virus Software
Data Encryption
Encrypting data involves using codes and ciphers. Data encryption can
help prevent attackers from monitoring or recording traffic between resources
and computers. It may not be possible to decipher captured data in time to
make any use of it. A security alert may inform you that you are using an
encrypted connection.
146
A virtual private network (VPN) is an encryption system that protects
data as though it resides on a private network. The data actually travels over
the Internet or another unsecured public network.
Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of protecting
a computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured. Data
being transported on a network is called traffic.
147
Figure 90. Network and Internet Connections
4. Double click the icon labeled "Local Area Connection". The icon may have a
number after it, for example "Local Area Connection 5". Click on Properties
button.
Properties Button
148
Figure 92. Local Area Network Connection Advance Tab
6. Click Settings, then on the ICMP tab select "Allow Incoming echo request".
149
2. In the left pane, click Turn Windows Firewall on or off. If you're
prompted for an administrator password or confirmation, type the
password or provide confirmation. Turn Windows Firewall on or off
link in Windows Firewall.
150
An attacker can access data as it travels over the radio signal. However,
you can use a wireless encryption system to encode data and thereby prevent
unwanted capture and use of the data. Both ends of every link must use the
same encryption standard. The following list describes the different levels of
wireless security, from most secure to least secure:
Lightweight Extensible Authentication Protocol (LEAP): Also
called EAP-Cisco, LEAP is a wireless security protocol created by
Cisco to address the weaknesses in WEP and WPA. LEAP is a good
choice when using Cisco equipment in conjunction with operating
systems such as Windows and Linux.
Wi-Fi Protected Access (WPA): An improved version of WEP. It
was created as a temporary solution until 802.11i (a security layer for
wireless systems) was fully implemented. Now that 802.11i has been
ratified, WPA2 has been released. It covers the entire 802.11i
standard.
WEP 128: An enhanced encryption protocol combining a 104-bit key
and a 24-bit initialization vector.
WEP 64: The first-generation security standard for wireless network.
It could be exploited because of an encryption key that was
vulnerable to decoding.
No security: Although you can elect to implement no security
whatsoever, you leave your wireless network completely vulnerable
to attack.
151
7. Click the Security tab, and then, under Security type, click Shared.
8. Click OK, and then click Close.
Short Quiz
Test I. Modified true or false
Directions: Write SECURITY if the underlined word on the subsequent
statement makes it true and VIRUS if it is makes the statement a false one then
write the correct term/word to correct it. (2 points each). Write your answer in a
separate sheet of paper.
1. Computer and network security help keep data and equipment safe.
2. A technician’s secondary responsibilities include data and network security.
3. Threats to security can come from inside and outside the organization.
4. Computer viruses are created and sent by attackers who have malicious intent.
5. A virus is transferred to another computer through e-mail, file transfer and instant
messaging.
A B
1. when an employee intends to a. Accidental threats
cause damage b. Antivirus software
2. when user damages data or c. Data encryption
equipment unintentionally d. Firewall
3. attached to small pieces of e. Malicious threats
computer code, software and f. Traffic
documents g. Trojan horse
4. a self-replicating program h. Virus
that is harmful to network 5. it is i. VPN
technically a worm j. WPA
6. software designed to detect, k. WEP
disable and remove viruses l. Worm
7. it involves using codes and
ciphers 8. a way of protecting a
computer from intrusion through the
ports
9. an encryption system that
protects data
152
10. data being transported on a
network
Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local store
to gather information about hardware and software firewalls.
2. Which hardware firewall would you purchase? List reasons for your
choice.
3. Using the Internet, research two different software firewalls. Based on
your research, complete the table below.
Company/Software Website Cost Subscription Length Software
Name URL (Month/Year/Lifetime) Features
153
4. Which software firewall would you purchase? List reasons for your
choice.
Directions: In this hands-on activity you will explore the Windows XP Firewall
and configure some advanced settings. There are essential questions that you
need to answer while performing the activity.
Step 1
Navigate to the Windows XP Firewall:
Start > Control Panel > Security Center
The Firewall indicator shows the status of the firewall. The normal setting
is “ON”.
Access the controller for the firewall by clicking Windows Firewall at the
bottom of the window.
154
Step 2
Essential Questions:
In the space below, state why turning off the Windows Firewall is not
advised.
Step 3
From the Windows Firewall control menu select the Exceptions tab.
Programs and services that Windows Firewall is not blocking will be
listed with a checkmark.
155
Figure 98. Windows Firewall Exceptions Tab Window
You can add applications to this list. This may be necessary if your
customer has an application that requires outside communications but
for some reason the Windows Firewall cannot perform the
configuration automatically. You must be logged on to this computer as
an administrator to complete this procedure.
Essential Question:
Creating too many exceptions in your Programs and Services file can
have negative consequences. Describe a negative consequence of having
too many exceptions.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Step 4
From the Windows Firewall control menu select the Advanced tab to
view the Network Connection Settings. Network Connection Settings
displays the different connections configured for your computer.
156
Figure 99. Windows Firewall Advance Tab Window
Click the Settings button in the Network Connection Settings area.
The Advanced Settings window has two tabs: Services and ICMP. Click
the Services tab.
Essential Question:
In the space below, list the services that are available.
___________________________________________________________
___________________________________________________________
___________________________________________________________
Step 5
There are many applications that users do not normally see that also
need to get through the Windows Firewall to access your computer.
These are the network level commands that direct traffic on the network
and the Internet.
Under the ICMP heading, click the Settings button. You will see the
menu where ICMP exceptions are configured.
157
Figure 100. ICMP Settings Window
Essential Question:
In the space below, list the requests for information that your computer will respond
to.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
158
File and Printer Sharing
File sharing can be done using several methods. The most common
techniques include the following:
159
Figure 102. Shared Document Properties
6. Open My Network Places- double-click the icon- and select the Entire
Network option under Other Places at the left of the window. In the main
(right-hand) pane, you should see one or more options. Double-click the
Microsoft Windows Network icon.
160
to the same Ethernet network. Double-click the workgroup to see all the
computers connected to your Ethernet network.
At this point, you can access any of the other computers and see what
folders they have shared. If you don’t see any computer but your own, just wait
a few minutes and refresh your screen. If you don’t see other computers, then
it’s time to troubleshoot the network problems.
Printer Sharing
One of the primary reasons that networks were developed was to allow
groups of computer users to share peripheral devices such as printer. Sharing
a single printer among a group of users costs much less than buying a printer
for each computer.
Low-cost printers usually require a separate print server to allow network
connectivity because these printers do not have built-in network interfaces. The
computer that is connected to the printer can serve as the print server. Most
personal computer operating systems have built-in printer sharing capability.
Setting up printer sharing is simple with Windows XP. The following steps
enable a computer to share a printer:
161
Step 2. Right-click the printer, and choose Properties.
Step 3. Click the Sharing tab.
Step 4. Click the Share this printer radio button.
Step 5. Keep or change the share name.
Step 6. Click Apply.
All the computers that use the shared printer must have the correct
drivers installed. Drivers for other operating systems can be installed on the
print server.
To connect to the printer from another computer on the network, choose
Start > Printers and Faxes > Add Printer. The Add Printer Wizard appears.
Follow the steps using the wizard.
Essay Writing
Directions: Give an explanation on how you understand the subject. Provide at
least 5 sentence response per item.
162
1. Cite the importance of file sharing and give an example scenario where its
worth was proven.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Advantages Disadvantages
163
Recommended Equipment
• Two computers running Windows XP Professional that are directly connected
to each other or through a switch or hub.
• A printer installed on one of the two computers.
Procedures:
Step 1
Choose My Computer > Tools > Folder Options Click the
View tab.
Uncheck the “Use Simple File Sharing (Recommended)”
checkbox, and then click OK.
Step 2
Step 3
Right-click the Example folder, and then choose Sharing and Security.
Click the Share this folder radio button, and then click OK.
164
Figure 106. Sharing Tab Window
Step 4
On the other computer, choose Start > Run…
Type \\computername\Example, where computer name is the name of
the computer with the “Example” folder, and then press the Enter key.
Open the “Brief.doc” file.
Delete the text in the “Brief.doc” file, and then choose File > Save.
Click OK. Close WordPad, and then choose NO when prompted to save
changes to the file. Step 5
Return to the computer with the shared folder.
Right-click Example folder > Sharing and Security, and then click
Permissions. Step 6
Open the Control Panel on the computer with the attached printer.
Choose Printers and Other Hardware > Printers and Faxes. Right-click
the icon of the installed printer, and then choose Sharing….
Click the Share this printer radio button, and then click OK.
165
Figure 107. Sharing Printer Tab Window
Step 7
Return to the computer that is not directly connected to a printer.
Open the Control Panel. Choose Printers and Other Hardware > Printers
and Faxes.
Choose File > Add Printer on the screen below.
166
Figure 109. Add Printer Wizard Window
The Local or Network Printer of the Add Printer Wizard window appears.
Click the A network printer, or a printer attached to another computer
radio button, and then click Next.
167
Figure 111. Specify a Printer Window
The Browse for a Printer window appears.
168
Figure 113. Default Printer Screen
Step 8
Choose Start > Printers and Faxes.
Right-click the printer you installed, and then choose Properties.
The “Printer Properties” window appears.
Choose the General Tab, and then click Print Test Page.
169
Figure 115. Printers and Faxes General Tab
Click OK in the confirmation dialog box, and then click OK to close the printer
properties window.
Step 9
To test the functionality of file and printer sharing, you must be able to
print a document or try the sample print feature of a printer.
170
Workmanship (15%) -
Had organized materials
and tools while
accomplishing the
task and has time
management
Functionality (40%) -
Had set up a functional
file and printer sharing
system and was able to
come up with a printed
hard copy through it
In general, testing is finding out how well something works. For human
beings, testing tells what level of knowledge or skill has been acquired. In
computer hardware and software development, testing is used at key
checkpoints in the overall process to determine whether objectives are being
met. For example, in software development, product objectives are sometimes
tested by product user representatives. When the design is complete, coding
follows and when finished, this is then tested at the unit or module level by each
programmer; at the component level by the group of programmers involved;
and at the system level when all components are combined together. At early
or late stages, a product or service may also be tested for usability.
171
Safety Precautions
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other
people from harm.
4. If the hazard can be easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher in
charge, principal etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to
assist in identifying improved practice to reduce further incidence of
hazards.
172
All hazards must be reported using an Accidental Report form. This
enables us to track the kinds of hazards we have in our workplace, and take
action when necessary to make it safer for all student and clients.
Accident Reports
Forms are used to give specific details with regards to accidents that happened
in the laboratory during experiments.
Rm. No:
Name: Yr/Sec:
173
Hazardous substances
If the workplace hazard appears to be dangerous to staff and clients and
professional assistance is required:
A. Call the supervisor or manager and advise them of the problem and
the urgency of the matter.
B. Depending on the risk, an evacuation may be called.
C. Follow the evacuation procedure.
D. The supervisor or manager will call in the fire brigade or specialized
personnel who will deal with the spill.
Fire Exits
All fire exits should be kept clear from any obstacles. All students have
a responsibility to make sure that chairs, empty boxes or any other type of
obstacle are not placed in or near fire exit doorways.
All corridors also need to have equipment stored on one side only to
ensure that in the event of an emergency there is a clear exit.
174
1. Locate the source of the fire.
2. Locate any people.
3. Remove all people from the building.
4. Once outside, do a head count.
5. Notify the authorities.
Personal Safety While Working with PCs
Computer equipment can be dangerous, and you or others can be injured or
even killed if you don’t follow proper safety guidelines when working along with
PCs. The following are some precautionary measures to take before working
with any computer equipment:
• Wear shoes with non-conductive rubber soles to help reduce the chance of
being shocked or seriously injured in an electrical accident.
• Do not work on components that are plugged into their power source.
• Do not remove expansion cards from a computer when it is turned on.
• Remove jewelries when working inside any computer-related equipment.
• Be sure not to pour water on electronic components.
175
• Check the network configuration.
Click the Start button, type cmd and press Enter. Then, enter the
command ipconfig /all and press Enter.
This command will spit out numerous lines of information. The line you're
looking for should resemble this:
IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred)
If this part of the output does not show a valid IP address, you need to
check that your IP configuration is set correctly and that your DHCP server is
working.
• Verify that the computers can ping each other.
Another basic test you should perform is to use the ping command from
a command prompt to make sure that the computers on your network can
contact one another.
Do several ping tests. First, make sure that TCP/IP is up and running by
having the computer try to ping itself. Open a command prompt and type ping
local host. The output from this command will indicate whether or not the ping
was successful.
Next, try to ping your servers by name. For example, if your file server is
named FileServer01, use the command ping FileServer01.
Technical Report is any document that records the procedure adopted and
results obtained from a scientific or technical activity or investigation. Use the
following format for a technical report for your recently conducted test.
176
TECHNICAL REPORT ON TEST CONDUCTED
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
177
Testing the Wireless NIC
Directions: In this activity, you will check the status of your wireless connection,
investigate the availability of wireless networks, and test connectivity. After
accomplishing the task you need to write a technical report regarding the test
conducted.
Recommended Equipment
178
Figure 118. Ping 127.0.0.1
179
Figure 120. Ping the Default Gateway
A successful ping indicates that there is a connection between the
computer and the default gateway.
Step 2
Open a web browser.
Type www.google.com in the “Address” field, and then press Return.
Step 3
180
Figure 121. Network Connections W indow
Right-click the wireless connection and choose Properties. Click
the Wireless Networks tab.
181
Name of Technician:_______________________________________ Date
of Inspection: __________________ Time: _______________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
182
A. Paper and Pencil Test
General Directions: Read the items very carefully. Write your answer in a clean
sheet of paper.
183
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following wizard is used to configure windows for vision,
hearing and mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. A tab in direct X Diagnostic tool that displays your current audio settings.
a. Input c. Sound
b. Music d. System
8. Which of the following is the most commonly used networking cable
category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. What do you call a copper-cored cable surrounded by a heavy shielding?
a. coaxial cable c. optical fiber
b. fiber optics d. twisted pair
10. What Ethernet cable is used to connect two devices directly?
a. Cross-Over c. both A and B
b. Straight-through d. None of the options
11. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12. In which of the following IP address does 192.168.1.105 belong?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13. What command is used to test the ability of the source computer to reach
a specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14. What do you call an approach to computer networking where all computers
show equivalent responsibility for processing data?
a. Client server c. Peer-to-client
b. Peer to peer d. None of the options
15. Which of the following is an example of Class A subnet mask?
a. 255.0.0.0. c. 255.255.255.0
b. 255.255.0.0. d. 255.255.255.255
Test III. Matching Type
Direction: Match Column A with Column B.
A B
184
1. Copper cabling used for telephone a. Crimping tool
communication b. Cross- over
2. Standard Ethernet cable c. Fiber- optic
3. Cable that has a very thin core d. Ipconfig
4. Cable that has a thicker core e. Multi- mode
5. Tool used for crimping RJ45 f. Ping
6. Connector for Cat 5e cable g. Protocol
7. Set of rules h. RJ45
8. Indicates the network portion of an i. Single- mode
IP address j. Straight-through
9. Command used find out the ip k. Subnet mask
address l. Twisted pair
10. Glass or plastic conductor
B. Skills Checklist
Configuration Skills
Directions: Listed below are the most important skills one must have in order
to configure computer systems and networks. The matrix lists the skills
185
expected you to master. Check the appropriate column which describes the
level of your confidence with the given skills.
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the next page to
determine your initial configuration ability.
186
1.76- 2.50 Confident but needs assistance
1.00 – 1.75 Not yet Confident
187