Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 118

HOW TO USE THIS MODULE

Welcome to the Module “SET-UP COMPUTER NETWORKS”. This module


contains training materials and activities for you to complete.

The unit of competency “SETTING-UP COMPUTER NETWORKS” contains


knowledge, skills and attitudes required for a Computer System Servicing NC II
course.

You are required to go through a series of learning activities in order to


complete each of the learning outcomes of the module. In each learning outcome
there are Information Sheets, Task Sheets, and Job Sheets. Follow these
activities on your own and answer the Self-Check at the end of each learning
activity.

If you have questions, don’t hesitate to ask your Trainer for assistance.

Recognition of Prior Learning (RPL)


You may already have some of the knowledge and skills covered in this
module because you have:
o Been working for some time
o Already have completed training in this area.

If you can demonstrate to your Trainer that you are competent in a


particular skill or skills, talk to him/her about having them formally recognized so
you don’t have to do the same training again. If you have a qualification or
Certificate of Competency from previous trainings show it to your teacher. If the
skills you acquired are still current and relevant to this module, they may become
part of the evidence you can present for RPL. If you are not sure about the
currency of your skills, discuss it with your Trainer.

After completing this module ask your Trainer to assess your competency.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome
may have more than one learning activity.

Page 1 of 118
Program/Course : COMPUTER SYSTEM SERVICING NC II
Unit of Competency : SET-UP COMPUTER NETWORKS
Module : SETTING-UP COMPUTER NETWORKS

INTRODUCTION:
This module contains information and suggested learning activities on
Computer System Servicing NCII. It includes activities and materials on Setting up
Computer Network.

Completion of this module will help you better understand the succeeding
module on the SETTING-UP COMPUTER SERVERS.

This module consists of 4 learning outcomes. Each learning outcome


contains learning activities supported by each instruction sheets. Before you
perform the instructions, read the information sheets and answer the self-check
and activities provided to ascertain to yourself and your trainer that you have
acquired the knowledge necessary to perform the skill portion of the particular
learning outcome.

Upon completion of this module, report to your trainer for assessment to


check your achievement of knowledge and skills requirement of this module. If you
pass the assessment, you will be given a certificate of completion.

SUMMARY OF LEARNING OUTCOMES:


Upon completion of the module you should be able to:

LO1. INSTALL NETWORK CABLES

LO2. SET NETWORK CONFIGURATION

LO3. SET ROUTER/WI-FI/ WIRELESS ACCESS POINT/REPEATER


CONFIGURATION

LO4. INSPECT AND TEST THE CONFIGURED COMPUTER NETWORKS

Page 2 of 118
LEARNING EXPERIENCES

LEARNING OUTCOME 1

INSTALL NETWORK CABLES

Learning Activities Special Instructions


Read Information Sheets CO2.1-1
“Network Concepts”
 Trainer to Discuss Network Concepts In these Learning outcomes you
using ppt. should be able to understand,
 Answer Self-Check CO2.1-1 explain, and apply Install Network
“Network Concepts” Cables.
 Compare your answer in Answer Key
CO2.1-1
“Network Concepts”
 Read Information Sheets CO2.1-2 Go Through Information Sheets
“Network Topology” and answer self-checks to ensure that
 Trainer to Discuss Network Topology
knowledge of standards in install
using ppt.
 Answer Self-Check CO2.1-2 network cables is acquired.
“Network Topology”
 Compare your answer in Answer Key
CO2.1-2
“Network Topology” The output of this Learning Outcome
 Read Information Sheets CO 2.1-3 is the following.
“Network OHS & 5s Principles”
 Trainer to Discuss Network Topology  Learn the Network Concepts
using ppt.  Have Knowledge About Different
 Answer Self-Check CO2.1-3 Network Topologies
“Network OHS & 5s Principles”  Perform Cabling Splicing &
 Compare your answer in Answer Key Testing maintenance.
CO.1-3  Perform Cable Installation
“Network OHS & 5s Principles”  Do Waste Management
 Read Information Sheets CO2.1-4
“Network Tools, Materials & Testing Show your output to your trainer for
Devices” his feedback as you accomplish them.
 Trainer to Discuss Network Tools,
Materials & Testing Devices using ppt.
 Answer Self-Check CO2.1-4 in
“Network Tools, Materials & Testing
Devices”
 Compare your answer in Answer Key
CO2.1-4
“Network Tools, Materials & Testing

Page 3 of 118
Devices”

 Read Information Sheets CO2.1-5


“Network cable installation and testing.”
Trainer to Discuss Network cable
installation and testing using ppt.
 Perform Task-Sheet CO2.1-5 in
“Network cable installation and testing”
 Check Performance Criteria Checklist
CO2.1-5a
“Network cable installation and testing”
 Perform Job-Sheet CO2.1-5 in
“Network cable installation and testing”
 Check Performance Criteria Checklist
CO2.1-5b
“Network cable installation and testing”
 Read Information Sheets CO2.1-6
“Waste Management”
 Trainer to Discuss Waste Management
using ppt.
 Answer Self-Check CO2.1-6
“Network Concepts”
 Compare your answer in Answer Key
CO2.1-6
“Waste Management”

Page 4 of 118
Information Sheets CO2.1-1
“Network Concepts”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Have knowledge about network concepts
2. Identify the different components of network
3. Identify the different types of network
Before installing network cable you should have knowledge about the
Networking Concepts.
What is Computer Network?
- Two or more computers connected together through a communication media
form a computer network.
- The computers are connected in a network to exchange information and
data. The computers connected in a network can also use resources of other
computers.
Computer Network Components
There are different components of a network. Following are the basic components
of network.
1. Server
- Powerful computers that provides services to the other computers on the
network
2. Client
- Computer that uses the services that a server provides the client is less
powerful than server
3. Media
- A physical connection between the devices on a network

Page 5 of 118
4. Network Adopter
- Network adopter or network interface card (NIC) is a circuit board with the
components necessary for sending and receiving data. It is plugged into one
of the available slots on the Pc and transmission cable is attached to the
connector on the NIC.

5. Resources
- Anything available to a client on the network is considered a resource
printers, data, fax devices and other network devices and information are
resources.
6. User
- Any person that uses a client to access resources on the network

7. Protocols
- These are written rules used for communications. They are the languages
that computers use to talk to each other on a network
Different Types of Computer Network
 Local Area Network (LAN)
- Supplies networking capability to a group of computers in close proximity to
each other such as in an office building, a school, or a home. A LAN is
useful for sharing resources like files, printers, games or other applications.
 Metropolitan Area Network (MAN)
- Is a computer network that usually spans a city or a large campus, A MAN
usually interconnects a number of (LANs) using a high-capacity backbone
technology, such as fiber-optical links.
 Wide Area Network (WAN)
- Is a network that covers a broad area (i.e., any telecommunications network
that links across metropolitan, regional, or national boundaries) using
private or public network transports, Business and government entities
utilize WANs to relay data among employees, clients, buyers, and suppliers
from various geographical locations. In essence, this mode of
telecommunication allows a business to effectively carry out its daily
Page 6 of 118
function regardless of location. The Internet can be considered a WAN as
well, and is used by businesses, governments, organizations, and
individuals for almost any purpose imaginable.
Storage Area Network (SAN)
- Is a high-speed sub network of shared storage devices, A storage device is a
machine that contains nothing but a disk or disks for storing data.

Virtual Private Network (VPN)


- Technology included in Windows Server 2003 helps enable cost-effective,
secure remote access to private networks. VPN allows administrators to take
advantage of the Internet to help provide the functionality and security of
private WAN connections at a lower cost. In Windows Server 2003, VPN is
enabled using the Routing and Remote Access service. VPN is part of a
comprehensive network access solution that includes support for
authentication and authorization services, and advanced network security
technologies.

Page 7 of 118
Self-check CO2.1-1
Multiple Choices:

1. Two or more computers connected together through a communication


media?

a.) Computer

b.) Computer Network

c.) Network

d.) All of the Above

2. Powerful computers that provides services to the other computers on the


network?

a.) Network Adapter


b.) Client

c.) Server

d.) Media

3. Computer that uses the services that a server provides?

a.) Client

b.) Media

c.) Server

d.) Network Adapter


4. A physical connection between the devices on a network?

a.) Client
Page 8 of 118
b.) Media

c.) Server

d.) Network Adapter

5. Any person that uses a client to access resources on the network?

a.) Client

b.) User

c.) Server

d.) Media

6. Supplies networking capability to a group of computers in close proximity to


each other such as in an office building, a school, or a home?

a.) Local Area Network

b.) Metropolitan Area Network


c.) Wide Area Network

d.) Storage Area Network

7. Is a computer network that usually spans a city or a large campus?

a.) Local Area Network

b.) Metropolitan Area Network

c.) Wide Area Network

d.) Virtual Private Network

8. Is a network that covers a broad area?

a.) Local Area Network

b.) Metropolitan Area Network

c.) Wide Area Network

d.) Storage Area Network

9. Is a machine that contains nothing but a disk or disks for storing data?

a.) Local Area Network

b.) Metropolitan Area Network

c.) Wide Area Network

d.) Storage Area Network

Page 9 of 118
10. Allows administrators to take advantage of the Internet to help provide the
functionality and security of private WAN connections at a lower cost.

a.) Local Area Network

b.) Metropolitan Area Network

c.) Wide Area Network

d.) Virtual Private Network

Answer key CO2.1-1


1. B

2. C

3. A

4. B

5. B

6. A

7. B

8. C

9. D

10. D

Page 10 of 118
Information Sheets CO2.1-2
“Network Topology”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Different Network Topology
2. Draw Network Topology
Network topology is the diagram that you will follow in installing network
cables.
What is Network Topology?
- Physical and logical network layout of computer Network.
Physical – actual layout of the computer cables and other network devices.
Logical – the way in which the network appears to the devices that use it.
COMMON TOPOLOGIES:
 BUS TOPOLOGY
- Uses a trunk or backbone to which all of the computers on the network
connect.
- Systems connect to this backbone using T connectors or taps.
- Coaxial cablings (10Base-2, 10Base5) were popular options years ago.

Page 11 of 118
BUS TOPOLOGY
Advantages Disadvantages
Cheap and easy to implement Network disruption when computers are
added or removed
Require less cable A break in the cable will prevent all
Systems from accessing the network.
Does not use any specialized network to Difficult to Troubleshoot
troubleshoot.

 RING TOPOLOGY
1. Logical ring

- Meaning that data travels in circular fashion from one computer to


another on the network.
- Typically FDDI, SONET or Token Ring technology are used to
implement a ring network
- Ring networks are most commonly wired in a star configuration
2. Token Ring
- Has multi-station access unit (MSAU), equivalent to hub or switch.
MSAU performs the token circulation internally.

Page 12 of 118
RING TOPOLOGY

Advantages Disadvantages
Cable faults are easily located, making Expansion to the network can cause
troubleshooting easier network disruption
Ring networks are moderately easy to A single break in the cable can disrupt
install the entire network.

 STAR TOPOLOGY
- All computers/devices connect to a central
device called hub or switch.
- Each device requires a single cable point-to-
point connection between the device and hub.
- Most widely implemented
- Hub is the single point of failure

STAR TOPOLOGY

Advantages Disadvantages

Easily expanded without disruption Requires more cable to the network

Cable failure affects only a single User A central connecting device allows for a
single point of failure

Easy to troubleshoot and isolate to More difficult to implement


problems

 MESH TOPOLOGY
- Each computer connects to every other.
- High level of redundancy.
- Rarely used.
- Wiring is very complicated
- Cabling cost is high
- Troubleshooting a failed cable is tricky

Page 13 of 118
- A variation hybrid mesh – create point to point connection between
specific network devices, often seen in WAN implementation.

MESH TOPOLOGY

Advantages Disadvantages

Provides redundant paths between Requires more cable than the other

devices LAN topologies

The network can be expanded without Can be expanded implementation


disruption to current uses

 WIRELESS NETWORKING
- Do not require physical cabling
- Particularly useful for remote access for laptop users
- Eliminate cable faults and cable breaks.
- Signal interference and security issue.

Page 14 of 118
MESH TOPOLOGY

Advantages Disadvantages

Allows for wireless remote access Potential security issues associated with
wireless transmissions

Network can be expanded without Limited speed in comparison to other

disruption to current users network topologies

Self-check CO2.1-2
Multiple Choices:

1. Physical and logical network layout?

a.) Layout

b.) Drawing

c.) Topology

d.) All of the Above

2. Actual layout of the computer cables and other network devices?

a.) Drawing

b.) Topology

c.) Physical Layout

d.) Logical Layout

3. The way in which the network appears to the devices that use it?

Page 15 of 118
a.) Drawing

b.) Topology

c.) Physical Layout

d.) Logical Layout

4. Uses a trunk or backbone to which all of the computers on the network


connect?

a.) Bus Topology

b.) Star Topology

c.) Ring Topology

d.) Mesh Topology

5. Meaning that data travels in circular fashion from one computer to another
on the network?

a.) Logical Ring

b.) Token Ring

c.) Ring Topology

d.) Mesh Topology

6. Has multi-station access unit (MSAU), equivalent to hub or switch. MSAU


performs the token circulation internally?

a.) Logical Ring

b.) Token Ring

c.) Ring Topology

d.) Mesh Topology

7. Each computer connects to every other?

a.) Bus Topology

b.) Star Topology

c.) Ring Topology

d.) Mesh Topology

8. Do not require physical cabling

a.) Bus Topology

Page 16 of 118
b.) Star Topology

c.) Ring Topology

d.) Wireless Networking

Answer key CO2.1-1


1. C

2. C

3. D

4. A

5. A

6. B

7. D

8. D

Page 17 of 118
Information Sheets CO2.1-3
“Network OHS & 5s Principles”

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Network Occupation Health and Safety
2. Learn the Network 5s Principles
Before installing network cables we must practice Network OHS & 5s
Principles to ensure our safety during the training.
OHS Policies and Procedures

Page 18 of 118
Occupational health and safety (OHS) refers to the legislation, policies,
procedures and activities that aim to protect the health, safety and welfare of all
people at the workplace.
Every worker has a right to healthy and safe work and to a work
environment that enables them to live a socially and economically productive life.
Safety practices should be learned early and always adhered to when working with
any electrical device including personal computers and peripherals.
Personal safety while working with PC’s
Here are some safety precautions to take before working with any computer
devices:

 Before doing anything, listen to your trainer’s instruction to prevent


accidents or any unwanted events that may occur on your workplace.

 Be sure not to mix electronic components and water.


 Avoid playing or running while inside the room.
 Always wear personal protective equipments (PPE) like coverall, shoes with
rubber sole, anti-static wrist strap, etc.

 Ask for assistance from your trainer when it comes on dealing with tools &
equipments.

 Applying safety measure when handling tools and equipment are necessary
to avoid certain damages.

 Be sure to use the tools and equipments properly to avoid accidents.

Manufacturing companies are all familiar with the 5S methodology to


organize the workspace for efficiency and effectiveness. 5S is the name of a
workplace organization method that uses a list of five Japanese
words: seiri, seiton, seiso, seiketsu, and shitsuke. Amazingly, transliterated or
translated into English, they all start with the letter
S: sort, set, shine, standardize, sustain. (Credit goes to Hiroyuki Hirano and his
overall approach to production systems)
The obvious benefit of 5S methodology is improved productivity. This
methodology can be applied to any workplace – and for our purpose we can
discuss it to improve your Computer Network environment. Organizing the
Page 19 of 118
hardware and software used in your environment, identifying and running the
items used, maintaining the equipment, and sustaining the new order through
standardization, which builds understanding among employees of how they
should best utilize the computer network – including hardware, software and
business applications in the cloud – to be most productive at work. Let’s review.
1. Sort
Sorting helps you to use a red tag method that will get rid of all the different
processes or items that you don’t need. Throughout the years, your organization
may have acquired software and hardware that may be either used partially, or
not used at all. I bet you have some old boxes and bundles of cables and trinkets
that you don’t know what to do with. Some of them you probably don’t even know
what they are for! This is also a good time to do an inventory of your software, to
make sure that all of your copies are licensed and up-to-date. Perhaps you
can donate your old or unused computers, or discard old and broken gadgets and
network-related equipment. Don’t forget to comply with your local laws about e-
waste! Check these resources for more on e-cycling and electronic waste:
EcoSquid is a web search platform that helps consumers identifies the best
options to resell, recycle, or donate new and used electronics.
Earth 911 has taken environmental hotlines, web sites and other
information sources nationwide, and consolidated them into one network where
you can find community-specific information on e-Cycling and much more.
Electronic Industries Alliance’s Consumer Education Initiative helps you find
reuse, recycling and donation programs for electronics products in your state; here
is the link to their page specific to e-Cycling in New Jersey)
TechSoup provides resources for those who would like to donate hardware,
those who would like to acquire recycled hardware, and refurbishes.
Evaluate your legacy systems to have full understanding of what is going to go
now. Take steps to remove these items from your location. Sorting will de-clutter
and free up space that your organization will need to move on to the next step –
Set.
2. Set
Now that you have a better understanding of what you have, and what you
need – and let’s not forget some free space, you can move on to the next aspect of

Page 20 of 118
5 S method: set everything in order. During this step you will make sure to lay out
your computer network in most efficient way, and make sure that your employees
have a proper workplace that allows them to be productive within your network:
make sure that if new equipment, software or license is required, it is
acquired. Don’t be an unintentional software pirate! Make sure that your offices
are properly wired, and your necessary items such as printers, scanners, etc. at a
reachable distance and can be easily accessed. So, set things in order – and then
shine!
3. Shine
Once you have the workplace sorted and set, it’s time to put some shine on.
What are you doing to make sure your network is neat and clean? The third step,
shine, is crucial to the 5 S methods. Teach your workforce the importance of
maintaining and cleaning the equipment and data for a great impact on the way
your business operates. Shine also helps the equipment to last longer as you
aren’t neglecting it and allowing it to get cluttered or dusty. In addition to
prolonging the lifespan of your equipment, keeping things right is also healthy for
your employees. This page from OSHA – Ergonomic Solutions for Occupational
Safety is a great resource for recommended workspace standards.
Any environment can benefit from equipment that is ergonomic – there is plethora
of items such as monitors, keyboards, mice, office chairs, etc. that are designed to
keep your employees comfortable while on the job. When they perform their jobs
better, your business is doing better. To propel your success even further, move on
to the next step – standardize.
4. Standardize
One of the most important things you can do for your business is to
standardize the equipment and processes within your computer network. New
procedures, once vetted, should be properly documented and made standard. It
will ensure that large orders and other processes would flow easily, especially if
you are looking to expand your business. When you have your equipment
documented, and when procedures become part of the employee manual, your
organization will benefit from improved operations. You can easily use standard
procedures for cross-training of your employees, or bringing new hires on board.
In addition, many platforms and solutions now come with options to migrate data

Page 21 of 118
one to another, and having a standardized setup makes things like data
migrations, equipment and software updates a breeze.
With standards in mind keep an eye on the new trend – Bring Your Own Device
(BYOD). Users are shifting away from corporate issued devices, such as Blackberry
smart phones, to devices they feel more comfortable with, such as iOS or Android
based platforms. If not all of your equipment is standard, processes still should
be. Keep computer network security and efficiency in mind when considering
BYOD for your organization.
5. Sustain
Your final step, sustain, is the hardest – not falling back into old habits is
not easy. It is even more difficult if you don’t have a full-time IT staff on board to
perform tech support and maintenance. Left unmonitored, your data, your
network and computer equipment and devices may get compromised and bring
you to a gradual decline back to the old ways. It may affect your business directly
by having your business data and environment vulnerable. It turns, it will leave
employees idle and impacting your ability to do business, costing you evens more
through the loss of productivity, revenue, or reputation.
Managed Services allows you to maintain and review standards through practice
of outsourcing day-to-day IT management and Computer Network Tech Support as
a cost-effective method for improving business operations. Boost performance,
tighten security, and extend the life of your IT assets. Many IT companies provide
Managed services. If your business is in New Jersey or New York, give us a call at
201-493-1414 to discuss the benefits of Managed IT Services for your business.

Self-check CO2.1-3
Write T if the answer is True and write F if the answer is False.

1. After doing anything, listen to your trainer’s instruction to prevent


accidents or any unwanted events that may occur on your workplace.

2. Be sure to mix electronic components and water.

Page 22 of 118
3. Avoid playing or running while inside the room.

4. Always wear personal protective equipments (PPE) like coverall, shoes with
rubber sole, anti-static wrist strap, etc.

5. Ask for assistance from your trainer when it comes on dealing with tools &
equipments.

6. Applying safety measure when handling tools and equipment are


necessary to avoid certain damages.

7. Be sure to use the tools and equipments properly to avoid accidents.

Enumerate Network Cabling 5s.

Answer-key CO2.1-3
TRUE OR FALSE

Page 23 of 118
1. F

2. F

3. T

4. T

5. T

6. T

7. T

ENUMERATION

1. Sort

2. Set

3. Shine

4. Standardize

5. Sustain

Information Sheets CO2.1-4


“Network Tools, Equipment, Materials & Testing Devices”

Page 24 of 118
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn Different Networking tools, materials & testing devices.
2. Familiarize Different Networking tools, equipment, materials & testing
devices.
Before installing network cables we must know the different Networking
tools, materials, equipments & testing devices that we will use during the training.
Network Tools
Crimping tool
- A crimping tool is a tool designed to crimp or
connect a connector to the end of a cable. For
example, network cables and phone cables are
created using a crimping tool to connect
the RJ-45 and RJ-11 connectors to the end of
the cable. In the example picture below, this
crimper is capable of crimping a RJ-11 (6-Pin)
and RJ-45 (8-Pin) connectors and also includes
a wire cutter near the handles that can be used
to cut phone or CAT5 cable.
Wire stripper
- A tool designed to remove the protective
covering off of a cable to expose the inner wires.
Because different wires come in different
shapes, there are dozens of different wire
strippers available. The picture shows an
example of a wire stripper, which strips a cable
by placing the cable in-between the blade and
one of the ridges and then spun around the cable until the jacket can be
pulled off.

Electric Hand Drill with Drill bit

Page 25 of 118
- Is a tool fitted with a cutting tool attachment or driving tool attachment,
usually a drill bit or driver bit, used for boring holes in various materials
or fastening various materials together with the use of fasteners. The
attachment is gripped by a chuck at one end of the drill and rotated while
pressed against the target material. The tip, and sometimes edges, of the
cutting tool does the work of cutting into the target material. This may be
slicing off thin shavings (twist drills or auger bits), grinding off small
particles (oil drilling), crushing and removing pieces of the work piece (SDS
masonry drill), countersinking, counter boring, or other operations.
Drills are commonly used in woodworking, metalworking, construction
and do-it-yourself projects. Specially designed drills are also used in
medicine, space missions and other applications. Drills are available with a
wide variety of performance characteristics, such as power and capacity.
Network Equipments
Patch panel
- A patch panel, patch bay, patch
field or jack field is a device or unit
featuring a number of jacks, usually
of the same or similar type, for the
use of connecting and
routing circuits for monitoring,
interconnecting, and testing circuits
in a convenient, flexible manner. Patch panels are commonly used
in computer networking, recording studios, and radio and television.
Network Hub
- When referring to a network, a hub is the
most basic networking device that
connects multiple computers or other
network devices together. Unlike a
network switch or router, a network hub
has no routing tables or intelligence on
where to send information and broadcasts all network data across each
connection. Most hubs can detect basic network errors such as collisions,
but having all information broadcast to multiple ports can be a security risk
Page 26 of 118
and cause bottlenecks. In the past network hubs were popular because they
were much cheaper than a switch and router, but today most switches do
not cost much more than a hub and are a much better solution for any
network.
- In general, a hub refers to a hardware device that enables multiple devices
or connections to be connected to a computer. Another example besides the
one given above is a USB hub, which allows dozens of to be connected to
one computer, even though that computer may only have a few USB
connections. The picture is an example of a USB hub.

Network Switch
- A network switch (also called switching
hub, bridging hub, officially MAC
Bridge) is a computer networking
device that connects devices together on
a computer network, by using packet
switching to receive, process and
forward data to the destination device.
Unlike less advanced network hubs, a network switch forwards data only to
one or multiple devices that need to receive it, rather than broadcasting the
same data out of each of its ports.
Managed switches
- Give you more control over your LAN
traffic and offer advanced features to
control that traffic. An
unmanaged switch simply allows
Ethernet devices to communicate with
one another, such as a PC or network
printer, and those are typically what we call “plug and play.”

Network Controller/Network Interface Card

Page 27 of 118
- A network interface controller (NIC, also
known as a network interface
card, network adapter, LAN
adapter or physical network interface and
by similar terms) is a computer
hardware component that connects
a computer to a computer network.
- Early network interface controllers were commonly implemented
on expansion cards that plugged into a computer bus. The low cost and
ubiquity of the Ethernet standard means that most newer computers have a
network interface built into the motherboard.
- Modern network interface controllers offer advanced features such as
interrupt and DMA interfaces to the host processors, support for multiple
receive and transmit queues, partitioning into multiple logical interfaces,
and on-controller network traffic processing such as the TCP offload engine.
Wireless Router
- A wireless router is a device that performs the
functions of a router and also includes the
functions of a wireless access point. It is used to
provide access to the Internet or a
private computer network. It can function in a
wired LAN (local area network), in a wireless-
only LAN (WLAN), or in a mixed wired/wireless
network, depending on the manufacturer and model.
Wireless Access point
- In computer networking, a wireless access
point(AP) is a device that allows wireless devices to
connect to a wired network using Wi-Fi, or related
standards. The AP usually connects to a router
(via a wired network) as a standalone device, but it
can also be an integral component of the router
itself.

Page 28 of 118
 Printer
- In computing, a printer is a peripheral which
makes a persistent human readable
representation of graphics or text on paper or
similar physical media. The two most common
printer mechanisms are black and white laser
printers used for common documents, and color
inkjet printers which can produce high quality
photograph quality output.
 Cable Tester/Network Tester
- A cable tester is a device that is used to test the
strength and connectivity of a particular type of cable
or other wired assemblies. There are a number of
different types of cable testers, each able to test a
specific type of cable or wire (some may be able to
test different types of cables or wires). The cable
tester can test whether a cable or wire is set up
properly, connected to the appropriate source points,
and if the communication strength between the
source and destination is strong enough to serve its
intended purpose. The picture is an example of a
cable tester from TRENDnet.

Network Materials

 RJ 45
- Short for Registered Jack-45, an eight-wire
connector used commonly to connect computers
onto local-area networks (LAN), especially
Ethernets. RJ-45 connectors look similar to the
ubiquitous RJ-11 connectors used for connecting
telephone equipment, but they are somewhat wider.
 Modular Box
- Use to in a large building, usually place on the wall to
connect telephone lines or network cable easily.

Page 29 of 118
 Raceway
- A raceway (sometimes referred to as a raceway
system) is an enclosed conduit that forms a
physical pathway for electrical wiring. Raceways
protect wires and cables from heat, humidity,
corrosion, water intrusion and general physical
threats.
 UTP Cable
- Unshielded Twisted Pair cable is most certainly by
far the most popular cable around the world. UTP
cable is used not only for networking but also for
the traditional telephone.
 Fiber Optic Cable
- An optical fiber cable is a cable containing one or
more optical fibers that are used to carry light. The
optical fiber elements are typically individually
coated with plastic layers and contained in a
protective tube suitable for the environment where
the cable will be deployed. Different types of cable
are used for different applications, for example long
distance telecommunication, or providing a high-
speed data connection between different parts of a building.
Network Personal Protective Equipment

 Protective eyewear
- is protective gear for the eyes, which comes in many
types depending upon the threat that is to be
reduced. The threats can be particles, light, wind
blast, heat, sea spray or some type
of ball or puck used in sports.
 Gloves
- A glove (Middle English from Old English glof) is
a garment covering the whole hand. Gloves have
separate sheaths or openings for each finger and

Page 30 of 118
the thumb; if there is an opening but no covering sheath for each finger they
are called "fingerless gloves". Fingerless gloves have one large opening rather
than individual openings for each finger are sometimes called gauntlets.
Gloves which cover the entire hand or fist but do not have separate finger
openings or sheaths are called mittens. Mittens are warmer than gloves
made of the same material because fingers maintain their warmth better
when they are in contact with each other.
Reduced surface area reduces heat loss.
 Working clothes
- is clothing worn for work, especially work that
involves manual labour. Often those employed
within trade industries elect to be outfitted in
workwear because it is built to provide durability
and safety.

Page 31 of 118
Self-Check CO2.1-4

Identification:
1. Is a tool designed to crimp or connect a connector to the end of a
cable?
2. A tool designed to remove the protective covering off of a cable to
expose the inner wires.
3. Is a device or unit featuring a number of jacks, usually of the
same or similar type, for the use of connecting and routing circuits for monitoring,
interconnecting, and testing circuits in a convenient, flexible manner?
4. Is a computer networking device that connects devices together
on a computer network, by using packet switching to receive, process and forward
data to the destination device.
5. It is used to provide access to the Internet or a private computer
network.
6. Is a device that is used to test the strength and connectivity of a
particular type of cable or other wired assemblies.
7. Is an eight-wire connector used commonly to connect computers
onto local-area networks (LAN), especially Ethernets.
8. Is an enclosed conduit that forms a physical pathway for
electrical wiring.
9. Is used not only for networking but also for the traditional
telephone.
10. Is protective gear for the eyes, which comes in many types
depending upon the threat that is to be reduced.

Page 32 of 118
Answer-Key CO2.1-4
1. Crimping Tool

2. Wire Stripper

3. Patch Panel

4. Network Switch

5. Wireless Router

6. Lan/Cable Tester

7. Raceways

8. RJ 45

9. UTP Cable

10. Protective Eye wear/Goggles

Page 33 of 118
Information Sheets CO2.1-5
“Network cable installation and testing.”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Familiarize the different Types of UTP Cable and their uses.
2. Learn the proper ways in splicing cable.
3. Learn how to install cables properly.
4. Install Patch Panel Cable
5. Install Modular Box
6. Install Network Equipment
7. Test Network Installation
Installing cable is one of the most critical part of this module because this
can affect other module so it should be done properly to avoid problems during
configuration of the network.
 Network Cables
- Networking cables are used to connect one network device to other network
devices or to connect two or more computers to share printer, scanner etc.
Different types of network cables like Coaxial cable, Optical fiber
cable, Twisted Pair cables are used depending on the
network's topology, protocol and size. The devices can be separated by a few
meters (e.g. via Ethernet) or nearly unlimited distances (e.g. via the
interconnections of the Internet).
 Unshielded Twisted Pair
- Unshielded Twisted Pair cable is most certainly by far the most popular
cable around the world. UTP cable is used not only for networking but also
for the traditional telephone.
UTP Cable Categories

Page 34 of 118
 CAT1
- Data rate up to 1Mbps
- Traditional Telephone & ISDN – Modem
 CAT2
- Data rate up to 4Mbps
- Token Ring
 CAT3
- Data rate up to 10Mbps
- Token Ring & 10Base-T
 CAT4
- Data rate up to 16Mbps
- Token Ring
 CAT5
- Data rate up to 100Mbps
- Ethernet (10Mbps)
- Fast Ethernet (100Mbps) & Token Ring (16Mbps)
 CAT5e
- Data rate up to 1000Mbps
- Gigabit Ethernet
 CAT6
- Data rate up to 1000Mbps
- Gigabit Ethernet
Ethernet Cable Standard Color Coding
- The TIA/EIA 568-A standard which was ratified in 1995, was replaced by
the TIA/EIA 568-B standard in 2002 and has been updated since. Both
standards define the T-568A and T-568B pin-outs for using Unshielded
Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The
standards and pin-out specification appear to be related and
interchangeable, but are not the same and should not be used
interchangeably.
- Both the T-568A and the T-568B standard Straight-Through cables are used
most often as patch cords for your Ethernet connections. If you require a
Page 35 of 118
cable to connect two Ethernet devices directly together without a hub or
when you connect two hubs together, you will need to use a Crossover cable
instead.
- A good way of remembering how to wire a Crossover Ethernet cable is to
wire one end using the T-568A standard and the other end using the T-
568B standard. Another way of remembering the color coding is to simply
switch the Green set of wires in place with the Orange set of wires.
Specifically, switch the solid Green (G) with the solid Orange, and switch the
green/white with the orange/white.
T-568A Straight-Through Ethernet Cable

T-568B Straight-Through Ethernet Cable

Ethernet Cable Instructions:

Page 36 of 118
- Pull the cable off the reel to the desired length and cut. If you are pulling
cables through holes, its easier to attach the RJ-45 plugs after the cable is
pulled. The total length of wire segments between a PC and a hub or
between two PC’s cannot exceed 100 Meters (328 feet) for 100BASE-TX and
300 Meters for 10BASE-T.
- Start on one end and strip the cable jacket off (about 1″) using a stripper or
a knife. Be extra careful not to nick the wires, otherwise you will need to
start over.
- Spread, untwist the pairs, and arrange the wires in the order of the desired
cable end. Flatten the end between your thumb and forefinger. Trim the
ends of the wires so they are even with one another, leaving only 1/2″ in
wire length. If it is longer than 1/2″ it will be out-of-spec and susceptible to
crosstalk. Flatten and insure there are no spaces between wires.
- Hold the RJ-45 plug with the clip facing down or away from you. Push the
wires firmly into the plug. Inspect each wire is flat even at the front of the
plug. Check the order of the wires. Double check again. Check that the
jacket is fitted right against the stop of the plug. Carefully hold the wire and
firmly crimp the RJ-45 with the crimper.
- Check the color orientation, check that the crimped connection is not about
to come apart, and check to see if the wires are flat against the front of the
plug. If even one of these are incorrect, you will have to start over. Test the
Ethernet cable.
Ethernet Cable Tips:
- A straight-thru cable has identical ends.
- A crossover cable has different ends.
- A straight-thru is used as a patch cord in Ethernet connections.
- A crossover is used to connect two Ethernet devices without a hub or for
connecting two hubs.
- A crossover has one end with the Orange set of wires switched with the
Green set.
- Odd numbered pins are always striped, even numbered pins are always
solid colored.

Page 37 of 118
- Looking at the RJ-45 with the clip facing away from you, Brown is always on
the right, and pin 1 is on the left.
- No more than 1/2″ of the Ethernet cable should be untwisted otherwise it
will be susceptible to crosstalk.
- Do not deform, do not bend, do not stretch, do not staple, do not run
parallel with power cables, and do not run Ethernet cables near noise
inducing components.

Basic Theory:

By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet


crossover cable with a T-568B end, we see that the TX (transmitter) pins are
connected to the corresponding RX (receiver) pins, plus to plus and minus to
minus. You can also see that both the blue and brown wire pairs on pins 4, 5, 7,
and 8 are not used in either standard. What you may not realize is that, these
same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as well. So why
bother using these wires, well for one thing its simply easier to make a connection
with all the wires grouped together. Otherwise you’ll be spending time trying to fit
those tiny little wires into each of the corresponding holes in the RJ-45 connector.

How to wire your room with Cat5e or Cat6 Ethernet Cable.


Page 38 of 118
Although wireless is simpler for a lot of people, due to multimedia sharing,
bandwidth on a home network, and paranoia about wireless security, you may
want to use a hard wired solution for home networking. Having a wired network at
home allows you to have a private, high-speed network for internet access, file
sharing, media streaming, online gaming, IP security cameras, and much more.

Step 1: Initial Considerations and Planning


There are certain design considerations that need to be addressed based on your
needs.
1. Which room(s) do I want wired?
2. How many ports do I want in each location?
3. What is a good location for distribution?
4. What path should the cables take?
5. What network speed do I need?
Step 2: Required Tools, Equipments and Materials
Tools
Crimping Tool
Electric Hand Drill
Wire Stripper
Equipments
Patch panel
Network Switch/Hub
Wireless Router
Wireless Access point
Manage Switch
Materials
Cat5e or Cat6 UTP
Cat5e or Cat6 UTP Cable Crimp (Straight-through & Crossover)

Page 39 of 118
Raceways
Modular Box
Label maker (optional).
Step 3: Measure and Run the Cables
There are a number of ways to do this. You can estimate, measure from floor
plans, run one, etc.
Step 4: Connect the Wires to the Patch Panel

Strip the sheath


a. Remove the cable sheath 2.54 cm (1 inch) from the end of the cable.

Position wires in data jack


a. Position wires in the proper channels on the RJ-45 jack maintaining the
twists as close to the jack as possible. The diagram that follows shows
an example of how to place the wires with one type of jack.

b. Most jacks have the channels color-coded to indicate where the wires go.
The following photo of the jack shows one model. Jacks are typically
stamped to indicate
whether they are T568A or
T568B.

Page 40 of 118
Punch down the data jack
a. Use the punch tool to push conductors into the
channels. Make sure to position the cutting side
of the punch tool so that it faces the outside of
the jack. If this is not done, it will cut the wire
being punched. Try tilting the handle of the
punch tool a little to the outside, so it will cut
better.
b. If any wire remains attached after using the punch tool, simply twist
the ends gently to remove them. Then place the clips on the jack, and
tighten them. Make sure that no more than 1.27 cm (one half inch) of
untwisted wire is between the end of the cable jacket and the channels
on the jack. Attach the faceplate.
c. Snap the jack into the faceplate by pushing it from the back side. Make
sure when this is done, that the jack is right-side up so the clip faces
down when the wall plate is mounted.
d. Use the screws to attach the faceplate to either the box or to the
bracket. If there is a surface mounted box, keep in mind that it might
hold 30-60 cm (1-2 feet) of excess cable. Then it will be necessary to
either slide the cable through the tie-wraps, or pull back the raceway
that covers it, in order to push the excess cable back into the wall. If
there is a flush-mounted jack, all that is needed is to push the excess
cable back into the wall.
Punch down the patch panel
a. On the opposite end of the cabling, remove the jacket 2.54 cm (1 inch)
from the cable.

Page 41 of 118
b. Lay the wires down in the patch panel so that the colors of the wires
correspond exactly to the colors indicated on the pin locations in the
same manner as the data jack was punched down.
c. Keep the sheath within .64 cm (¼ inch) of where the wires begin
branching out to their pin locations.
d. Do not untwist the wires more than necessary to lay them down at the
pin locations. A good way to keep from untwisting too much is to hold
down the wires next to the patch panel with one finger while using the
other hand to pull apart each end as you lay it across the connector.

e. The following figure shows a large punch down patch panel with
carefully routed cabling.

Page 42 of 118
Step 5: Test the data jack and patch panel terminations
a. Obtain two straight-through Ethernet patch cables and verify they both
function properly using a simple cable tester.
b. Connect one end of one of the straight-through Ethernet patch cables to
the data jack outlet and one end of the other straight-through cable to
the jack at the patch panel.
c. Insert the opposite ends of the two cables into a simple cable tester and
check for continuity from end to end through both patch cables, the

Page 43 of 118
data jack, and the patch panel. Did the cable run test good from end to
end?

Step 6: Connect the wires to the modular box.


a. Make sure the stripper is adjusted properly on a scrap piece of cable.
The Stripper should be adjusted to only score the jacket to make
removing it easier and not nick the twisted pairs.

b. Straighten the pairs out completely and lay them over the top of the
keystone jack noting the color pattern for the 568b wiring. Note: Each
keystone jack is slightly different in how they are labeled and how the
colors are arranged. The 568B standard is most commonly used and
ends of the cable must have the same standards to communicate. We
have the 3 most common keystone jack styles pictured here. The first
jack pictured has the 2 standard pairs on the right, and the 2 variable
pairs on the left. The A standard is the center column and the B
standard is on the left. Both A and B standard applies to the right side
Page 44 of 118
of the jack. The solid color box with the lower right corner missing
represents the solid color wire with the white stripe. The white box with
the colored tip represents the white wire with the colored stripe. The
second jack pictured here has both A and B standards on both sides of
the jack, with the color code running down the center. The solid color
rectangle represents the solid color wire with the white stripe, wile the
half white half color rectangle represents the white wire with the colored
stripe. The third jack pictured here has the A and B standard codes
labeled on the outside of the jack. With the A standard on top and the B
standard on the bottom. The solid box represents the solid wire with the
white stripe Wile the box with the white diagonal stripe going throught
the middle, represents the white wire with the colored stripe.

c. Keeping the pairs as twisted as possible press the wire into the correct
groove with your thumbs. If you completely straighten the wires to run
them through the jack you will risk cross talk between the pairs.

d. Using a punch down tool punch the wires down into the blades built
into the keystone jack. The blades in the jack are designed to work with
solid cable, and may not work with stranded cable. Make sure the blade
(as noted in the picture) is facing the outside of the keystone jack. If you
reverse it you will cut the wires inside the keystone jack rendering them
useless. The punch down tool should cut off the remaining pieces of the
wire on the outside, but sometimes you may need to punch them down

Page 45 of 118
a 2nd time and wiggle the wire to it breaks clean off. Once this is done
you can install the dust covers if your keystone jack comes with them.
This keystone jack did not have the covers. The covers should never be
used to do the job of the punch down tool.

Step 7: Connect to the Internet


a. Connect Network Switch/Hub to the patch panel using cross-over cable
base on the netowork topology.
b. Connect the Wireles Router to the Network hub & to the Modem using
cross-over cable base on the netowork topology.
c. Connect your pc on the modular box using straight-through cable.

Page 46 of 118
Task-Sheet CO2.1-5
Title: Cabling & Testing

Performance Objective: Given (tools, equipment, materials &


Protective equipment), you should be able to
(create straight-through & crossover cable)
following (the proper way of cabling).

Supplies/Materials : UTP Cable & RJ 45


Tools & Equipment : Crimping Tools, Wire stripper & Cable/Lan
Tester
Steps/Procedure:

1. Make sure to follow the proper way of cutting & crimping cables.
2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment, materials & protective equipments you
will use.
4. Crimp straight-through & crossover cable.
5. Test your cable if they are working properly.
Assessment Method:

 Demonstration

 Interview

Page 47 of 118
Performance Criteria Check-list CO2.1-5a
CRITERIA YES NO
Did you….
1. Make sure to follow the proper way of cutting & crimping cables.

2. Make sure that you’re working area is ready.

3. Prepare all tools, equipment, materials & protective equipments


you will use.

4. Crimp straight-through & crossover cable.

5. Test your cable if they are working properly.

Page 48 of 118
Job-Sheet CO2.1-5
Title: Network Cable Installation
Performance Objective: Given (tools, equipment & materials), you
should be able to (Install Cable in the Patch Panel,
Modular box and connect to the other network
equipments) following (the steps written in the
information sheet CO2.1-6).

Supplies/Materials : Crimp Straight-through & Cross-over Cable, UTP


Cable, Raceways, Modular Box & Label Marker.

Tools & Equipment : Crimping Tools, Wire stripper & Cable/Lan Tester,
Electric Hand Drill, Patch panel, Network Switch/Hub, Wireless Router,
Wireless Access point, Manage Switch.

Steps/Procedure:

1. Make sure to follow the proper way of cable installation.


2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment & materials you will use.
4. Install Patch Panel Cable.
5. Connect Cable to Modular box.
6. Connect Network equipments according to Network Topology.

Assessment Method:

 Demonstration

 Interview

Page 49 of 118
Performance Criteria Check-list CO2.1-5b
CRITERIA YES NO
Did you….
1. Make sure to follow the proper way of cable installation.

2. Make sure that you’re working area is ready.

3. Follow the proper way of cutting & crimping cables.

4. Install Patch Panel Cable.

5. Connect Cable to Modular box.

6. Connect Network equipments according to Network


Topology.

Page 50 of 118
Information Sheets CO2.1-6
“Waste Management”

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the proper disposal of network cables
Recycling used cable: Challenges and opportunities

The cabling industry has a ways to go before it can be considered “green.”

It has been more than four years since the National Electrical Code, in its
2002 edition, first required the removal of abandoned cable. That requirement,
which is law wherever the 2002 NEC or the portions of it relating to abandoned
cable have been adopted, kicks in whenever a cabling project of any type takes
place. Chief among the concerns about abandoned cable is that it represents a fire
hazard, and it is no coincidence that the document requiring its removal is
published by the National Fire Protection Association (NFPA; www.nfpa.org).
The requirement has stimulated something of a cottage industry, with some
contractors specializing in, or limiting their practice exclusively to, removing
abandoned cable from buildings. Soon (or perhaps even today), it may be
inappropriate to call it a cottage industry, as signs point to cable removal
becoming a mainstream practice. The ground first shook on that concept in May
2005 when DuPont launched its Abandoned Cable Services program
(www.dupont.com/cablingsolutions). Under the program, DuPont conducts
engineering analysis of a building’s abandoned cable and provides building owners
with a written report. Building owners then have the option to have the cable
removed, a process carried out by a stable of DuPont-sanctioned contractors.

Page 51 of 118
Last summer, Communications Planning Corp. (CPC;
www.communicationsplanning.com) also launched cable-removal services. Headed
by noted industry figure, Frank Bisbee, CPC is one of several cabling design and
installation contractors that have turned at least some of their attention to abating
abandoned cable.
Guidance for recycling
In June, DuPont introduced a specification guide for abandoned cable
assessment and removal. The guide is meant to act as an aid to project specifies
and designers, and provides a template by which those professionals can dictate
that abandoned cable be identified and removed. The specifications are written in
accordance with the 2004 edition of the Master Format, which is a series of
construction specifications endorsed by the Construction Specifications Institute
and the American Institute of Architects.
In addition to the guide covering abandoned cable assessment and removal,
DuPont simultaneously introduced similar specification guides for installing
limited-combustible cable and for recycling removed abandoned cable. DuPont
and some cable manufacturers have advocated installation of limited-combustible
cable for several years. But the notion of recycling communications cable that has
been removed from buildings is a newer concept-one that DuPont incorporated
into its Abandoned Cable Services program last year.

If abandoned cable removal services can be called a “cottage industry,” then


the recycling of such cable might be described as “fledgling,” because by and large,
it is a new enterprise that has not yet taken firm hold. Among several contributing
Page 52 of 118
factors, CPC’s Bisbee emphasizes that labor is a significant hurdle. “The process of
separating the removed abandoned cables to get them into the recycle stream can
be more costly than the materials recovered,” he notes.
What's in there?
Those contractors that have been recycling cable, and did so even before the
2002 NEC edict about abandoned cable removal, have not necessarily followed
strict procedures preparing that cable for recycling. While nobody would go on
record admitting the following practice, many in the industry have heard about or
perhaps even witnessed a batch of old cable being thrown into a large barrel and
burned down to its copper-the component most often recycled. Considering the
chemicals that make up a twisted-pair copper cable, such a practice can hardly be
considered environmentally friendly.
Additionally, the fluoropolymers that insulate the copper conductors in a plenum-
rated twisted-pair cable do not burn easily (that’s exactly the point of a plenum
cable). Stripping those cables down to their bare copper is, as Bisbee referred to, a
labor-intensive endeavor. But it can be done, by hand or other means.
This author also could not find a recycler willing to go on record describing
in detail the process by which an unshielded twisted-pair cable is broken down
and prepared for recycling. The closest thing to a description was, “The separation
and recovery processes are proprietary; however, the processes used are
mechanical in nature and do not require any chemicals.”
In a big-picture view, cable that is removed from a building and intended for
the recycling stream are separated into several groups, including communications
cable containing copper, communications cable containing optical fiber, and
electrical cables. Other pieces of hardware, including racks, trays, and blocks, also
must be dealt with separately from the copper communications cable.
Once separated, the cables get put into some type of temporary storage.
Depending on how much cable is involved and the time frame in which it will be
removed, it may be stored in a dumpster placed on site exclusively for cable; or,
for smaller projects, it may be stored in bags or boxes. On smaller projects, the
contractor is responsible for transporting the cable to the recycling facility. DuPont
notes that it can provide dumpsters to larger job sites for cable that will be
recycled through its program.

Page 53 of 118
Once the cable reaches the recycling facility, the sites employ their
proprietary processes to break down the cable. Says one recycler that is part of
DuPont’s program, “After abandoned cable is removed from a building, fiber-optic,
electrical cables, and related hardware are separated from the low-voltage
communication cable, which is then recycled. First, the metal is separated from
the non-metal components. Then the non-metal components-primarily
fluoropolymers, polyvinylchloride, and polyethylene-are separated and recovered.”
As far as what happens to each part of a cable, the recycler states, “Usually
all the parts of an unshielded twisted-pair cable can be recycled except polyester
wraps or draw strings. Each of the components is separated by material type. The
copper is sent to a copper refining company, the PVC and polyethylene are sold to
secondary converters for a variety of applications, and the fluoropolymer is
cleaned and extruded into pellets for secondary applications and sold by DuPont
in the wire and cable industry.”
Some cable types can present significant challenges to a recycler. Specifically,
coaxial and shielded twisted-pair cable may contain tin-plated copper as a
shielding element. That material is not worth as much as pure copper and is hard
to segregate from pure copper. Additionally, wrapped shields can vary greatly from
heavy foils to metalized polyester. They also pose segregation challenges, which
diminish their value.
Taking an interest
With DuPont cleaning and reusing recovered fluoropolymers, it has a
financial interest in reclaiming these materials; it stands to reason the company
will make accommodations to facilitate large-scale recycling activities. When the
company introduced its new specification guides, Robert Kenny, global business
manager of DuPont Cabling Solutions, stated, “DuPont is committed to making it
easier for building owners to comply with codes in a way that is environmentally
responsible through recycling, and to follow best practice recommendations for fire
safety on an ongoing basis.”
But will recycling take hold across the board on cable-removal projects? The
current price of copper suggests there is some chance contractors will find it
worthwhile to recycle cable for that element alone. Copper is the cable component
most in demand today.

Page 54 of 118
Another significant aspect of cable removal and recycling is the fact that
many cables in buildings today contain hazardous substances, particularly lead.
The recently enacted European Union environmental initiative RoHS (Restriction
on Hazardous Substances) has spurred any cable manufacturer wanting to do
business in Europe to remove lead from its products. California legislation set to
go into effect on January 1 contains restrictions similar to that of RoHS. So, by
and large, lead and other dangerous materials have been eliminated from products
now reaching the marketplace. But the entire issue of abandoned cable focuses on
products that were manufactured years and in some cases decades ago, and
almost certainly contain hazardous materials.
Bisbee, outspoken about the use of heavy metals and other hazardous materials in
cabling products, comments that while over-the-counter swipe kits can be helpful
in determining the presence of high quantities of lead, a lower and still-dangerous
lead level may not show up on such a test. The Environmental Protection Agency
also has cautioned that tests of these types are not accurate enough to distinguish
between high and low levels. Impossible to verify or quantify without third-party
testing, the presence of lead dust in abandoned cabling systems looms as a
possible threat and, at this point, an unknown.
A less-heard-about but perhaps no less significant European Union
environmental law is WEEE-the Waste Electrical and Electronic Equipment
directive. Although it is aimed at household electronics users and not commercial
users, it provides a blueprint that puts the onus for waste-electronics collection
and recycling on the manufacturers of the equipment.
Meanwhile, in the United States, building owners face the task of having unused
cable removed. And where it goes once it leaves the building varies greatly from
project to project. PATRICK McLaughlin is chief editor of Cabling Installation &
Maintenance.

Page 55 of 118
Self-Check CO2.1-6
Multiple Choices:

1. Introduced a specification guide for abandoned cable assessment and


removal.

a.) DuPont

b.) PATRICK McLaughlin

c.) Robert Kenny

d.) All of the Above

2. NEC Stands For?

a.) National Electrical Code

b.) National Electrician Code

c.) National Electricity Code

d.) National Electronics Code

3. Abandoned cable removal services can be called what?

a.) Equipment directive

b.) Cottage industry

c.) Fledgling

d.) All of the Above

4. Recycling of such cable might be described as what?

a.) Equipment directive

b.) Cottage industry

c.) Fledgling

d.) All of the Above

5. Is the cable component most in demand today.

a.) Copper
Page 56 of 118
b.) Silver

c.) Aluminum
d.) All of the Above

Answer key CO2.1-7


1. A

2. A

3. B

4. C

5. A

Page 57 of 118
LEARNING EXPERIENCES

LEARNING OUTCOME 2

SET NETWORK CONFIGURATION

Learning Activities Special Instructions


 Read Information Sheets CO2.2-1 In these Learning outcomes you
“Configure Computer Network”
 Trainer to Discuss Configure Computer should be able to understand, explain,
Network using ppt. and apply Setting-up of Network
 Perform Task-Sheet CO2.2-1
“Configure Computer Network” Configuration.
 Check Performance Criteria Checklist
Go Through Information Sheets
CO2.2-1
“Configure Computer Network” and answer self-checks to ensure that
 Read Information Sheets CO2.2-2 knowledge of standards in install
“Inspect & Diagnose Computer Network”
 Trainer to Discuss Inspect & Diagnose network cables is acquired.
Computer Network ppt.
 Perform Job-Sheet CO2.2-2 The output of this Learning Outcome is
“Inspect & Diagnose Computer Network” the following.
 Check Performance Criteria Checklist
CO2.2-2  Perform Network Configuration
“Inspect & Diagnose Computer Network”
 Diagnose computer network

 Perform Network Inspection

Show your output to your trainer for his


feedback as you accomplish them.

Page 58 of 118
Information Sheets CO2.2-1
“Configure Computer Network”

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure Peer to Peer Network
2. Share Folders and Printers
Windows 7, as with many of the different operating systems available, has a
number of different network functions which can be configured.
How to Configure a Static IP Address in Windows 7

Sometimes in order to gain connectivity in certain networks where a DHCP


server is not running, the configuration of a static IP address is required.
The steps required to setup up a static IP address are rather
straightforward, but the process is a bit different from Windows Vista and XP.
Let’s go through the steps now and configure a static IPv4 address in Windows 7.

Static IPv4 Configuration in Windows 7

The first thing that must be done is to gain access to the Network and
Sharing Center in Windows 7. This can be done in one of two ways; the first way to
access it is via the control panel.
Select the Windows 7 or on the bottom left-hand corner and select the
control panel option as shown below:

Page 59 of 118
There are several views which are available for the control panel; by default the
category view is used. When using the category view the option that you need to
select is called View network status and Tasks, as highlighted below.
This will bring you to the Network and Sharing Center.

The second way to gain access to the Network and Sharing Center is to
utilize the network icon which is displayed in the system tray when a network
interface has been enabled.
When this icon is right-clicked the option to open the Network and Sharing
Center is given as shown below:

Page 60 of 118
Once the Network and Sharing Center is open there is an option which
allows the change of adapter settings which is shown in the upper left hand corner
of the window. This is shown highlighted in the following figure (click on the image
to enlarge):

Once in the Network Connections window, an interface must be selected


which is going to be configured with the static IP address. In the following
example, both a wired and wireless interface is shown as examples.
For the purposes of this article the wired interface will be used as the
interface being given a static IP Address.

Page 61 of 118
By right-clicking on the correct interface a sub-menu is shown; from this
menu select the properties option.

Once the properties option is


selected the interface properties
windows will be displayed. This
screen gives the option to configure
a number of different network
parameters.
Since we want to change the
interface IPv4 IP address this

Page 62 of 118
option must be selected from the window. Once this option is selected the
properties button will be enabled; press the properties button.

Once the properties button is pressed the IPv4 properties window is


displayed which shows that the interface is currently configured to obtain both its
IP address and its DNS server information automatically.

Page 63 of 118
In order to change to a static IP address the option to Use the following IP
address must be selected; once this is done the option to enter the IP address
parameters is enabled and the Use the following DNS server addresses option is
selected.

For the purpose of this article the IP address 192.168.1.100 is used with a
subnet mask of 255.255.255.0 and a default gateway of 192.168.1.1. The DNS
server which will be configured is 4.2.2.2.

These options are shown in their correct locations in the following figure:

Once these options have been entered on the screen simply press Ok on
both property screens and the configuration of a static IP is complete.
Page 64 of 118
The knowledge of static IP configuration is vital in modern organizational
environments as many do not completely utilize automatic IP assignment; it is also
vital knowledge when trying to troubleshoot IPv4.

HOMEGROUP Configuration in Windows 7

A new option which was introduced with Windows 7 is HomeGroup.


HomeGroup allows Windows 7 machines to be linked in an easier way which
makes the sharing of resources between machines much simpler to setup. Each
machine must become a member of a HomeGroup in order to utilize this
functionality.
The first thing that must be done on the first computer used is the creation
of a HomeGroup. This is done through the Choose HomeGroup and Sharing
Options in the Network and Sharing Center window.

Once this option is selected, the HomeGroup window is displayed. The first
computer to be configured with a HomeGroup will be given the option to Create a

Page 65 of 118
homegroup. Once a HomeGroup is configured on a network it will actively
broadcast its existence to the other computers on the network (HomeGroup
requires IPv6 to be enabled), this option is shown in the following figure:

Page 66 of 118
Page 67 of 118
Once a HomeGroup has been created on a network, all other participating
computers must join it. In order to join the HomeGroup, the HomeGroup
password shown in the figure above is required (this can also be changed).
The following figure shows how the HomeGroup window will display when there is
an existing HomeGroup on the network. Once this is shown, simply press theJoin
now button and select the local shared options and enter the HomeGroup
password.

Page 68 of 118
Once this is complete the machine has become part of a HomeGroup.

Windows 7 Network Locations aka Profiles

Another feature which can be used with Windows 7 is network location.


Everytime a new network connection is established, a prompt will be given to
select what type of location the new network connection is. The three options are
Home, Work and Public.
When using the Home location, network discovery and HomeGroup are
enabled which allows the easy networking of Windows machines.
The Work location is similar to the Home location but disables the use of the
HomeGroup functionality. The Public location is the most secure and disables the
various sharing functionalities which are enabled then in the other locations.
The current location which is selected is shown in the Network and Sharing
Center under View your active networks and can be changed by selecting the
current setting.

Page 69 of 118
Once the setting is selected the Set Network Location window is opened
which enables the configuration of a different network location. This window is
also the same window which will be used to prompt initial network location
selection.

Page 70 of 118
Conclusion
There are a number of different advanced options which can be utilized with
Windows 7; this article shows how to configure some of the most used options.
Windows 7, as with newer operating systems, continues to make better help
systems. Take the time to utilize these systems and learn even more about
Windows 7 functionality.
How to Change the Name of Your Windows Computer
Changing this in XP was extremely simple, but in Windows 7, Windows 8, or
Vista it’s buried behind a few more menus. Here are three routes you can take to
open up System Properties:
 Type sysdm.cpl into the start menu search box (quickest)
 Right-click on the Computer option on the start menu or in My Computer.
 Open Control Panel, and go to System and Maintenance, and then System.
If you chose one of the last two options, then you’ll need to click on
Advanced System Settings on the left menu:

Now you’ll finally be on the right screen, which should say System
Properties.

Page 71 of 118
Click on the “Change” button to rename the computer, which will pop up
this dialog:

Now you can finally change the name of the computer. You could also
change the name of the workgroup to something more descriptive as well. You’ll
have to reboot after you make this change.
Share files and folders over the network

Sharing files with public folders


To share items in your Public folder and its subfolders with other users of
your computer, you don’t need to do a thing. By default, all users with an account
on your computer can log on and create, view, modify, and delete files in the
Public folders. The person who creates a file in a Public folder (or copies an item to
a Public folder) is the file’s Owner and has Full Control access. All others who log
on locally have Modify access. For more information on access levels, see what are
permissions?
To share items in your Public folder with network users, click
the Start button , click Network, and then click Network and Sharing Center.
Turn on Public Folder Sharing (for information on how to do this, see sharing files

Page 72 of 118
with the Public folder). You can’t select which network users get access, nor can
you specify different access levels for different users. Sharing via the Public folder
is quick and easy—but it’s rigidly inflexible.
Sharing files and folders from any folder
Whether you plan to share files and folders with other people who share
your computer or with those who connect to your computer over the network (or
both), the process for setting up shared resources is the same as long as the
Sharing Wizard is enabled. We recommend that you use the Sharing Wizard even
if you normally disdain wizards. It’s quick, easy, and almost certain to make all of
the correct settings for network shares and NTFS permissions—a sometimes
daunting task if undertaken manually. Once you’ve configured shares with the
wizard, you can always dive in and make changes manually if you want.
To make sure the Sharing Wizard is enabled, click the Start button , type “folder”
in the Search box, and then click Folder Options. Click the View tab. In
the Advanced settings box, scroll down the list and make sure the Use Sharing
Wizard (Recommended) check box is selected.

Page 73 of 118
The process for setting up shared resources is the same as long as the
Sharing Wizard is enabled
With the Sharing Wizard at the ready, follow these steps to share files or folders:
1. In Windows Explorer, select the folders or files you want to share. (You can
select multiple objects.)
2. In the Command bar, click Share. (Alternatively, right-click, and then click
Share.)

3. With the Sharing Wizard, it’s quick and easy to share files or folders with
other people
4. In the file sharing box, enter the name of the user with whom you want to
share files or folders, and then click Add. You can type a name in the box or
click the arrow to display a list of available names. Repeat for each person
you want to add.
The list includes all of the users who have an account on your computer,
plus everyone. If you want to grant access to someone who doesn’t appear in
the list, you need to create a user account for that person (for information on
how to do this, see Create a user account).
Note:
If you select everyone, and you have password-protected sharing enabled,
the user must still have a valid account on your computer. However, if you have

Page 74 of 118
turned off password-protected sharing, network users can gain access only if you
grant permission to everyone or to Guest.

For each user, select a permission level. Your choices are:


 Reader Users with this permission level can view shared files and run shared
programs, but cannot change or delete files. Selecting . Reader in the Sharing
Wizard is equivalent to setting NTFS permissions to Read & Execute.
 Contributor This permission level, which is available only for shared folders
(not shared files), allows the user to view all files, add files, and change or
delete files that the user adds. Selecting . Contributor sets NTFS permissions
to Modify.
 Co-owner Users who are assigned the Co-owner permission have the same
privileges that you do as the Owner: They can view, change, add, and delete
files in a shared folder. Selecting . Co-owner sets NTFS permissions to Full
Control for this user.
Note:
You might see other permission levels if you return to the Sharing Wizard
after you set up sharing. The Custom permission level identifies NTFS permissions
other than Read & Execute, Modify, and Full Control. The Mixed permission level
appears if you select multiple items, and those items have different sharing
settings. Owner, of course, identifies the owner of the item.

5. Click Share. After a few moments, the wizard displays a page similar to the
page shown in the following illustration.

Page 75 of 118
The Sharing Wizard displays the network path for each item you’ve shared
6. In the final step of the wizard, you can do any of the following:
 Send an e-mail message to the people with whom you’re sharing. The
message includes a link to the shared file or folder.

With the Sharing Wizard, you can send a message that includes a link to the item
you want to share
 Copy the network path to the Clipboard. This is handy if you want to
send a link via instant messenger or another application.
 Double-click a share name to open the shared item.

Page 76 of 118
 Open a search folder that shows all of the folders or files you’re sharing.
7. When you’re finished with these tasks, click done.
Creating a share requires privilege elevation. But, after a folder has been shared,
the shared folder is available to network users no matter who is logged on to your
computer—or even when nobody is logged on.
Using advanced sharing to create shorter network paths
Confusingly, when you share one of your profile folders (or any other
subfolder of %SystemDrive%\Users), Windows Vista creates a network share for
the Users folder—not for the folder you shared. This isn’t a security problem; NTFS
permissions prevent network users from seeing any folders or files except the ones
you explicitly share. But it does lead to some long UNC paths to network shares.
For example, if you share the My Received Files subfolder of Documents (as shown
after step 5 in the previous section), the network path is \\CARL-
PC\Users\Carl\Documents\My Received Files. If this same folder had been
anywhere on your computer outside of the Users folder, no matter how deeply
nested, the network path would instead be \\CARL-PC\My Received Files. Other
people to whom you’ve granted access wouldn’t need to click through a series of
folders to find the files in the intended target folder.
Network users, of course, can map a network drive or save a shortcut to your
target folder to avoid this problem. But you can work around it from the sharing
side, too: Use advanced sharing to share the folder directly. (Do this after you’ve
used the Sharing Wizard to set up permissions.)
Note:
Make sure the share name you create doesn’t have spaces. Eliminating
spaces makes it easier to type a share path that works as a link.
Stopping or changing sharing of a file or folder
If you want to stop sharing a particular shared file or folder, select it in
Windows Explorer, and then click Share. The Sharing Wizard appears, as shown
in the following illustration.

Page 77 of 118
Use the Sharing Wizard to change sharing permissions or to stop sharing a
file or folder
If you click Change sharing permissions, the wizard continues as when you
created the share, except that all existing permissions are shown. You can add or
remove names and change permissions.
The Stop sharing option removes access control entries that are not inherited. In
addition, the network share is removed; the folder will no longer be visible in
another user’s Network folder.
Setting advanced sharing properties
If you disable the Sharing Wizard, Windows Vista reverts to a process
similar to that employed by earlier versions of Windows (except the aberration in
Windows XP called Simple File Sharing—nothing before or after is similar to that).
Without the Sharing Wizard, you configure network shares independently of NTFS
permissions. (For more information about this distinction, see How share
permissions and NTFS permissions work together at the end of this section.)
With the Sharing Wizard disabled, when you select a folder, and then click Share,
rather than the wizard appearing, Windows opens the folder’s properties dialog
box and displays the Sharing tab, as shown in the next illustration. Even with the
Sharing Wizard enabled, you can get to the same place; right-click the folder, and
then choose Properties.
Note:

Page 78 of 118
The Sharing tab is part of the properties dialog box for a folder, but not for
files. Also, when the Sharing Wizard is disabled, the Share button appears on the
Command bar only when you select a single folder. Only the Sharing Wizard is
capable of making share settings for files and for multiple objects simultaneously.

The Share button summons the Sharing Wizard, but it’s available only when
the Sharing Wizard is enabled
To create or modify a network share using advanced settings, follow these steps:
1. On the Sharing tab, click Advanced Sharing.
2. Select the Share this Folder check box.

Page 79 of 118
Use advanced settings to create or modify a network share
3. Accept or change the proposed share name.
Note:
If the folder is already shared, and you want to add another share name
(perhaps with different permissions), click Add, and then type the name for the
new share. The share name is the name that other users will see in their own
Network folders. Windows initially proposes to use the folder’s name as its share
name. That’s usually a good choice, but you’re not obligated to accept it. If you
already have a shared folder with that name, you’ll need to pick a different name.
4. Type a description of the folder’s contents in the Comments box. Other users
will see this description when they inspect the folder’s properties dialog box
in their Network folder (or when they use the Details view).
5. To limit the number of users who can connect to the shared folder
concurrently, specify a number in the Limit the number of simultaneous
users to box. Windows Vista permits up to 10 concurrent users. (If you need
to share a folder with more than 10 users at once, you must use a server
version of Windows.)
6. Click Permissions.

Page 80 of 118
The default share permission associated with a new share is Read access to
everyone.

Caution:
When you share a folder, you also make that folder’s subfolders available on
the network. If the access permissions you set for the folder aren’t appropriate for
any of its subfolders, either reconsider your choice of access permissions or
restructure your folders to avoid the problem.
7. In the Group or user names box, select the name of the user or group you
want to manage. The share permissions for the selected user or group appear
in the permissions box.
8. Select Allow, Deny, or neither for each access control entry:
 Full Control Allows users to create, read, write, rename, and delete files
in the folder and its subfolders. In addition, users can change
permissions and take ownership of files on NTFS volumes. .
 Change Allows users to read, write, rename, and delete files in the folder
and its subfolders, but not create new files. .

Page 81 of 118
 Read Allows users to read files but not write to them or delete them. If
you select neither . allow nor Deny, it is still possible that the user or
group can inherit the permission through membership in another group
that has the permission. If the user or group doesn’t belong to another
such group, the user or group is implicitly denied permission.
Note:
To remove a name from the Group or user names box, select the name, and
then click Remove. To add a name to the list, click Add. Enter the names of the
users and groups you want to add.
9. Click OK in each dialog box.

How share permissions and NTFS permissions work together


The implementation of share permissions and NTFS permissions is
confusingly similar, but it’s important to recognize that these are two separate
levels of access control. Only connections that successfully pass through both
gates are granted access.
Share permissions control network access to a particular resource. Share
permissions do not affect users who log on locally. You set share permissions in
the Advanced Sharing dialog box, which you access from the Sharing tab of a
folder’s properties dialog box.
NTFS permissions apply to folders and files on an NTFS-formatted drive.
They provide extremely granular control over an object. For each user to whom
you want to grant access, you can specify exactly what they’re allowed to do: run
programs, view folder contents, create new files, change existing files, and so on.
You set NTFS permissions on the Security tab of the properties dialog box for a
folder or file.
It’s important to recognize that the two types of permissions are combined in
the most restrictive way. If, for example, a user is granted Read permission on the
network share, it doesn’t matter whether or not the account has Full Control NTFS
permissions on the same folder; the user gets only Read access when connecting
over the network.
In effect, the two sets of permissions act in tandem as gatekeepers that
winnow out incoming network connections. An account that attempts to connect
over the network is examined first by the share permissions gatekeeper. The

Page 82 of 118
account is either bounced out on its caboodle or allowed to enter with certain
permissions. It’s then confronted by the NTFS permissions gatekeeper, which
might strip away (but not add to) some or all of the permissions granted at the first
doorway.
In determining the effective permission for a particular account, you must
also consider the effect of group membership. Permissions are cumulative; an
account that is a member of one or more groups is granted all of the permissions
that are granted explicitly to the account as well as all of the permissions that are
granted to each group of which it’s a member. The only exception to this rule is
Deny permissions, which take precedence over any conflicting Allow permissions.

Page 83 of 118
Task-Sheet CO2.2-1
Title: Network Configuration

Performance Objective: Given (Equipments & Materials), you


should be able to (configure network and share
files) following (network configuration and
sharing steps).

Materials : 1 Crossover Cable


Equipment : 2 Computer Sets

Steps/Procedure:

1. Make sure that you’re working area is ready.


2. Prepare two computers with network cable.
3. Configure HOMEGROUP.
4. Use static class C IP address.
5. Share Local Folder.
Assessment Method:

 Demonstration

 Interview

Page 84 of 118
Performance Criteria Check-list CO2.2-1
CRITERIA
YES NO
Did you….
1. Configure HOMEGROUP Properly.

2. Use static class C IP address.

3. Share Files on the Network.

Page 85 of 118
Information Sheets CO2.2-2
“Inspect & Diagnose Computer Network”

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Inspect Network Configuration
2. Diagnose Network Problems
When a user experiences a networking problem, NDF provides the ability to
diagnose and repair it by presenting the person with diagnostic assessments and
resolution steps. NDF simplifies and automates many of the common
troubleshooting steps and solution implementations for networking troubles.
Network Troubleshooting from the Network Icon in the Notification Area
You can easily launch network troubleshooting by right-clicking on the
network icon in the notification area of the Windows 7 desktop and selecting
Troubleshoot problems. Windows Network Diagnostics will launch and attempt to
detect and correct what’s wrong.
Network Troubleshooting from Control Panel
With Windows 7, you don’t have to wait for an error to occur to use the
built-in diagnostics. You can launch a troubleshooting session anytime from the
new Troubleshooting item in Control Panel. When you do, the screen shown
in Figure 1 appears. In this case, the tool has found that the computer has no
Internet connection. The page displays a boxed message that informs you of the
problem and offers a Try to connect again option.

Page 86 of 118
Figure 1 Opening the Troubleshooting item in Control Panel produces this
screen.
If you click on the Network and Internet selection, you’ll get the dialog box
shown in Figure 2. There you can choose from seven options that start sessions
for troubleshooting several types of issues: Internet-connection difficulties,
problems accessing files and folders on other computers, and network-printing
troubles.

Figure 2 Troubleshooting network and Internet problems.


Choosing any of the seven options launches a wizard that steps you through
diagnosis of the problem, and if possible, automated or manual correction. The
troubleshooter also records an Event Tracing Log (ETL). If the problem can’t be
resolved, you can examine and even forward the log. Just click on View History
from the Troubleshooting dialog. Figure 3 shows an example ETL.

Page 87 of 118
Figure 3 an example of troubleshooting history.
Each item in the history list represents a separate troubleshooting session.
Double-clicking on a session displays the results for it.

Page 88 of 118
Figure 4 Example of a troubleshooting report.
To view the details of the detection, click the Detection details link, and
you’ll see a window like the one in Figure 5.

Page 89 of 118
Figure 5 A typical Detection-details screen from a troubleshooting report.
Near the top of the dialog, you’ll see the name of the ETL file that contains
the information from the troubleshooting session. If you want to send a copy to
support staff or Microsoft for analysis, you can save the file by clicking on its
name, which will bring up the File Download dialog.
You can view and analyze ETL files with Network Monitor 3.3. You can also view
the files with Event Viewer and the Tracerpt.exe tool as well as by converting them
to XML or text files with the netsh trace convert command. You can save the
details of the troubleshooting session in a CAB file by right-clicking the session in
the Troubleshooting History window and then selecting Save As. Just as with ETL
files, you can send the CAB file to support staff for analysis.
Network Tracing with Netsh.exe
Windows 7 includes a new Netsh.exe context, netsh trace, for network
tracing. Commands in the netsh trace context allow you to selectively enable
tracing for providers and scenarios. A provider represents an individual
component in the network protocol stack, such as Winsock, TCP/IP, wireless LAN
services, or NDIS. A tracing scenario is a predefined collection of providers for a

Page 90 of 118
specific function, such as file sharing or wireless LAN access. To exclude irrelevant
details and reduce the size of the ETL file you can apply filters.
Typically, to perform detailed troubleshooting of networking issues, you have to
supply your helpdesk staff or Microsoft’s Customer Service and Support
organization with both internal component tracing information and a capture of
the network traffic at the time of the problem. Prior to Windows 7, you had to
carry out two different procedures to obtain this information: Use Netsh.exe
commands to enable and disable tracing and a packet-sniffer program, such as
Network Monitor to capture the network traffic. And then you faced the difficult
task of tying together the information from these two sources to determine when
network traffic was sent relative to the events in the tracing logs.
In Windows 7, when you perform network tracing with commands in the netsh
trace context, ETL files can contain both network traffic and component tracing in
sequence. And you can display the ETL files with Network Monitor 3.3, which
provides much more efficient way to analyze and troubleshoot network
problems. Figure 6 shows an example of an ETL file being viewed in Network
Monitor 3.3.

Figure 6 Using Network Monitor 3.3 to view the network traffic recorded in an ETL
file.
With this new capability, capturing network traffic requires neither end
users nor helpdesk staff to install and use Network Monitor on the computer
having the problem. Note that by default the ETL files generated for

Page 91 of 118
troubleshooting sessions from Control Panel | Troubleshooting do not contain
network traffic information.
To capture both tracing and network traffic information sequentially for
multiple components in the network stack (such as Winsock, DNS, TCP, NDIS,
WFP and so forth), Windows uses an activity-ID-based correlation known as
grouping to collect and record the tracing and traffic information in the ETL file.
Grouping within the ETL file allows you to examine the entire transaction as a
single, correlated sequence of events.
For more information about the Netsh.exe commands for a tracing session, see the
“Starting and Stopping a Netsh.exe Trace” sidebar.
When you enable tracing with Netsh.exe, Windows 7 can create two files. An
ETL file contains trace events for Windows components, and if specified, network
traffic. By default, the ETL file is named Nettrace.etl and stored in the
%TEMP%\NetTraces folder. You can specify a different name and storage location
with the trace file= parameter. An optional CAB file can contain several types of
files including text, Windows Registry, XML and others that store additional
troubleshooting information. The CAB file also includes a copy of the ETL file. By
default, the CAB file is named Nettrace.cab and stored in the %TEMP%\NetTraces
folder.
You can also use Netsh.exe tracing in conjunction with Control Panel |
Troubleshooting. First, use the appropriate Netsh.exe command to enable tracing
for the scenario. For example, use the netsh trace scenario=internetclient
report=yes command. Use Control Panel | Troubleshooting to run the Connect to
the Internet troubleshooting session. When complete, run the netsh trace stop
command. Now, when you view the history of the troubleshooting session, you’ll
be able to access the CAB file.
Sidebar: Starting and Stopping a Netsh.exe Trace
To start a network trace with Netsh.exe, first run an elevated command
prompt. To display the list of trace providers, type netsh trace show providers. To
produce the list of trace scenarios, type netsh trace show scenarios. To show the
list of trace providers within a scenario, type netsh trace show scenario Name.
You can start a trace for one or multiple providers or scenarios. For example, to do
so for the Internet Client scenario, type netsh trace start scenario=internetclient.

Page 92 of 118
To start tracing for more than one scenario, you can specify all of the appropriate
scenarios, such as netsh trace start scenario=File Sharing scenario=Direct Access.
You can create a CAB file with a formatted report by including the report=yes
parameter. Use trace file=parameter to specify a name and location for the ETL
and CAB files. If you want to record network traffic in the ETL file, include the
capture=yes parameter.
For example, here’s the command that will start a trace for the WLAN
scenario, create a CAB file with a formatted report, capture network traffic, and
store the files with the name WLAN Test in the C:\Tshoot folder: netsh trace start
scenario=WLAN capture=yes report=yes trace file=c:\tshoot\WLANtest.etl.
To stop tracing, use the netsh trace stop command.
For more information, see Netsh Commands for Network Trace in Windows Server
2008 R2.
Sidebar: Using Network Monitor 3.3 to View ETL Files
Before Network Monitor 3.3 can fully display the ETL files generated by
Windows 7, you must configure full Windows parsers. By default, Network Monitor
3.3 uses stub Windows parsers. To configure full Windows parsers, click Tools |
Options | Parsers. In the list of parsers, click Windows | Stubs to disable stub
parsers and enable full parsers, then click OK.

Page 93 of 118
Job-Sheet CO2.2-2
Title: Diagnose computer network

Performance Objective: Given (Equipments & Materials), you


should be able to (Diagnose computer network)
following (Network Diagnostic procedures).

Materials : 1 Crossover Cable


Equipment : 2 Computer Sets

Steps/Procedure:

1. Make sure that you’re working area is ready.


2. Prepare two computers with network cable.
3. Inspect & diagnose network.
4. Make diagnostic report.
5. Prepare repair solutions report.
Assessment Method:

 Demonstration

 Interview

Page 94 of 118
Performance Criteria Check-list CO2.2-2
CRITERIA YES NO
Did you….
1. Make sure that working area is ready.

2. Prepare two computers with network cable.

3. Inspect & diagnose network.

4. Make diagnostic report.

5. Prepare repair solutions report.

Page 95 of 118
Information Sheets CO2.3-1
“Client Device Configuration”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure Client Device

Your wireless router has a variety of useful options you can configure. These
are practically hidden you wouldn’t know these features exist unless you were
digging through your router’s configuration pages.
Bear in mind that different routers have different options. You may not have
all the options listed here on your own router. The options will also be in different
places with different names.

Page 96 of 118
Click the Details button to view more information about the connection.

Look for the IPv4 Default Gateway IP address in the details window. Plug
this IP address into your web browser’s address bar.

Page 97 of 118
You’ll need to log in with your username and password combination. If you don’t
know these, your router is probably using its default combination — check your
router’s manual or perform a web search for its model number and “default
password.” If you’ve previously changed the password and can’t remember it, you
can reset your router’s password to the default.
Once you’ve logged in, you can now browser your router’s configuration
pages and configure its settings.

Page 98 of 118
 The most typical username is “admin”.

 The most typical passwords are “admin” and “password”.

 Many routers will only require a username and a blank password, and some
allow you to leave all fields blank.

 If you can’t figure out the correct IP address, your username or password,
search for your router model online to see what the default login is. If it has
been changed, press the Reset button on the back of the router for 10 (to
30+ seconds as dictated in the instructions for the router model) to restore
factory defaults and try again.

Open the Wireless Settings. When you log in to your router, you will be
taken to the router’s main menu or status screen. There will be several options to
choose from. The Internet section can usually be left at default settings, unless

Page 99 of 118
you received specific instructions from your internet service provider. The Wireless
section will allow you to set up your wireless network.

Sample

Enter a name for your wireless network.


In the Wireless section, you should see a field labeled SSID or Name. Enter a
unique name for your wireless network. This is what other devices will see when
scanning for networks.
Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the signal.
*See the Tips
section below for
additional
information
on the SSID
setting.

Page 100 of 118


Choose a security method. Choose from the list of available security
options. For the best security, choose WPA2-PSK as the encryption method. This
is the most difficult security to crack, and will give you the most protection from
hackers and intruders.

Sample

Sample

Create a passphrase. Once you’ve chosen your security method, enter in a


passphrase for the network. This should be a difficult password, with a
combination of letters, numbers, and symbols. Don’t use any passwords that
could be easily deduced from your network name or from knowing you.

Page 101 of 118


Sample

Save your settings. Once you are finished naming and securing your
wireless network, click the Apply or Save button. The changes will be applied to
your router, which may take a few moments. Once the router has finished
resetting, your wireless network will be enabled.

Page 102 of 118


Task-Sheet CO2.3-1
Title: Configure Client Device

Performance Objective: Given (Equipments & Materials), you


should be able to (Configure Client Device)
following (configuring procedures).

Equipment : 1 Computer Sets/Laptop


1 Wireless Router
Steps/Procedure:

1. Make sure that you’re working area is ready.


2. Prepare computer/laptop and other equipments.
3. Configure wireless router.
4. Change SSID.
5. Change wireless router password.
Assessment Method:

 Demonstration

 Interview

Page 103 of 118


Performance Criteria Check-list CO2.3-1
CRITERIA
YES NO
Did you….
1. Make sure that you’re working area is ready.

2. Prepare computer/laptop and other equipments.

3. Configure wireless router.

4. Change SSID.

5. Change wireless router password.

Page 104 of 118


Information Sheets CO2.3-2
“LAN & WAN Network Configurations”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure LAN Network
2. Configure WAN Network
What is an IP Address?

An Internet Protocol address (IP address) in layman’s terms is basically the


address given to your computer when it’s connected to a network. Technically
speaking, an IP address is a 32-bit number that signifies the address of both the
sender and receiver of packets on a network.
Let’s take an example: suppose you want to send an email to your friend.
Though your email may be broken down into millions of data packets before it’s
transmitted, right now for simplicity’s sake consider it a single information packet.
The IP addresses are embedded on each packet that is transmitted over the
network and are used to identify the machine.

Class Address Range Supports


Class A 1.0.0.1 to 126.255.255.254 Large networks with many devices

Page 105 of 118


Class B 128.1.0.1 to Medium-sized networks.
191.255.255.254
Class C 192.0.1.1 to small networks (fewer than 256 devices)
223.255.254.254
Class D 224.0.0.0 to Reserved for multicast groups.
239.255.255.255
Class E 240.0.0.0 to Reserved for future use, or Research and
254.255.255.254 Development Purposes.

Note: It’s totally possible for your computer to have two IP addresses at the
same time. One may be for the Internet and another one for the local area
network.
These IP addresses are further divided into two main types: Static and
Dynamic IP address. Let’s have a good look at both for better understanding.

Static IP Address
As the name speaks, the static IP addresses are those types of IP address
that never change once they are assigned to a device on a network. No doubt this
type of addressing is cost effective but could have a high security risk. Static IP
addresses are mostly used by web, email and gaming servers who don’t care much
about hiding their locations.
Dynamic IP Address
On the other hand, a Dynamic IP address changes each time the device logs
in to a network. This kind of IP address is very tough to trace and are thus used
by companies and business firms.
You must be thinking as to who or what allocates this Dynamic IP address
every time the device logs in. Well, these IP address are assigned using DHCP
(Dynamic Host Configuration Protocol). Talking about DHCP in detail is beyond
the scope of this article and we will take it up in a future post.
Which is better, Static or Dynamic?
You are probably wondering which type of IP addressing is better, Static or
Dynamic? Static IP addresses, as I already mentioned above, are used in places
Page 106 of 118
where security is not a big concern like web servers, FTP and dedicate VOIP
services. Dynamic IP addressing, on the other hand are used when you browse
through the Internet, receive mails, download files, etc.

What is Local Area Connection?

LAN (Local Area Network) card will automatically install when you setup
windows 7. LAN connection is required when you want to share your pc with
others in your Home Group. Supposes you have two Laptop/Pc and you want to
connect them for some purpose say playing multiplayer games (Cod 1, Cod 2,
Cod4, Cod5 etc) or to access another Pc, just setup Local Area Connection. You
can also connect your Pc to your friends Pc no meter how far the distance, connect
them with cable connection.

Procedure of setup Local Area Connection:


 Crete Workgroup:
1. Go to my computer properties.
2. Click change settings.

3. See

Page 107 of 118


4. Type your Computer name and WORKGROUP

5. This message will appear

Restart your computer then your WorkGroup will be created.

Give your IP Address:


1. Go to control panel
2. Click Network And Internet
3. Click Network And Sharing Center
4. Click HomeGroup
5. Click Advance Sharing Setting
6. There are two types: Home to work, Public
7. From Home to work select >Turn on Network Discovery >Turn on file and
printer sharing >Turn on public folder sharing..... >Enable file sharing for
device........ >Allow windows to manage.....
Page 108 of 118
8. From Public select >Turn on Network Discovery >Turn on file and printer
sharing >Turn on public folder sharing..... >Enable file sharing for
device........ >Turn off password protected sharing.
9. Click change Adapter Setting (Top left side of the window)
10. You will find this

11. Plug your cable and then find this

12. Now setup your IP. Right click on Local Area Connection go to properties.
13. Double click Internet protocol version 4 (TCP/IPv4) Or click properties
14. Click Use the following IP address
15. IP address: Give your IP address
16. Subnet mask: Just press tab it will automatically generate (Default-
255.255.255.0)
17. Click use the following
DNS server address.
18. Click ok.

TCP/IP and
WAN
TCP/IP is in most
companies now the standard
protocol, especially when
multiple locations (Offices
and/or factories) are
connected via a Wide-Area-
Network (WAN).

In the headquarter, there will


be most probably some
servers, which need to be

Page 109 of 118


accessed from Remote offices and/ or factories (like a mail-server and/or a
company internal web server ) and/or a
main-frame or mini-computer, running a common accounting system or an
Enterprise Resource Planning System ( ERP ), which usually are accessed from the
client-computers via TCP/IP.

The head quarter could be connected via fixed lines (provided by


WAN providers) to the remote offices and/
or factories. Once the routers are setup properly by the WAN provider, you as a
user will not need to worry about the WAN; you have access to the servers and
main-frame, as long as in all locations the systems are properly configured for the
router/Gateway.

In this example, you would need to define in the remote location the
Gateway (= Router) address, either manually or using DHCP when IP-addresses
are obtained automatically (for example from a DHCP-service on an NT4-server)
Just verify the values using ipconfig on windows 7.

Page 110 of 118


Test the connection from the remote location to the headquarter by making
the PING test to the systems located in the headquarter.

For File-Access to an NT-server in the head quarter via the WAN, you
will either to setup a WINS server or use LMHOSTS.

It is getting more complicated, when you have a second router/gateway


installed, for example for permanent Internet access.

But there is also


a special item to
watch out for in the
remote location
when connecting
via a modem and
a dial-up connection
to the Internet

Page 111 of 118


Once you connect to the Internet, you will lose the connection via the WAN
to all the systems in the Headquarter, you will not be able to PING them.
What Happened?

Use in the START-menu the RUN-command to start "ipconfig" and check


your IP-values of the dial-up connection (via the modem) to the Internet, which is
the "PPP Adapter": Usually, you get an additional Gateway address assigned to you
for the Internet connection. All network traffic, also for the internal
communications, will now be send to the Internet gateway!
While you are connected, you have now a configuration with multiple
routers/gateways, and you will have to give Windows a "helping hand" to tell it,
which router/gateway to be used for

Internet network traffic and which one for company internal network traffic:
you need to use the "ROUTE" command to inform Windows, which gateway to use
to access the systems in the headquarter (more details on ROUTE in the next
section below):

Page 112 of 118


Your system knows now to use the gateway address at 192.168.1.1 for
internal communication with the Headquarter, while all other communications will
use the gateway defined by the Internet connection.
A WAN setup with multiple Routers/gateways in a location:

Page 113 of 118


With 2 gateways, you have 2 possibilities:

1) Define one of them as the Default gateway (usually the Internet Gateway) and
program this gateway to pass any network traffic for the headquarter on to the
WAN router/gateway. But very often, you as a user or even network administrator
do not have access to the internal routing tables of your router, requiring you to
use the 2nd possibility.

2) Define the gateway with the widest range of IP-addresses (usually the Internet
Gateway) as your Default gateway and then program your own system to send all
other network traffic (for internal communication) to the WAN router by using the
"ROUTE" -command:

The Help-information, as displayed on a WindowsNT4 or Windows2000 system in


a Command-prompt window:

Page 114 of 118


We need to use the "ROUTE ADD" command to program the system to send
all network traffic for the address range 192.168.2.0 (applying the subnet-mask of
255.255.255.0) to the gateway/ router at 192.168.1.1

Page 115 of 118


Task-Sheet CO2.3-2

Title: LAN & WAN Configuration

Performance Objective: Given (Equipments & Materials), you


should be able to (Configure LAN & WAN)
following (Network configuration procedures).

Equipment : 4 Computer Sets

Steps/Procedure:

1. Make sure that you’re working area is ready.


2. Prepare three computers with network cable.
3. Configure two Local Area Network
4. Set Static IP Address using Class C IP.
5. Test Network if working.
6. Configure WAN Network.
7. Change the IP Address of 2 computers to Class B IP.
8. Connect the 2 Local Area Network to form WAN.
9. Test the Network if it is successful.
Assessment Method:

 Demonstration

 Interview

Page 116 of 118


Performance Criteria Check-list CO2.3-2
CRITERIA YES NO
Did you….
1. Make sure that you’re working area is ready.

2. Prepare three computers with network cable.

3. Configure two Local Area Network

4. Set Static IP Address using Class C IP.

5. Test Network if working.

6. Configure WAN Network.

7. Change the IP Address of 2 computers to Class B IP.

8. Connect the 2 Local Area Network to form WAN.

9. Test the Network if it is successful.

Page 117 of 118


Information Sheets CO2.3-3
“Wireless Network Configurations”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure Wireless LAN
2. Connect Client to a Wireless Network
A wireless network is any type of computer network that uses wireless data
connections for connecting network nodes.
Wireless networking is a method by which
homes, telecommunications networks and enterprise
(business) installations avoid the costly process of introducing
cables into a building, or as a connection between various
equipment locations. Wireless telecommunications networks
are generally implemented and administered using radio
communication. This implementation takes place at the
physical level (layer) of the OSI model network structure.
Examples of wireless networks include cell phone networks, Wi-Fi local
networks and terrestrial microwave networks.

Wireless Devices
- Wireless Router
- Wireless Accesspoint
- Wireless Network Adapter

Page 118 of 118

You might also like