Professional Documents
Culture Documents
PTS Sample-Output
PTS Sample-Output
PTS Sample-Output
NTTA-TM1-01
Trainers July 2010 Issued by:
Methodology Level I Date Revised:
February 2012 Page 1 of 250
Developed by: NTTA
Templates Abobo, Edwin R.
Jr. Revision # 01
Name: Loida O. Gagam Course: CSS - NC II
Note: In making the Self-Check for your Qualification, all required competencies
should be specified. It is therefore required of a Trainer to be well- versed
of the CBC or TR of the program qualification he is teaching.
From the accomplished Self-Assessment Check (Form 1.1) and the evidences of
current competencies (Form 1.2), the Trainer will be able to identify what the training needs
of the prospective trainee are.
Form 1.3 Summary of Current Competencies Versus Required Competencies
Required Units of
Training
Competency/Learning Current Competencies
Gaps/Requirements
Outcomes based on CBC
BASIC COMPETENCIES
1. Participate in workplace Participate in workplace
communication communication
2. Work in team environment Work in team environment
3. Practice career Practice career professionalism
professionalism
4. Practice occupational Practice occupational health and
health and safety safety procedures
procedures
Required Units of
Training
Competency/Learning Current Competencies
Gaps/Requirements
Outcomes based on CBC
COMMON COMPETENCIES
1. Apply quality standards Apply quality standards
2. Perform computer Perform computer operations
operations
3. Perform mensuration and Perform mensuration and
calculation calculation
4. Prepare and interpret Prepare and interpret technical
technical drawing drawing
5. Use hand tools Use hand tools
6. Terminate and connect Terminate and connect electrical
electrical wiring and wiring and electronics circuit
electronics circuit
7. Test electronic components Test electronic components
Required Units of
Training
Competency/Learning Current Competencies
Gaps/Requirements
Outcomes based on CBC
CORE COMPETENCIES
Prepared by:
ABOBO, EDWIN JR. R.
Trainer/Instructor
A. INTRODUCTION: This unit covers the outcomes required in setting-up computers networks for LANs and SOHO systems. It consists of
competencies to install network cables, set network configuration, set router/Wi-Fi/ wireless access point/repeater configuration as well as to
inspect and test the configured computer networks.
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 12 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
B. LEARNING ACTIVITIES
Checking the area if the learning environment is conducive to the trainees/students
Prepare the instructional materials that will be used in teaching and learning process
Opening prayer and checking of attendance
Motivates and state the learning objectives
Stimulate recall prior knowledge
Read information sheet/present a PowerPoint about Setting Network Configuration
Show appropriate materials used in Setting Network Configuration
Demonstrate the standard procedures in Setting Network Configuration
Let the trainees voluntarily practice the standard procedures in Setting Network Configuration
Provide feedback regarding with the performance of the trainees
Let the trainees answer the Self-check/Written test and assess the trainees performance once the Task/Job is mastered
Record all the results/learning activities
Assign homework for additional guided practice
LO 1: INSTALL NETWORK CABLES
Learning Content Methods Presentation Practice Feedback Resources Time
Computer networking Modular self-paced Read Answer Checking CBLM 1
concepts information self-check the answers Projector hour
sheet 1.1-1 1.1-1 with Laptop
Answer’s PPT
key 1.1-1 Module
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 13 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
Demonstration PowerPoint Do. Task Do. Crimping tool
with return demo presentation sheet1.2-1 performanc LAN Tester
2:20
about network and job e checklist RJ45
cable sheet 1.2-1 1.2-1 Diagonal Hours
installation cutting plier
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 14 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
Principles of 5S and Modular self-paced Read Answer Checking CBLM 1
3Rs information self-check the answers projector hour
sheet 1.5-1 1.5-1 with Laptop
Answer’s PPT
key 1.5-1 module
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 16 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
with return demo presentation sheet and performanc Wi-Fi 1:30
about network job sheet e checklist WAP mins
interface card 3.2-1 3.2-1 Repeater
(NIC) settings Switch
Computer
Terminated
cables
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 17 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
with return demo presentation sheet and performanc Switch 1:30
about local area job sheet e checklist Computer hour
network (LAN) 3.4-1 3.4-1 Terminated
port cables
configuration
Wide area network Modular self-paced Read Read Checking CBLM 30
(WAN) port configuration information information the answers projector mins
sheet 3.5-1 sheet 3.5-1 with Laptop
Answer’s PPT
key 3.5-1 module
Router
Do.
Demonstration PowerPoint Do. Task Wi-Fi
performanc
with return demo presentation sheet and WAP 1:30
e checklist
about wide area job sheet Repeater hour
3.5-1
network (WAN) 3.5-1 Switch
port Computer
configuration Terminated
cables
Wireless settings Modular self-paced Read Read Checking CBLM 30
configuration information information the answers projector mins
sheet 3.6-1 sheet 3.6-1 with Laptop
Answer’s PPT
key 3.6-1 module
Router
Do.
Demonstration PowerPoint Do. Task Wi-Fi
performanc
with return demo presentation sheet and WAP 1:30
e checklist
about wireless job sheet Repeater hours
3.6-1
settings 3.6-1 Switch
configuration Computer
Terminated
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 18 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
cables
Security/Firewall/Advance Modular self-paced Read Read Checking CBLM 30
settings and configuration information information the answers projector mins
sheet 3.7-1 sheet 3.7-1 with Laptop
Answer’s PPT
key 3.7-1 module
Router
Do.
Demonstration PowerPoint Do. Task Wi-Fi
performanc
with return demo presentation sheet and WAP 1:30
e checklist
about security/ job sheet Repeater hours
3.7-1
firewall/ 3.7-1 Switch
advance settings Computer
and Terminated
configuration cables
Cloud computing Modular self-paced Read Read Checking CBLM 30
information information the answers projector mins
sheet 3.8-1 sheet 3.8-1 with Laptop
Answer’s PPT
key 3.8-1 module
Router
Do. 1:30
Demonstration PowerPoint Do. Task Wi-Fi
performanc hours
with return demo presentation sheet and WAP
e checklist
about cloud job sheet Repeater
3.8-1
computing 3.8-1 Switch
Computer
Terminated
cables
LO 4: INSPECT AND TEST THE CONFIGURED COMPUTER NETWORKS
Network connectivity Modular self-paced Read Read Checking CBLM 1
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 19 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
testing information information the answers projector hour
sheet 4.1-1 sheet 4.1-1 with Laptop
Answer’s PPT
key 4.1-1 module
Router
Do.
Demonstration PowerPoint Do. Task Wi-Fi
performanc 2
with return demo presentation sheet and WAP
e checklist
about network job sheet Repeater Hour
4.1-1
connectivity 4.1-1 Switch
testing Computer
Terminated
cables
Documentation procedures Modular self-paced Read Read Checking CBLM
information information the answers projector
sheet 2.4-2 sheet 2.4-2 with Laptop 1
Answer’s PPT hour
key. module
C. ASSESSMENT PLAN
Practical exam/demonstration
Observation in workplace
D. TEACHER’S SELF-REFLECTION OF THE SESSION
The use of audio visuals aids in the workshop and training resources reinforces and aids in the understanding of the lesson likewise
performing those activities will give opportunity for them to be prepared on the job setting.
Date Developed:
Trainers Methodology Level I July 2017 Issued by:
Page 21 of 250
Templates Developed by:
Abobo, Edwin Jr. R.
Date Developed:
July 2017 Issued by:
Computer System Page 22 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
How to Use this Module
Welcome to the unit of competency SET-UP COMPUTER NETWORKS is one of the core
competencies of COMPUTER SYSTEM SERVICING NC II, a course which comprises
the knowledge skills and attitude that a trainee is required to possess.
The module SET-UP COMPUTER NETWORKS contains training materials and activities
related to.
In this module, you are required to go through a series of learning activities in order to
complete each learning outcome. In each learning are Information Sheet, self – Checks,
Task Sheet and Job Sheets. Follow and perform the activities on your own. If you have
questions, do not hesitate to ask assistance from your facilitator.
Remember to:
Read Information Sheets and complete the self – checks. Suggested references are
included to supplement the material provided in this module.
Perform the task sheets until you are confident that your output conforms to the performance
criteria checklist that follows the sheets.
Submit outputs of the Task Sheets and Job Sheets to your facilitator for evaluation and
recording in the Accomplishment Chart. Outputs shall serve as your portfolio during the
institutional competency evaluation. When you feel confident that you have had sufficient
practice, ask your trainer to evaluate you. The results of your assessment will be recorded in
your Progress Chart and your Accomplishment Chart.
You must pass the Institutional Competency Evaluation for this competency. A Certificate
of Achievement will be awarded to you after passing the evaluation.
You need to complete this module before you can perform the module on Set-up Computer
Servers.
Date Developed:
July 2017 Issued by:
Computer System Page 23 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
COMPUTER SYSTEM SERVICING NC II
List of Competencies
Date Developed:
July 2017 Issued by:
Computer System Page 24 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
MODULE CONTENT
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1. Install Network Cables
2. Set Network Configuration
3. Set Router/Wi-Fi/ Wireless Access Point/Repeater Configuration
4. Inspect and Test The Configured Computer Networks
ASSESSMENT CRITERIA:
Install Network Cables
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and obtained
in accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work
are obtained in accordance with established procedures and checked for
correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries Alliance/
Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with established
procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
Date Developed:
July 2017 Issued by:
Computer System Page 25 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
8. 5S and 3Rs are followed according to environmental policies
Set Network Configuration
1. Network connectivity of each terminal is checked in accordance with network
design.
2. Any fault or problem in the network system is diagnosed and remedied in line
with the standard operating procedures.
3. Network interface card (NIC) settings are configured in accordance with
network design.
4. Communication checking between terminals are carried out in accordance
with OS network configuration guides
5. Unplanned events or conditions are responded to in accordance with
established procedures
Set router/Wi-Fi/ wireless access point/repeater configuration
1. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
2. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
3. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
4. Wireless settings are configured in accordance manufacturers’ instructions,
network design and end-user preferences
5. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end-user preferences
Inspect and Test The Configured Computer Networks
1. Final inspections are undertaken to ensure that the configuration done on the
computer networks conforms with the manufacturer’s instruction/manual
2. Computer networks are checked to ensure safe operation.
3. Reports are prepared/completed according to company requirements.
Date Developed:
July 2017 Issued by:
Computer System Page 26 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
Learning Outcome No. 2
1. Network design
2. Network configuration
3. Network connectivity testing
Assessment Criteria
Assessment Method:
1. Written exam
2. Practical exam/demonstration
Date Developed:
July 2017 Issued by:
Computer System Page 27 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
Learning Outcome 2
Date Developed:
July 2017 Issued by:
Computer System Page 28 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
INFORMATION SHEET 2.1-1
Network Design
LEARNING OBJECTIVES
After reading this information sheet, you must be able to:
IP address configuration IPV4
Subnet Configuration.
Procedures in configuring network interface card (NIC) for network
communication.
IP Address Configuration
What is IP Address?
An Internet Protocol address (IP address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication.
192.168.1.1
1st octet 2nd octet 3rd octet 4th octet
The figure above is an example of IPv4 Address it composed of 32 bits, which can be
represented by numbers starting from 0-255 (8bits per octet).
Date Developed:
July 2017 Issued by:
Computer System Page 29 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
As shown in the table 2.1-1, if the 1st octet of an IPv4 Address starts from 1-126 it is
belongs to Class A IP Address, from 128-191 belongs to Class B IP Address, from 192-223
belongs to Class C IP Address. The Class D is reserved for multicasting range 224-239 and
Class C is for Experimental; used for research range 240-254. Class D and E is not
recommended to be used in configuring a network design.
An addresses that are no used and non-routable on the internet. Used in private
networks (LAN’s).
IP address has two parts the Network Id and the Host Id. The Network Id refers to a
part of a TCP/IP address that is used to identify the subnet that a host may be on. And
the Host Address or the Host ID portion of an IP address is the portion of the address used to
identify hosts (any device requiring a network interface controller, such as a personal
computer or networked printer) on the network.
The 1st octet of a class A IP address is the Network ID and 2 nd 3rd and 4th are the Host
ID. In the class A IP address, the 1 st and 2nd octets are the Network ID and 3 rd and 4th octets
are the Host ID. The 4th octet of class C IP address is the Host ID and the 1st 2nd and 3rd octets
are the Network ID.
Date Developed:
July 2017 Issued by:
Computer System Page 30 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
52.27.2.5
Network ID Host ID
In class A IP address, the 1st octet is the network ID and the 2nd 3rd and 4th octets are
the host ID.
129.63.2168.55
Network ID Host ID
In class B IP address, the 1st and 2nd octets are the network ID and the 3rd and 4th octets
are the host ID.
In class C IP address, the 1st 2nd and 3rd octets are the network ID and the 4th octet is
the host ID.
Date Developed:
July 2017 Issued by:
Computer System Page 31 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
Subnet Mask represents what group or subnet does the IP belong, as shown in table
2.21-4 each class of IP has a default subnet mask. For Class A the default subnet mask is
255.0.0.0, for Class B 255.255.0.0 and for Class C the default subnet mask is 255.255.255.0.
To configure your NIC open your Control Panel, click on View Network Status and
Task/Network Sharing Center, click on Change Adapter Settings, open the properties of
Ethernet, then select the IPv4 and click properties. Now you can configure you IP address,
figure 2.1-5 shows the dynamic configuration just select the “obtain an IP address
automatically” then press ok. On figure 2.1-6 is the static configuration “select the use the
following IP address” then enter the IP address you want to use on the network then press ok.
Date Developed:
July 2017 Issued by:
Computer System Page 32 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
To checked your IP address if it changed after you configure open your Command
Prompt by running “CMD” then type the command “IPCONFIG” a utility that displays the
information about current TCP/IP configuration of a specific host/computer then press enter.
Date Developed:
July 2017 Issued by:
Computer System Page 33 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
SELF-CHECK 2.1-1
Test I: Identification
Directions: Identify the described word(s) in each item. Write your answer on the space
provided.
__________________1. The 1st octet is the network ID and the 2nd 3rd and 4th octets are
the host ID.
____________________2. An addresses that are no used and non-routable on the internet.
Used in private networks (LAN’s).
____________________3. The fourth revision of the IP and a widely used protocol in data
communication over different kinds of networks.
____________________4. Refers to a part of a TCP/IP address that is used to identify the
subnet that a host may be on.
____________________5. A numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for communication.
Test II:
Directions: Identify what class of the IP Address and what is the default Subnet Mask. Write
your answer on the space provided.
Class:__________________1. 192.168.1.1
Subnet Mask:____________
Class:__________________2. 54.67.33.55
Subnet Mask:____________
Class:__________________3. 167.44.33.5
Subnet Mask:____________
Class:__________________4. 4.168.1.1
Subnet Mask:____________
Class:__________________5. 129.67.44.76
Subnet Mask:____________
Date Developed:
July 2017 Issued by:
Computer System Page 34 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
ANSWER KEY 2.1-1
Test I
1. Class A IP Address
2. Private IP Address
3. IPV4
4. Network ID
5. IP Address (Internet Protocol Address)
Test II
1. Class C 255.255.255.0
2. Class A 255.0.0.0
3. Class B 255.255.0.0
4. Class A 255.0.0.0
5. Class B 255.255.0.0
Date Developed:
July 2017 Issued by:
Computer System Page 35 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
Title: Configuring Network Interface Card (NIC)
Time: 15 minutes
Equipment: Computer/Laptop
Steps/Procedure:
1. Check the power source of the computer/laptop and turn it on.
2. Open your Control Panel.
3. Click on View Network Status and Task/ Network Sharing Center.
4. Click on Change Adapter Settings, or you can open it by running or searching
the command “ncpa.cpl”.
5. Open the properties of Ethernet,
6. Select the IPv4 and click properties Select the Internet Protocol Version 4
(TCP/IPV4) and click properties.
7. Click “Use the following IP address.
8. Configure IP address and subnet mask.
Date Developed:
July 2017 Issued by:
Computer System Page 36 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
PERFORMANCE CRITERIA CHECKLIST 2.2-1
CRITERIA
YES NO
Did you….
1. Observe (ppe) personal protectively equipment and practice
occupational health and safety procedures?
7. Select the IPv4 and click properties Select the Internet Protocol
Version 4 (TCP/IPV4) and click properties.
Date Developed:
July 2017 Issued by:
Computer System Page 37 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
INFORMATION SHEET 2.2-1
Network Configuration
LEARNING OBJECTIVES
After reading this information sheet, you must be able to:
Peer-to-peer cross-over connection.
Peer-to-peer connection using switch.
In networking a peer to peer using cross over cable you just have to directly connect it
to the network interface card of the 2 computers or laptops as shown in the figure below.
After you install the cable, configure now the network interface card (NIC) on each
computer, the IP address must be the same network IP. Example on the figure below, The IP
address is on Class C, so the 1 st, 2nd, 3rd, octets are the same so that they have the same
network, but the 4th octet must be unique because it is the host ID. If you make it the same
value then you will encounter a conflict or error on your network. Configure also the subnet
mask.
Date Developed:
July 2017 Issued by:
Computer System Page 38 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
Peer to Peer Network Using Switch
In networking a peer to peer using switch you have to use 2 straight through cable for
2 computers and connect its end point to the computer and to the switch as shown in the
figure below.
After you install the utp cables and switch, configure the network interface card (NIC)
of the 2 computers, the IP address of the both computer must be the same network. Example
on the figure below, the IP address of both computer are on Class B, the 1 st and 2nd octet are
the same value, and the 3rd and 4th octet is unique to each other, then configure also the subnet
mask of the computers.
Date Developed:
July 2017 Issued by:
Computer System Page 39 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
SELF-CHECK 2.2-1
Test I:
Direction:
1-5. Design a peer to peer network using cross over cable with Class A IP address. (5points).
6.10. Design a peer to peer network using switch with 5 computers with Class B IP address.
(5points)
SELF-CHECK 2.2-1
Date Developed:
July 2017 Issued by:
Computer System Page 40 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
Test I:
1.5. The cross over cable are directly connected to the NIC of 2 computer. The 1st octet of 2
IP address of computer must be the same, and the 2nd 3rd & 4th octet must be unique.
6-10. All the straight through cable must be connected to the switch. The 1 st and 2nd octet of 5
computers must be the same, and the 3rd & 4th must be unique to each other.
Date Developed:
July 2017 Issued by:
Computer System Page 41 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
TASK SHEET 2.2-1
Performance Objective: Given the materials needed, you should able to configure peer
to peer network using cross over cable, following the
standard procedure.
Time: 1 hour
Equipment: 2 computers/laptops
Steps/Procedure:
1. Check the power source of the 2 computers/laptops and turn it on.
2. Get the terminated cross over cable and connect it directly to the NIC of the 2
computers/laptops.
3. Open your Control Panel.
4. Click on View Network Status and Task/ Network Sharing Center.
5. Click on Change Adapter Settings, or you can open it by running or searching
the command “ncpa.cpl”.
6. Open the properties of Ethernet,
7. Select the IPv4 and click properties Select the Internet Protocol Version 4
(TCP/IPV4) and click properties.
8. Click “Use the following IP address.
9. Configure the IP address and subnet mask.
10. Do step 3-9 on the other computer.
Date Developed:
July 2017 Issued by:
Computer System Page 42 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
PERFORMANCE CRITERIA CHECKLIST 2.2-1
CRITERIA
YES NO
Did you….
1. Observe (ppe) personal protectively equipment and practice
occupational health and safety procedures?
3. Get the terminated cross over cable and connect it directly to the
NIC of the 2 computers/laptops.
*8. Select the IPv4 and click properties Select the Internet Protocol
Version 4 (TCP/IPV4) and click properties.
Date Developed:
July 2017 Issued by:
Computer System Page 43 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
TASK SHEET 2.2-2
Performance Objective: Given the materials needed, you should able to configure peer
to peer network using switch, following the standard
procedure.
Time 1 hour
Steps/Procedure:
1. Check the power source of the 2 computers/laptops and the switch then turns
it on.
2. Get one terminated straight through cable and connect the rj45 to the NIC of
the 1st computer and the other end to the port of the switch.
3. Do step 2 on the 2nd computer.
4. Open your Control Panel.
5. Click on View Network Status and Task/ Network Sharing Center.
6. Click on Change Adapter Settings, or you can open it by running or searching
the command “ncpa.cpl”.
7. Open the properties of Ethernet,
8. Select the IPv4 and click properties Select the Internet Protocol Version 4
(TCP/IPV4) and click properties.
9. Click “Use the following IP address.
10. Configure the IP address and subnet mask.
11. Do step 3-8 on the 2nd computer.
Date Developed:
July 2017 Issued by:
Computer System Page 44 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
PERFORMANCE CRITERIA CHECKLIST 2.2-3
CRITERIA
YES NO
Did you….
1. Observe (ppe) personal protectively equipment and practice
occupational health and safety procedures?
3. Get one terminated straight through cable and connect the rj45 to
the NIC of the 1st computer and the other end to the port of the
switch?
9. Select the IPv4 and click properties Select the Internet Protocol
Version 4 (TCP/IPV4) and click properties.
Date Developed:
July 2017 Issued by:
Computer System Page 45 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
INFORMATION SHEET 2.3-1
Network Connectivity Testing
LEARNING OBJECTIVES
After reading this information sheet, you must be able to:
Command line interface testing
Troubleshoot error(s) on the network connections
Date Developed:
July 2017 Issued by:
Computer System Page 46 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
1. Ipconfig
2. Ping
Date Developed:
July 2017 Issued by:
Computer System Page 47 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
But not all network connection is always be a success, there are errors in configuring
a network. Request Timed Out, Destination Host Unreachable, General Failure are some
examples of the errors you might encounter.
To troubleshoot this error, 1st you must checked your IP address on both computers if
it is configured correctly, then try again to ping, if no response try to check you network
discovery, open your network sharing center.
Date Developed:
July 2017 Issued by:
Computer System Page 48 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
Click on advance sharing center.
Then turn on all network discovery as well as file sharing and turn off password in private,
guest or public and all networks then click save changes.
After you done this procedures, try again to test the connectivity of your network then
you can get the reply to the host you pinged.
Date Developed:
July 2017 Issued by:
Computer System Page 49 of 61
Servicing NCII Developed by:
Abobo, Edwin Jr. R.
SELF-CHECK 2.3-1
Test I: Identification
Directions: Identify the described word(s) in each item. Write your answer on the space
provided.
Test II:
Test II:
3-5. Open Command Prompt
Enter the command “ipconfig”
Performance Objective: Given the materials needed, you should be able to allow
network discovery and testing its network connectivity
following standard procedures.
Time 2 hour
Steps/Procedure:
1. Check the power source of the computers then turn it on.
2. Open your Control Panel.
3. Click on View Network Status and Task/ Network Sharing Center.
4. Click on Change Advance Sharing Settings
5. Open Private then turn on network discovery, turn on file and printer sharing.
6. Open Guest or Public then turn on network discovery, turn on file and printer
sharing.
7. Open all Networks then turn on sharing.
8. Do step 2-7 on the other computer
9. Open the Command Prompt by searching or running the command “CMD”
10. Execute the command “Ping <the IP address of the computer to be test>”
11. Do step 10 on the other computer.
CRITERIA
YES NO
Did you….
1. Observe (ppe) personal protectively equipment and practice
occupational health and safety procedures?
https://en.wikipedia.org/wiki/IP_address#Function
http://www.sas.upenn.edu/~jasonrw/IPConfiguration.htm
https://en.wikipedia.org/wiki/IPv4
https://google/images
https://www.google.com.ph/search?
q=ipv4&source=lnms&tbm=isch&sa=X&ved=0ahUKEwj82bHG47_VAhWC
XrwKHV_qC58Q_AUICigB&biw=1242&bih=602#imgdii=uHBUo81LOVM
ZyM:&imgrc=n1RmdqotK9J53M:
http://whatismyipaddress.com/dynamic-static
INSTITUTIONAL COMPETENCY
ASSESSMENT TOOL (ICAT)
EVIDENCE PLAN
Competency COMPUTER SYSTEM SERVICING NC II
standard:
Unit of SET-UP COMPUTER NETWORKS
competency:
Ways in which evidence will be collected:
Written
[tick the column]
Demonstration
Questioning
The evidence must show that the trainee…
Cable routes are determined and planned in
accordance with network design and actual installation
site.
Network materials necessary to complete the work are
identified and obtained in accordance with established
procedures and checked against systems requirements.
Tools, equipment and testing devices needed to carry
out the installation work are obtained in accordance
with established procedures and checked for correct
operation and safety.
Appropriate personal protective equipment is used
and OHS policies and procedures are followed
Copper cable splicing is performed based on Electronic
Industries Alliance/Telecommunications Industry
Association (EIA/TIA) standards.
*Network cables and cable raceway are installed in
accordance with established procedures and
installation requirements
Installation work is performed and is checked to
ensure no unnecessary damage has occurred and
complies with requirements
OHS standards and 5S principles are followed
according to enterprise requirements
Excess components and materials are disposed of based on
WEEE directives and 3Rs waste management program.
Network connectivity of each terminal is checked in
accordance with network design.
Any fault or problem in the network system is
diagnosed and remedied in line with the standard
operating procedures.
*Network interface card (NIC) settings are configured
in accordance with network design.
*Communication checking between terminals are
carried out in accordance with OS network
configuration guides
Unplanned events or conditions are responded to in
accordance with established procedures
Client Device systems settings are configured in
accordance with manufacturers’ instructions and end-
user preferences
*Local area network (LAN) port is configured in
accordance with manufacturers’ instructions and
network design
Wide area network (WAN) port is configured in
accordance with manufacturers’ instructions and
network design
Wireless settings are configured in accordance
manufacturers’ instructions, network design and end-
user preferences
Security/Firewall/Advance settings are configured in
accordance with manufacturers’ instructions and end-
user preferences
*Final inspections are undertaken to ensure that the
configuration done on the computer networks conforms
with the manufacturer’s instruction/manual
Computer networks are checked to ensure safe
operation.
Reports are prepared/completed according to
company requirements.
NOTE: *Critical aspects of competency
TABLE OF SPECIFICATION
Objectives/Content # of items/
Knowledge Comprehension Application
area/Topics % of test
Set network
14 5 25%
configuration
Set router/Wi-Fi/
wireless access
1 25%
point/repeater
configuration
TOTAL 20 10 30/100%
WRITTEN TEST
Test I: Identification
Directions: Identify the described word(s) in each item. Write your answer on the space
provided.
____________________1.The data is divided into small units called packets, and each packet
is sent over the network.
____________________2. A utility used to test the reachability of a host on an Internet
Protocol (IP) network.
____________________3. A type of computer network that links devices within a building
or group of adjacent buildings.
____________________4. The arrangement of network, including its nodes and connecting
lines.
____________________5. A unique identifier of a node in a TCP/IP network.
____________________6. A networking device typically the least expensive, least
intelligent, and least complicated. Its job is very simple – anything that comes in one port is
sent out to the others.
C. A bus network is a network topology in
which nodes are directly connected to a
common linear (or branched) half-duplex
link called a bus.
Test IV:
Direction:
Make 1 straight through cable. Observe the correct procedure. (5 points).
Configure peer to peer network and test connectivity for 2 computers (5points)
Column B
Test III
7. T
8. F
9. T
10. T
11. F
12. T
13. F
14. F
15. F
16. T
Test IV
17. D
18. C
19. A
20. B
Test V
20-30 (to be check by the trainer)
PERFORMANCE TEST
Time 9 hours
General Instruction: Given the necessary tools, materials and equipment, you
are required to SET-UP NETWORK CONFIGURATION following the
standards operating procedures.
Specific Instruction:
1.1 Cable routes are determined and planned in accordance with network
design and actual installation site.
1.2 Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements.
1.3 Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
1.4 Appropriate personal protective equipment is used and OHS policies
and procedures are followed
1.5 Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
1.6 Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
1.7 Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
1.8 OHS standards and 5S principles are followed according to enterprise
requirements
1.9 Excess components and materials are disposed based on WEEE
directives and 3Rs waste management program.
2.1 Network connectivity of each terminal is checked in accordance with
network design.
2.2 Any fault or problem in the network system is diagnosed and remedied
in line with the standard operating procedures.
2.3 Network interface card (NIC) settings are configured in accordance with
network design.
2.4 Communication checking between terminals are carried out in
accordance with OS network configuration guides.
2.5 Unplanned events or condition are responded to in accordance with
established procedures.
3.1 Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
3.2 Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design.
3.3 Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
3.4 Wireless settings are configured in accordance manufacturers’
instruction, network design and end-user preferences.
3.5 Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instruction and end-user preferences.
4.1 Final inspection are undertaken to ensure that the configuration done
on the computer conforms with the manufacturers’
instruction/manual.
4.2 Computer network are checked to ensure safety operation.
4.3 Reports are prepared/completed according to company requirements.
QUESTIONING TOOL
Satisfactory
Questions to probe the candidate’s underpinning knowledge
response
Extension/Reflection Questions Yes No
1. What are the appropriate materials and tools Cable Installation?
2. What are the standards operating procedures in Assembling Computer
Hardware?
Safety Questions
4. What is the important of IP address Configuration?
5. When is the POST (Power on Self Test)
Contingency Questions
8. If you test a computer network connection and no reply, what will you do?
10. What will you do if you see someone on slippers in the computer area?