Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

 

 
 
 
 
STE – ICT  
(Computer Systems Servicing) 
Activity Sheet – Quarter 2 – Week 1 
Network Design, Addressing, 
Subnetting and Topology 

 
 
 
 
 
 
 
 
STE – ICT (Computer Systems Servicing) 
Activity Sheet No. ​1 
First Edition, 2020 
 
Published in the Philippines 
By the Department of Education 
Region 6 - Western Visayas 
 
Republic  Act  8293,  section  176  states that: No copyright shall subsist in 
any  work  of  the  Government  of  the  Philippines.  However,  prior  approval of 
the  government  agency  or  office  wherein  the  work  is  created  shall  be 
necessary for exploitation of such work for profit. Such agency or office may, 
among other things, impose as a condition the payment of royalties. 
 
This  ​Learning  Activity  Sheet  is  developed  by  DepEd  Region  6  -  Western 
Visayas.  
 
ALL  RIGHTS  RESERVED​.  No  part  of  this  learning  resource  may  be 
reproduced  or  transmitted  in  any  form  or  by  any  means  electronic  or 
mechanical  without  written  permission  from  the  DepEd  Regional Office 6 – 
Western Visayas. 

2
 

 
Welcome  to  ​TLE/TVL  –  ICT  (Computer  Programming  –  Oracle 
Database)​. 
 
The  ​Learning  ​Activity  Sheet  is  a  product of the collaborative efforts 
of  the  Schools  Division  of  Capiz  and  DepEd  Regional  Office  VI  -  Western 
Visayas  through  the  Curriculum  and  Learning  Management  Division 
(CLMD).  This  is  developed  to  guide  the  learning  facilitators  (teachers, 
parents  and  responsible  adults)  in helping the learners meet the standards 
set by the K to 12 Basic Education Curriculum.   
  
The  ​Learning  Activity  Sheet  ​is  self-directed  instructional  materials 
aimed to guide the learners in accomplishing activities at their own pace and 
time  using  the  contextualized  resources  in  the  community.  This  will  also 
assist  the  learners  in  acquiring  the  lifelong  learning  skills,  knowledge  and 
attitudes for productivity and employment. 
  
 
 
 
For learning facilitator: 
 
The  ​TLE/TVL  –  ICT  (Computer  Programming  –  Oracle  Database) 
Activity  Sheet  ​will  help  you  facilitate  the  teaching-learning  activities 
specified in each Most Essential Learning Competency (MELC) with minimal 
3
or  no  face-to-face  encounter  between  you  and  learner.  This  will  be  made 
available  to  the  learners  with  the  references/links  to  ease  the independent 
learning. 
 
  
 
 
 
For the learner: 
 
The  ​TLE/TVL  –  ICT  (Computer  Programming  –  Oracle  Database) 
Activity  Sheet  ​is  developed  to  help  you  continue  learning  even  if  you  are 
not  in  school.  This  learning  material  provides  you  with  meaningful  and 
engaging  activities  for  independent  learning.  Being  an  active  learner, 
carefully  read  and  understand  the  instructions  then  perform  the  activities 
and answer the assessments. This will be returned to your facilitator on the 
agreed schedule.

Learning Activity Sheets (LAS) No.​1 


 
Name of Learner:  ___________________________________________________ 
 
Grade and Section: _________________________ Date: ___________________ 
 
STE – ICT (Computer Systems Servicing) ACTIVITY SHEET 
(Network Design, Addressing, Subnetting and Topology) 
I. Learning Competency 
LO 2. Set network configuration: 
2.1 Check  network  connectivity  of  each  terminal  in  accordance  with 
network design 
Code: TLE_IACSS9-12SUCN-Ia-e-34 
 
II. Background Information for Learners 
 
NETWORK DESIGN 
 
Network Design 
Network  design  refers  to  the  planning  of  the  implementation  of  a 
computer network infrastructure. 

4
Network  design  is  generally  performed  by  the  network  designers, 
engineers,  IT  administrators  and  other  related  staff.  It  is  done  before  the 
implementation of a network infrastructure. 
Network  design  involves  evaluating,  understanding  and  scoping  the 
network  to  be  implemented.  The  whole  network  design  is  usually 
represented  as  a  network  diagram  that  serves  as  the  blueprint  for 
implementing the network physically. Typically, network design includes the 
following: 
● Logical map of the network to be designed 
● Cabling structure 
● Quantity,  type  and  location  of  the  network  devices  (routers,  switches, 
servers) 
● IP addressing structure 
● Network security architecture and overall network security processes 
 
NETWORK ADDRESS 
 
Network Address 
A  network  address  is  any  logical  or  physical  address  that  uniquely 
distinguishes  a  network  node  or  device  over  a  computer  or 
telecommunication  network.  It  is  a  numeric/symbolic  number  or  address 
that is assigned to any device that seeks access to or is part of a network. 
A  network  address  is  key  networking  technology  component  that 
facilitates  identifying  a  network  mode/device  and  reaching  a  device  over  a 
network.  It  has  several  forms,  including  the  Internet  Protocol  (IP)  address, 
media access control (MAC) address and host address. 
Computers on a network use a network address to identify, locate and 
address  other  computers.  Besides,  individual  devices, a network address is 
typically unique for each interface; for example, a computer’s Wi-Fi and local 
area network (LAN) card has separate network addresses. 
A network address is also known as the numerical network part of an 
IP address. This is used to distinguish a network that has its won hosts and 
addresses. For example, in the IP address 192.168.1.0, the network address 
is 192.168.1. 
 
What is an IP Address? 
IP  address  stands  for  internet  protocol  address;  it  is  an  identifying 
number  that  is  associated  with  a  specific  computer  or  computer  network. 
When  connected  to  the  internet,  the  IP  address  allows  the  computers  to 
send and receive information. 
● An  internet  protocol  (IP) address allows computers to send and receive 
information. 
● There are 4 types of IP addresses: public, private, static and dynamic. 
● An  IP  address  allows  information  to  be  sent  and  received  by  the 
correct  parties,  which  means  they  can  also  be  used  to  track  down  a 
user’s physical location. 
 
How an IP Address Works 

2
An  IP  address  allows  computers  to  send  and  receive  data  over  the 
internet.  Most  IP  addresses  are  purely  numerical,  but  as  internet  usage 
grows, letters have been added to some addresses. 
There  are  4  different types of IP addresses: public, private, static and 
dynamic.  While  the  public  and  private  are  indicative  of  the  location  of  the 
network  –  private  being  used  inside  a  network  while  the  public  is  used 
outside of a network – static and dynamic indicate permanency. 
A  static  IP  address  is  one  that  was  manually  created,  as  opposed  to 
having  been  assigned.  A  static  address  also  does  not  change,  whereas  a 
dynamic  IP  address  had  been  assigned  by  a  Dynamic  Host  Configuration 
Protocol  (DHCP)  server  and  is subject to change. Dynamic IP addresses are 
the most common type of internet protocol addresses. Dynamic IP addresses 
are  only  active  for  a  certain  amount  of  time,  after  which  they  expire.  The 
computer will either automatically request a new lease, or the computer may 
receive a new IP address. 
 
SUBNETTING 
 
What is a subnet? 
A subnet, or subnetwork is a network inside a network. Subnets make 
networks  more  efficient.  Through  subnetting,  network  traffic  can  travel  a 
shorter  distance  without  passing  through  unnecessary  routers  to  reach  its 
destination. 
 
Why is subnetting necessary? 
Because  an  IP  address  is  limited  to  indication  the  network  and  the 
device address, IP addresses cannot be used to indicate which subnet an IP 
packet  should  go  to.  Routers  within  a  network  use  something  called  a 
subnet mask to sort data into subnetworks. 
 
What is a subnet mask? 
A subnet mask is like an IP address, but for only internal usage within 
a  network.  Routers  use  subnet  masks  to  route  data  packets  to  the  right 
place.  Subnet  masks  are  not  indicated  within  data  packets  traversing  the 
Internet  –  those  packets  only  indicate  the  destination  IP  address,  which  a 
router will match with a subnet. 
 
TOPOLOGY 
 
Network Topology 
Network  topology  is  the  schematic  description  of  the  arrangement  of 
the physical and logical elements of a communication network. 
Network topology refers to the manner in which the links and nodes of 
a network are arranged to relate to each other. Topologies are categorized as 
either  physical  network  topology,  which  is the physical signal transmission 
medium  or  logical  network  topology,  which  refers  to  the  manner  in  which 
data  travels  through  the  network  between  devices,  independent of physical 
connection of the devices. Logical network topology examples include twisted 
pair Ethernet, which is categorized as a logical bus topology, and token ring, 
3
which  is  categorized  as  logical  ring  topology.  Physical  network  topology 
examples include star, mesh, tree, ring, point-to-point, circular, hybrid, and 
bus  topology  networks,  each  consisting  of  different  configurations  of nodes 
and links. 
 
Why is Network Topology Important? 
The layout of your network is important for several reasons. Above all, 
it  plays  an  essential  role  in  how  and  how  well  you  network  functions. 
Choosing  the  right  topology  for  your  company’s  operational  model  can 
increase  performance  while  making  it  easier  to  locate  faults,  troubleshoot 
errors,  and more effectively allocate resources across the network to ensure 
optimal  network  health.  A  streamlined  and  properly  managed  network 
topology  can  increase  energy and data efficiency, which can in turn help to 
reduce operational and maintenance costs. 
The  design  and  structure  of  a  network  are  usually  shown  and 
manipulated  in  a  software-created  network  topology  diagram.  These 
diagrams  are  essential  for  a  few  reasons,  but  especially  for  how  they  can 
provide  visual representations of both physical and logical layouts, allowing 
administrators  to  see  the  connections  between  devices  when 
troubleshooting. 
Effective  network management and monitoring require a strong grasp 
of  both  the  physical  and  logical  topology  of  a  network  to  ensure  your 
network is efficient and healthy. 
 
Types of Network Topology 
 
BUS Topology 
Bus  topology  is  network  type  in  which  every  computer  and  network 
device  is  connected  to  a  single  cable.  When  it  has  exactly  two  endpoints, 
then it is called Linear Bus Topology. 
 
Features of Bus Topology 
● It transmits data only in one direction. 
● Every Device is connected to a single cable. 
 
Advantages of Bus Topology 
● Cost effective 
● Cable required is least compared to another network topology 
● Used in small networks 
● Easy to understand 
● Easy to expand joining two cables together 
 
Disadvantages of Bus Topology 
● Cables fails then whole network fails 
● If  network  traffic  is  heavy  or  nodes  are  more  the  performance  of  the 
network decreases 
● Cable has a limited length 
● Slower than the ring topology 
 
4
RING Topology 
It  is  called  ring  topology  because  it  forms a ring as each computer is 
connected  to  another  computer,  with  the  last  one  connected  to  the  first. 
Exactly two neighbors for each device. 
 
Features of Ring Topology 
● A  number  of  repeaters  are  used for ring topology with large number of 
nodes,  because  if  someone  wants  to  send some data to the last node 
in  the  ring  topology  with  100  nodes,  then  the  data  will  have  to  pass 
through 99 nodes to reach the 100th​  node. Hence to prevent data loss, 
repeaters are used in the network. 
● The  transmission  is  unidirectional,  but  it  can  be  made  bidirectional 
having  2  connections  between  each  network  node,  it  is  called  dual 
ring topology. 
● In  dual  ring  topology,  two  ring  networks  are  formed,  and  data  flow  is 
in  opposite  direction  in  them.  Also,  if  one  ring  fails,  the  second  ring 
can act as a backup, to keep the network up. 
● Data  is  transferred  in  a  sequential  manner  that  is  bit  by  bit.  Data 
transmitted,  has  to  pass  through  each  node  of  the  network,  till  the 
destination node. 
 
Advantages of Ring Topology 
● Transmitting  network  is  not  affected  by  high  traffic or by adding more 
nodes, as only the nodes having tokens can transmit data. 
● Cheap to install and expand. 
Disadvantages of Ring Topology 
● Troubleshooting is difficult in ring topology 
● Adding or deleting the computers disturbs the network activity 
● Failure of one computer disturbs the whole network 
 
STAR Topology 
In  this  type  of  topology,  all  the  computers  are  connected  to  a  single 
hub  through  a  cable. This hub is the central node and all others nodes are 
connected to the central node. 
 
Features of Star Topology 
● Every node has its own dedicated connection to the hub. 
● Hub acts as a repeater for data flow. 
● Can be used with twisted pair, optical fiber or coaxial cable 
 
Advantages of Star Topology 
● Fast performance with few nodes and low network traffic 
● Hub can be upgraded easily 
● Easy to troubleshoot 
● Easy to setup and modify 
● Only  that  node  is affected which has failed, rest of the nodes can work 
smoothly. 
 
Disadvantages of Star Topology 
5
● Cost of installation is high 
● Expensive to use 
● If  the  hub  fails  then  the  whole  network  is  stopped  because  all  the 
nodes depend on the hub 
● Performance is based on the hub that is it depends on its capacity 
 
MESH Topology 
It  is  a  point-to-point  connection  to  other  nodes  or  devices.  All  the 
network  nodes  are  connected  to  each  other.  Mesh  has  ​n(n-1)/2  physical 
channels to link ​n​ devices. 
There  are  two  techniques  to  transmit  data  over  the  Mesh  topology, 
they are: 
1. Routing 
In  routing,  the  nodes  have  a  routing  logic,  as  per  the  network 
requirements.  Like  routing  logic  to  direct  the  data  to  reach the destination 
using  the  shortest  distance.  Or,  routing  logic  which  has  information about 
the  broken  links,  and  it  avoids  those nodes, etc. We can even have routing 
logic, to re-configure the failed nodes. 
 
2. Flooding 
In  flooding,  the  same  data  is  transmitted  to  all  the  network  nodes, 
hence  no  routing  logic  is  required.  The  network  is  robust,  and  it  is  very 
unlikely to lose the data. But it leads to unwanted load over the network. 
 
Types of Mesh Topology 
1. Partial  Mesh  Topology  –  in  this  topology,  some  of  the  systems  are 
connected in the same fashion as mesh topology but some devices are 
only connected to two or three devices. 
2. Full  Mesh  Topology  –  each  and  every  nodes or devices are connected 
to each other. 
 
Features of Mesh Topology 
● Fully connected 
● Robust 
● Not flexible 
 
Advantages of Mesh Topology 
● Each connection can carry its own data load. 
● It is robust 
● Fault is diagnosed easily. 
● Provides security and privacy 
 
Disadvantages of Mesh Topology 
● Installation and configuration are difficult 
● Cabling cost is more 
● Bulk wiring is required 
 
TREE Topology 

6
It  has  a  root  node  and  all  other  nodes  are  connected  to  it  forming  a 
hierarchy. It is also called hierarchical topology. It should at least have three 
levels to the hierarchy. 
 
Features of Tree Topology 
● Ideal if workstations are located in groups 
● Used in wide area network 
 
Advantages of Tree Topology 
● Extension of bus and star topologies 
● Expansion of nodes are possible and easy 
● Easily managed and maintained 
● Error detection is easily done 
 
Disadvantages of Tree Topology 
● Heavily cabled 
● Costly 
● If more nodes are added, maintenance is difficult 
● Central hub fails, network fails 
 
HYBRID Topology 
It is two different types of topologies which is a mixture of two or more 
topologies.  For  example,  if  in  an  office  in  one  department,  ring  topology  is 
used  and  in  another, star topology is used, connecting these topologies will 
result in Hybrid Topology (ring topology and star topology). 
 
Features of Hybrid Topology 
● It is a combination of two topologies 
● Inherits the advantages and disadvantages of the topologies included 
 
Advantages of Hybrid Topology 
● Reliable as error detecting and troubleshooting is easy 
● Effective 
● Scalable as size can be increased easily 
● Flexible 
 
Disadvantages of Hybrid Topology 
● Complex in design 
● Costly 
 
 
III. Accompanying DepEd Textbook and Educational Sites 
● Janssen, Dale, Techopedia, ​“Network Design”,​ (2015). 
https://www.techopedia.com/definition/30186/network-design#:~:te
xt=Network%20design%20refers%20to%20the,administrators%20and
%20other%20related%20staff. 
● Janssen, Dale, Techopedia, ​“Network Address”​, (2015). 
https://www.techopedia.com/definition/20969/network-address#:~:t
ext=A%20network%20address%20is%20also,the%20network%20addr
7
ess%20is%20192.168. 
3.html#:~:text=An%20IP%20address%20is%20an,1%20octet%20%3D
%208%20bits). 
● Investopedia, ​“IP Address”​, (2015). 
https://www.investopedia.com/terms/i/ip-address.asp#:~:text=There
%20are%20four%20different%20types,static%20and%20dynamic%20i
ndicate%20permanency. Refsnes Data, ​“w3schools.com: SQL Syntax”,​  
(2000). https://www.w3schools.com/sql/sql_syntax.asp 
● CloudFlare,  ​“What  is  a  Subnet?  |  How  subnet  works?”​. 
https://www.cloudflare.com/learning/network-layer/what-is-a-subne
t/ 
● Omnisci,  ​“Network  Topology”.​  
https://www.omnisci.com/technical-glossary/network-topology 
● Staff  Contributor,  DNS  Stuff​, “What is Network Topology? Best Guide 
to  Types  and  Diagrams”,​   (August  2019). 
https://www.dnsstuff.com/what-is-network-topology 
● Ahlawat,  Abhishek,  Studytonight  Technologies,  ​“Types  of  Network 
Topology”​. 
https://www.studytonight.com/computer-networks/network-topology
-types 
 
IV. Activity Proper 
 
Activity  1.  Directions:  ​Based  on  the  given  definitions  and  features  of  the 
topologies  stated  above,  illustrate  the  structure/diagram  of  the  topologies 
given below. 
 
Example: 
 
Bus Topology 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1. Tree Topology 
 
 
 
8
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2. Mesh Topology 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
3. Ring Topology 
 
 
 
 
 
 
 
 
 
9
 
 
 
 
 
 
 
4. Hybrid Topology 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
5. Star Topology 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Activity 2. Directions​: ​Differentiate network addressing and subnetting 
 
Network Addressing  Subnetting 
   

10
Rubric for Scoring 
Criteria  3  2  1  Score 
Cleanliness Readable,  Mostly  Not   
/Neatness  Understandable  understandable  understandable 
and clean  and clean  and untidy 
Accuracy/  Evident of own  Evident of own  Evident of   
Clarity  ideas and  ideas most of  confused ideas 
imagination  the time  or imagination 
Organizatio Evident of  Evident of some  Unorganized   
n of Idea/  depth insight  insight and  understanding 
understandi and  understanding  /idea. Needs 
ng  understanding   improvement 
 
Total: 
 
 
Activity  3.  Direction.  Using  a  Venn  Diagram,  compare  and  contrast  the 
following topologies 
 
1. Bus Topology and Ring Topology 
 
 

2. Hybrid Topology and Tree Topology 


 
 
 
11
 
3. Star Topology and Mesh Topology 
 
 

Rubric for Scoring 


Criteria  3  2  1  Score 
Cleanliness Readable,  Mostly  Not   
/Neatness  Understandable  understandable  understandable 
and clean  and clean  and untidy 
Accuracy/  Evident of own  Evident of own  Evident of   
Clarity  ideas and  ideas most of  confused ideas 
imagination  the time  or imagination 
Organizatio Evident of  Evident of some  Unorganized   
n of Idea/  depth insight  insight and  understanding 
understandi and  understanding  /idea. Needs 
ng  understanding   improvement 
 
Total: 
 
 
V. Reflection 
1. What is the importance of network addressing? 
 
___________________________________________________________________________
___________________________________________________________________________ 

12
 
2. What is the importance of subnetting? 
___________________________________________________________________________
___________________________________________________________________________ 
 
3. If you were to ask, which type of topology is more efficient for you and 
why? 
___________________________________________________________________________
___________________________________________________________________________ 
 
 
 
 
 
VI. Answer Key 
 

 
 
 
 
 
 

13

You might also like