Professional Documents
Culture Documents
Ict CSS SHS12 Q2 Las2 Final PDF
Ict CSS SHS12 Q2 Las2 Final PDF
Ict CSS SHS12 Q2 Las2 Final PDF
i|Page
TVL 12 – ICT (Computer System Servicing)
Activity Sheet No. 2
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
ii | P a g e
Introductory Message
Welcome to TVL 12- ICT (Computer System Servicing)!
The Computer System Servicing NC II Activity Sheet will help you facilitate
the leaching-learning activities specified in each Most Essential Learning Competency
(MELC) with minimal or no face-to-face encounter between you and learner. This will
be made available to the learners with the references/links to ease the independent
learning.
iii | P a g e
Quarter 2, Week 2
Learning Activity Sheets (LAS) No. 2
Name of Learner:________________________________________________________
Grade and Section:___________________________________ Date: ______________
Many scenarios require you to test things locally on your computer using the
command line. For example, if you are trying to test the connection between your
computer and a remote host, a web-based tool cannot provide this information. It
only tests the connection from its own server to the remote host.
1|Page
The exact steps to use the ping tools from the command line depend on your
computer's operating system. The basic ping test is one of the easiest things
you can do to verify connectivity between your computer and a remote host. This
test is easy to run from the command line.
▪ Reply from: By default, windows will send four ping messages (one on each line)
and then shows you the outcome of each of the four messages.
▪ Bytes: Each ping message request is 32 bytes in size. This is a default setting.
▪ Time: This shows the round trip amount of time in milliseconds (8ms =
0.008seconds). Round trip is the time from when the ping message was sent and
how long it took before the reply came back.
▪ TTL (Time-to-Live): The TTL value represents the maximum number of IP routers
that the packet can go through before being thrown away. Currently each router
that the packet travels/hops through will decrement the TTL field by exactly one.
Windows default TTL is 64 therefore if you ping a device on your local home
wireless/network then the ping will not cross any routers and the TTL should remain
2|Page
at the default. As you can see from the google.com ping example (above) the TTL
went down to 113 so the packet had to hop across a few routers before it got to
google.com.
▪ Request Timeout: The destination IP/hostname or website did not respond. They
could be due to a number of reasons such as; the device does not exist, is not
powered on or is configure not to reply to ping requests. You can create a rule in
windows firewall to stop you PC/Laptop from replying to Pings. Some websites or
online resources do this via a commercial firewall so that hacker cannot target their
systems. If a device does not respond to ping then a hack may pressure that the IP
address / hostname they are pinging does not exist and they may move on till they
find something that does so that they can then start targeting attacks to that IP
address.
3|Page
system. For example, an organization may not be very familiar with 802.1X
authentication systems and may benefit by implementing the 802.1X
authentication in a lab environment with a limited number of test client devices.
✓ Pilot testing: Before installing the WLAN across the entire organization, which
may include numerous buildings and different applications, it is strongly
advisable to install the system in a limited number of facilities (ideally one) and
make that one work effectively first. After you work out all the problems, you can
install the WLAN at the remaining location without the need for extensive rework
because the problems will likely have been solved during the pilot testing.
Please connect a computer to TP-Link router by cable or through wireless network. It’s
recommended to
configure it by a wired
connection.
TIME Settings
This page allows you to set the time manually or to configure automatic time
synchronization. The Router can automatically update the time from an NTP
server via the Internet.
4|Page
Time Zone - Select your local time zone from this
pull-down list.
To set time manually:
1. Select your local time zone.
2. Enter the Date.
3. Enter the Time.
4. Click Save.
For automatic time synchronization:
1. Enter the address or domain of the NTP
Server 1 or NTP Server 2.
2. Click the Get GMT button to get GMT
from the Internet.
To set up daylight saving:
1. Select the Enable Daylight
Saving checkbox to enable daylight
saving function.
2. Select the correct Start time and End time of daylight saving range.
3. Click Save.
Diagnostic
The diagnostic tools (Ping and
Traceroute) allow you to check the
connections of your network components.
• Ping - This diagnostic tool troubleshoots
connectivity, reachability, and name
resolution to a given host or gateway by
using the Internet Control Message
Protocol (ICMP) protocol's mandatory
Echo Request datagram to elicit an
ICMP Echo Response from a host or
gateway.
• Traceroute - This diagnostic tool
determines the path taken to a given
host by sending Internet Control
Message Protocol (ICMP) Echo Request messages with varying Time to Live (TTL) values to
the destination
5|Page
Firmware Upgrade - To upgrade the device's firmware.
Firmware Version - Displays the current firmware version.
Hardware Version - Displays the current hardware version. The hardware version of the
upgrade file must accord with the current hardware version.
Factory Defaults
Click the Restore button to reset all configuration settings to their default values.
Note: All changed settings will be lost when defaults are restored.
Password
It is strongly recommended that you change the factory default user name and password
of the device. All users who try to access the device's web-based utility will be prompted
for the device's user name and password.
System Log
Log Type - By selecting the log type, only logs of this type will be shown.
Log Level - By selecting the log level, only logs of this level will be shown.
Refresh - Refresh the page to show the latest log list.
Clear Log - All the logs will be deleted from the device permanently, not just from the page.
Save Log - Click to save all the logs in a txt file.
Log Settings - Click to set the logs in the screen.
• Save Locally - If Save Locally is selected, events will be recorded in the local
memory.
• Minimum Level - Select the Minimum level in the drop-down list, for the Minimum
Level, all logged events above or equal to the selected level will
be displayed.
• Save Remotely - If Save Remotely is selected, events will be sent to the specified
IP address and UDP port of the remote system log server.
Statistics Help - The Statistics page shows the network traffic of each PC on the LAN, including
total traffic and the value of the last Packets Statistic interval in seconds.
6|Page
LOCAL AREA NETWORK (LAN) PORT CONFIGURATION
Note:
1. If you change the IP address, you must use the new IP address to login to the Device.
2. If the new LAN IP address you set is not in the same subnet with the previous one, the IP
Address pool in the DHCP server will be configured automatically, but the Virtual Server
and DMZ Host will not take effect until they are re-configured
Connection Type
Options
Static IP Setting
7|Page
WIDE AREA NETWORK (WAN) PORT CONFIGURATION
If you don't know how to choose the appropriate connection type, click the Detect button
to allow the Router to automatically search your Internet connection for servers and
protocols. The connection type will be reported when an active Internet service is
successfully detected by the Router. This report is for your reference only. To make sure
the connection type your ISP provides, please refer to the ISP. The various types of
Internet connections that the Router can detect are as follows:
o PPPoE - Connections which use PPPoE that requires a user name and password.
o Dynamic IP - Connections which use dynamic IP address assignment.
o Static IP - Connections which use static IP address assignment.
MTU Size (in bytes) - The normal MTU (Maximum Transmission Unit) value for most Ethernet
networks is 1500 Bytes. For some ISPs you need to modify the MTU. But this is
rarely required, and should not be done unless you are sure it is necessary for your
ISP connection.
If your ISP gives you one or two DNS IP addresses, select Set DNS server manually and enter
the DNS Server and Secondary DNS Server into the correct fields. Otherwise,
the DNS servers will be assigned from ISP dynamically.
Primary DNS - Enter the DNS IP address in dotted-decimal notation provided by your ISP.
Secondary DNS - Enter another DNS IP address in dotted-decimal notation provided by your
ISP.
Note: If you get Address not found error when you access a Web site, it is likely that your DNS
servers are set up improperly. You should contact your ISP to get DNS server
addresses.
Host Name - This option specifies the Host Name of the Router.
8|Page
Get IP with Unicast - A few ISPs' DHCP servers do not support the broadcast applications. If
you can't get the IP Address normally, you can choose Unicast. (You generally
need not to check this option).
Click the Save button to save your settings.
1. Multiple Choice. Encircle the correct answer from the given choices below.
9|Page
6) This can provide helpful feedback when designing the system, especially if the WLAN
will have critical performance requirements
a. In-motion testing c. Simulation Testing
b. Signal Coverage Testing d. Pilot Testing
7) Which part of system tools allows you to check the connections of your network
components.
a. Factory Defaults c. Diagnostic
b. Back-up and Restore d. Firmware upgrade
8) Which type of WAN Connection that requires a username and password?
a. Dynamic IP c. Static IP
b. PPPoE d. L2TP
9) The diagnostic tool which troubleshoots connectivity, reachability and name resolution
to a given host or gateway by using the Internet Control Message Protocol (ICMP)
protocol's mandatory Echo Request datagram to elicit an ICMP Echo Response from a
host or gateway.
a. Traceroute c. ipconfig
b. NSLookup d. ping
10) An address code that determines the size of the network.
a. Subnet Mask c. MAC Address
b. IP Address d. None of the above.
2. Using your Mobile Phone or Computer (if available), open the browser (Mozilla
Firefox or google chrome) and open the link provided. Watch the YouTube video of
configuring LAN and WAN ports of a wireless device.
http://bit.do/csslanwan
2.1 Using the same procedure above, open the link provided below and practice
configuring LAN and WAN of a wireless device.
http://bit.do/cssrouteremulator
Guide Questions
a. Based on activities 2.2 and 2.3, differentiate LAN port configuration from
WAN port configuration.
ii. Which portion of a router / network device can this tool also be found?
10 | P a g e
iii. What if the result of connectivity testing is 100% Loss? Explain.
Scoring Rubric
Needs Approaching Good Excellent
Improvement standards
3Pt 5Pts 7Pts 10Pts
You put
thought into
this, but
What you are writing What you are writing
there is no
There is no about is clear. You about is clear and
real evidence
clear or answered the question. well-expressed,
Ideas and of learning.
specific Some support may be including specific
Content More specific
explanation lacking, or your examples to
information
in answer to sentences may be a bit demonstrate what
is needed or
the question. awkward. Overall, a you learned. Well
you need to
decent job. done!
follow the
directions
more closely.
Your answer
Only one
included all the
term from
Your answer included terms from the
No terms the lesson is
Use of several terms from the lesson that applied
from the used in the
terms lesson, demonstrating to the question
lesson are answer. Try
adequate understanding asked. All terms are
used. for a few
of the material. fully defined and
more, next
used in the proper
time.
context.
Some
Sentences Sentences are
sentences
are complete and they
are complete
Sentence incomplete or Sentences are complete connect to one
and easy to
Fluency too long. It and able to be another easily when
understand.
makes understood. they are read out
Others
reading them loud. Your writing
require some
difficult. 'flows.'
work.
Few end Mistakes Use of punctuation No punctuation or
marks or using end marks and capitals, as structural mistakes.
capital marks or well as spelling, is mostly No spelling errors.
Conventions
letters. capitals as correct. Few errors exist Your writing shows
Answers well as in your answer. full awareness of the
contain spelling rules of English use.
numerous mistakes
11 | P a g e
spelling or make the
structural writing hard
errors. to read.
V. Reflection
Latency and ping are often used interchangeably, although they are subtly
different. While ping refers to the signal sent from the device to the server,
latency is the time it takes for the ping to return to the device. The unit used to
measure latency is milliseconds or ms.
In online gaming, lag is a noticeable delay (latency) between the action
of players (input) and the reaction of the server supporting the game( like LoL,
ML, Dota 2), which has to be sent back to the client.
In your personal use of computer or mobile phones while connecting to the
internet or playing online games, did you experience high latency or Lag? (You
may use a separate sheet of paper for your answer.
What do you think are the causes of that lag?
What did you do?
12 | P a g e