Professional Documents
Culture Documents
Computer Systems Servicing 10 Week5-6
Computer Systems Servicing 10 Week5-6
10
TLE-INFORMATION AND
COMMUNICATIONS TECHNOLOGY
COMPUTER SYSTEMS
SERVICING:
SETTING UP NETWORKS
QUARTER 4 – MODULE 3
WEEK 5-6
MELC/ LO4 Inspect and Test the Configured Computer Networks
Prepared by:
JEFFREY O. TORRALBA
Teacher III
Don Ramon E. Costales Memorial NHS
0
What This Module is About
Good day learners! Welcome to this module in Information and Communications
Technology – Computer Systems Servicing Course ( ICT-CSS). In this module you will learn
skills on the different factors to consider in setting up computer network configurations.
At the end of this module you will be able to apply the knowledge and skills on setting
up computer network configuration.
1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Read the instruction carefully before doing each task.
3. Observe honesty and integrity in doing the tasks and checking your answers.
4. Finish the task at hand before proceeding to the next.
5. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.
We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!
1
What’s In
What’s New
Network testing is, in the end, making sure that your network configuration works as
designed. Network testing is very similar to software testing, with one exception: in contrast to
software testing, network testing often has to happen in a production environment, after the
configuration change was made. In fact, it is sometimes very difficult, or almost impossible, to
model a complex system like a large enterprise network, or the Internet itself, in a lab
environment. Thus, network testing is a MUST-HAVE step in the network implementation
process.
What is It
In general, testing is finding out how well something works. For human beings, testing
tells what level of knowledge or skill has been acquired. In computer hardware and software
development, testing is used at key checkpoints in the overall process to determine whether
objectives are being met. For example, in software development, product objectives are
sometimes tested by product user representatives. When the design is complete, coding
follows and when finished, this is then tested at the unit or module level by each programmer;
at the component level by the group of programmers involved; and at the system level when
all components are combined together. At early or late stages, a product or service may also
be tested for usability.
Safety Precautions
Occupational Health and Safety (OHS) Policy – An Information and Communication
technology (ICT) student should know how to behave when working in the computer
laboratory, and to accomplish task safely. Safety practices should be learned early and always
adheres in working with any electrical and electronic device, including personal computers
and its peripherals. This is for your protection as well as to the people working with you, and
for the devices that you are using.
Occupational Health and Safety (OHS) Policy is a planned system of working to prevent
illness and injury where you work by recognizing and identifying hazards and risks. Health and
safety procedure is the responsibility of all persons in the computer and technology industries.
2
You must identify the hazards where you are working and decide how dangerous they are.
Eliminate the hazard or modify the risk that it presents.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from harm.
4. If the hazard can be easily and safely cleared, then do so
If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to
obtain assistance.
6. After clearing the hazard, fill out the correct documentation to assist in identifying improved
practice to reduce further incidence of hazards.
All hazards must be reported using an Accidental Report form. This enables us to track
the kinds of hazards we have in our workplace, and take action when necessary to make it
safer for all student and clients.
Accident Reports
Forms are used to give specific details with regards to accidents that happened in the
laboratory during experiments.
Accident reports contain the following details:
Name of the person injured
Date and time of the accident
Type of injury
First aid given
Action taken to prevent further accidents
3
Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked
or seriously injured in an electrical accident.
Do not work on components that are plugged into their power source.
Do not remove expansion cards from a computer when it is turned on.
Remove jewelries when working inside any computer-related equipment.
Be sure not to pour water on electronic components.
You've set up all your network switches, plugged in all the cables, and configured all
your computers. One task remains before you can declare your network is finished: You must
verify that the network works as expected.
Here are a few simple tests you can conduct to make sure your network is functional:
If this part of the output does not show a valid IP address, you need to check that your
IP configuration is set correctly and that your DHCP server is working.
4
Writing a Technical Report on Test Conducted
Technical Report is any document that records the procedure adopted and results
obtained from a scientific or technical activity or investigation. Use the following format for a
technical report for your recently conducted test.
Recommended Equipment
A computer with at least Windows XP Professional installed
A wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Internet connectivity
Step 1
1. Disconnect the Ethernet patch cable from your computer.
2. A red “X” appears over the “Local Area Connection” icon.
5
3. Hover over the “Wireless Network Connection” icon in the tray.
6
9. A successful ping indicates that there is a connection between the computer and the default
gateway.
Step 2
1. Open a web browser.
2. Type www.google.com in the “Address” field, and then press Return.
Step 3
1. Open the Network Connections window.
7
What I Have Learned
Directions. Write TRUE if the statement is correct and FALSE if the statement is wrong.
Summative Assessment
I. Directions. Choose the letter of the best answer. Write your answer on a separate sheet of
paper.
8
a. ipconfig b. ipsetup c. both a and b d. none of these
II. Directions. Write TRUE if the underlined word makes the statement correct and if not,
Write the right term that makes it accurate.
III. Directions. Create a Sample Technical Report on Test Conducted using any device
(phone, laptop, tablet) that you connect to a network (i.e. internet using broadband,
mobile data, or DSL). Follow the format in the Module Content.
9
Answer Key
What I have Learned
1. TRUE
2. FALSE
3. FALSE
4. TRUE
5. FALSE
6. TRUE
7. FALSE
8. FALSE
9. TRUE
10. FALSE
References:
Abrams, M. D., et al., "The NBS network measurement system," IEEE Trans. on Commun.
COM-25, (Oct 1977), 1189--1198.
Bruce Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”,
Fast Software Encryption, Cambridge Security Workshop Proceedings (December
1993), Springer-Verlag,
1994.
Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo Cardoso and Frank Piessens,
“Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network
Discovery Mechanisms”, ACM Asia Conference on Computer and Communications
Security, May 2016.
Lixia Zhang, “A New Architecture for Packet Switching Network Protocols”, PhD Thesis,
Massachusetts Institute of Technology, 1989.
10