Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 52

LESSON 2:

Setting-Up Computer Networks


(SUCN)

Learning Outcomes:
At the end of this lesson, you are expected to do
the following:

LO 1 Install network cables


LO 2: Set network configuration
LO 3: Set router/Wi-fi/wireless access point/repeater configuration
LO 4: Inspect and test the configured computer networks

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Pre-Test: What Do You Already Know?

Pre-Test LO 1 A

I. IDENTIFICATION: Identify what is being described.


__________________1. It is a digital telecommunications network for sharing resources
between nodes, which are computing devices that use a common telecommunications
technology. 
__________________2. It is a group of computers connected with each other in a small
place such as school, hospital, apartment etc.
__________________3. Network covers larger area by connections LANs to a larger
network of computers.
__________________4. It provides long distance transmission of data. .
__________________5. It is the arrangement with which computer systems
or network devices are connected to each other.
__________________6. It contains exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable.
__________________7. This network topology shares single communication line or cable.
__________________8. All hosts are connected to a central device, known as hub device,
using a point-to-point connection.
__________________9. What is the meaning of WAN?
__________________10. Host machine connects to exactly two other machines, creating a
circular network structure.
__________________11. This topology connects all the hosts in a linear fashion. Similar to
Ring topology, all hosts are connected to two hosts only, except the end hosts.
__________________12. Also known as Hierarchical Topology, this is the most common
form of network topology in use presently.
__________________13. A network structure whose design contains more than one
topology.
__________________14. Provides a standard way to connect the computers to the network
through a wired connection.

__________________15. A global network that connects computer networks worldwide. It


is a massive network of networks.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
__________________16. It is a hardware component without which a computer cannot be
connected over a network.
__________________17. It is a common connection point for devices in a network.
__________________18. A kind of hub in which usually include some method of linking
them to other standalone hubs for network expansion. 
__________________19. A hub designed to be connected and stacked or positioned on top
of another hub, forming an expanding stack.

__________________20. A network hub that is configured by adding different modules,


each supporting a topology, such as Ethernet, Token Ring, FDDI, etc. See hub.
__________________21. Amplify or boost signals
__________________22. This network device select which path a specific signal will travel
__________________23. It divides network into smaller, more manageable sections helping
traffic.

__________________24. It helps determine how data moves over large networks.


__________________25. A device that forwards data packets between Local or Wide Area
Network groups.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
DISCUSSION: INFORMATION SHEET

LO1: Install Network Cables


Learning Code: TLE_IACSS912SUCN-IVa-j-33

Objectives:
1.1 Plan cable routes in accordance with network design and actual installation site
1.2 Determine cable routes in accordance with network design and actual installation
site 1.3 Identify necessary network materials in accordance with established procedures
and check against system requirements
1.4 Obtain necessary network materials in accordance with established procedures and
check against system requirements
1.5 Obtain tools, equipment, and testing devices in accordance with established
procedure
1.6 Check tools, equipment and testing devices in accordance with established
procedures
1.7 Follow OHS policies
1.8 Use appropriate PPE
1.9 Perform copper cable splicing based on Electronic Industries Alliance /
Telecommunications Industry Association (EIA/TIA) standards
1.10 Install network cables and cable raceways in accordance with established
procedures and installation requirements
1.11 Perform installation work and check for unnecessary damage that has occurred
and complies with requirements
1.12 Follow OHS standards and 5S principles according to enterprise requirements
1.13 Dispose excess components and materials based on WEEE directives and 3Rs waste
management program

Computer Networking
 Computer Network is a digital telecommunications
network for sharing resources between nodes, which
are computing devices that use a common
telecommunications technology. Data transmission between
nodes is supported over data links consisting of
physical cable media, such as twisted pair or fibre-optic
cables, or by wireless methods, such as Wi-Fi, microwave
transmission, or free-space optical communication.
There are mainly three types of computer networks
based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
1. Local Area Network (LAN)

1. Local area network is a group of computers connected with each other in a small place
such as school, hospital, apartment etc.
2. LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
3. LAN due to their small size are considerably faster, their speed can range anywhere from
100 to 100Mbps.
4. LANs are not limited to wire connection, there is a new evolution to the LANs that allows
local area network to work on a wireless connection.

2. Metropolitan Area Network (MAN)

MAN

Network covers larger area by connections LANs to a


larger network of computers. In Metropolitan area network various Local area networks are
connected with each other through telephone lines. The size of the Metropolitan area network
is larger than LANs and smaller than WANs(wide area networks), a MANs covers the larger
area of a city or town.

3. Wide area network (WAN)

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Wide area network provides long distance transmission of data. The size of the
WAN is larger than LAN and MAN. A WAN can cover country, continent or even a whole
world. Internet connection is an example of WAN. Other examples of WAN are mobile
broadband connections such as 3G, 4G etc.

Advantages of WAN:

Centralized infrastructure: One of the main advantage of WAN is the that we do


not need to maintain the backup and store data on local system as everything is stored online
on a data centre, from where we can access the data through WAN.

Privacy: We can setup the WAN in such a way that it encrypts the data that we share
online that way the data is secure and minimises the risk of unauthorized access.

Increased Bandwidth: With the WAN we get to choose the bandwidth based on the
need, a large organization can have larger bandwidth that can carry large amount of data
faster and efficiently.

Area: A WAN can cover a large area or even a whole world though internet
connection thus we can connect with the person in another country through WAN which is
not possible is other type of computer networks.

Disadvantages of WAN:

Antivirus: Since our systems are connected with the large amount of systems, there is
possibility that we may unknowingly download the virus that can affect our system and
become threat to our privacy and may lead to data loss.

Expensive: Cost of installation is very high.

Issue resolution: Issue resolution takes time as the WAN covers large area, it is
really difficult to pin point the exact location where the issues raised and causing the
problem.

Computer Network Topologies


A Network Topology is the arrangement with which computer systems
or network devices are connected to each other. Topologies may define both physical and
logical aspect of the network. Both logical and physical topologies could be same or different
in a same network.

1. Point-to-point networks contains exactly two hosts such as computer, switches or


routers, servers connected back to back using a single piece of cable. Often, the
receiving end of one host is connected to sending end of the other and vice-versa.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
If the hosts are connected point-to-point logically, then may have multiple
intermediate devices. But the end hosts are unaware of underlying network and see each
other as if they are connected directly.

2. Bus Topology

In case of Bus topology, all devices share single communication line or cable.Bus
topology may have problem while multiple hosts sending data at the same time. Therefore,
Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to
solve the issue. It is one of the simple forms of networking where a failure of a device does
not affect the other devices. But failure of the shared communication line can make all other
devices stop functioning.

Both ends of the shared channel have line terminator. The data is sent in only one
direction and as soon as it reaches the extreme end, the terminator removes the data from the
line.

3. Star Topology

All hosts in Star topology are connected to a central device, known as hub device,
using a point-to-point connection. That is, there exists a point to point connection between
hosts and hub. The hub device can be any of the following:

 Layer-1 device such as hub or repeater


 Layer-2 device such as switch or bridge
 Layer-3 device such as router or gateway

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all
hosts to all other hosts fails. Every communication between hosts, takes place through only
the hub. Star topology is not expensive as to connect one more host, only one cable is
required and configuration is simple.

Ring Topology

In ring topology, each host machine connects to exactly two other machines, creating
a circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.

Failure of any host results in failure of the whole ring. Thus, every connection in the
ring is a point of failure. There are methods which employ one more backup ring.

Mesh Topology

In this type of topology, a host is connected to one or multiple hosts. This topology
has hosts in point-to-point connection with every other host or may also have hosts which
are in point-to-point connection to few hosts only.

Hosts in Mesh topology also work as relay for other hosts which do not have direct
point-to-point links. Mesh technology comes into two types:

 Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides the
most reliable network structure among all network topologies.
 Partially Mesh: Not all hosts have point-to-point connection to every other host.
Hosts connect to each other in some arbitrarily fashion. This topology exists where we
need to provide reliability to some hosts out of all.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Tree Topology

Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of
bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs,
a network is bifurcated into three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as distribution layer, which works
as mediator between upper layer and lower layer. The highest layer is known as core layer,
and is central point of the network, i.e. root of the tree from which all nodes fork.

All neighboring
hosts have point-to-point connection between them. Similar to the Bus topology, if the root
goes down, then the entire network suffers even. Though it is not the single point of failure.
Every connection serves as point of failure, failing of which divides the network into
unreachable segment.

Daisy Chain

This topology connects all the hosts in a linear fashion. Similar to Ring topology, all
hosts are connected to two hosts only, except the end hosts.Means, if the end hosts in daisy
chain are connected then it represents Ring topology.

Each link in
daisy chain topology represents single point of failure. Every link failure splits the network
into two segments. Every intermediate host works as relay for its immediate hosts.

Hybrid Topology

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.

ETHERNET Vs. ENTERNET

What is Internet
Internet is a global network that
connects computer networks worldwide. It
is a massive network of networks. It uses the
TCP/IP protocol for data transmission. Users
can share information instantly with the help
of the internet. It allows sharing resources
and providing services such as file
sharing, World Wide Web and electronic
mailing. In the internet, desktop computers,
routers, switches and other devices are
connected to each other using cables or
through a wireless network or more
advanced technology such as fiber optics.
Internet is one of the most vital and
effective communication methods in today’s world. It is helpful in almost all the fields such
as business, education, medicine, media, etc. It is an excellent source of information for the
user.

What is Ethernet
Ethernet provides a standard way to
connect the computers to the network through a
wired connection. It is an interface that connects
multiple devices such as computer and switches.
It is used for Local Area Networks which is a
network limited to a small geographical area.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Ethernet sends the data in the form of frames. These frames include source and destination
addresses and error detection mechanisms.
A standard ethernet cable is slightly thicker than a usual telephone cable, and it has
an RJ45 connector at the end. There are multiple standards of ethernet. The 10BASE-T has a
speed up to 10Mbps. 100BASE-T supports up to 100Mbps and 1000BASE-T has a speed up
to 1000Mbps. When a computer with 10BASE-T NIC connects to a 100BASE-T network, then
the device can send and receive data at a speed of 10Mbps.

Network Hardware
 Network Interface Card (NIC) is a hardware component
without which a computer cannot be connected over
a network. It is a circuit board installed in a computer
that provides a dedicated network connection to the
computer. It is also called network interface
controller, network adapter or LAN adapter.
 Network Hub – Also called hub, is a common connection
point for devices in a network. Hubs are devices

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
commonly used to connect segments of a LAN. The hub contains multiple ports.
When a packet arrives at one port, it is copied to the other ports so that all segments
of the LAN can see all packets.

Kinds of Hubs
Standalone Hubs - usually include some method of linking them to other standalone
hubs for network expansion. Standalone hubs are usually
the least expensive type of hub, and are best suited for
small, independent workgroups, departments, or offices,
typically with fewer than 12 users per LAN.

Stackable Hubs - A stackable hub is a hub designed to


be connected and stacked or positioned on top of another hub,
forming an expanding stack. Since a hub is basically a
concentrator of device connections, a set of stackable hubs is
just a bigger concentrator.

Modular Hubs - A network hub that is configured by adding


different modules, each supporting a topology, such as
Ethernet, Token Ring, FDDI, etc. See hub.
THIS DEFINITION IS FOR PERSONAL USE ONLY. All other
reproduction requires permission.

3 Basic Hub Types

 Passive hubs – simply connects various cables


 Active hubs – amplify or boost signals
 Intelligent hubs – select which path a specific signal will travel

a. Repeater – a device that strengthen signals and allows


them to stay clear over longer distances.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
b. Network Bridge – divides network into smaller, more manageable sections helping
traffic.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
c. Network switch – it helps determine how data moves over large networks.

d. Router – a device that forwards data packets between Local


or Wide Area Network groups.

Post-Test: How Much Have You Learned?

Post-Test LO 1 A

I. IDENTIFICATION: Identify what is being described.


__________________1. It is a digital telecommunications network for sharing resources
between nodes, which are computing devices that use a common telecommunications
technology. 
__________________2. It is a group of computers connected with each other in a small
place such as school, hospital, apartment etc.
__________________3. Network covers larger area by connections LANs to a larger
network of computers.
__________________4. It provides long distance transmission of data. .

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
__________________5. It is the arrangement with which computer systems
or network devices are connected to each other.
__________________6. It contains exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable.
__________________7. This network topology shares single communication line or cable.
__________________8. All hosts are connected to a central device, known as hub device,
using a point-to-point connection.
__________________9. What is the meaning of WAN?
__________________10. Host machine connects to exactly two other machines, creating a
circular network structure.
__________________11. This topology connects all the hosts in a linear fashion. Similar to
Ring topology, all hosts are connected to two hosts only, except the end hosts.
__________________12. Also known as Hierarchical Topology, this is the most common
form of network topology in use presently.
__________________13. A network structure whose design contains more than one
topology.
__________________14. Provides a standard way to connect the computers to the network
through a wired connection.

__________________15. A global network that connects computer networks worldwide. It


is a massive network of networks.

__________________16. It is a hardware component without which a computer cannot be


connected over a network.
__________________17. It is a common connection point for devices in a network.
__________________18. A kind of hub in which usually include some method of linking
them to other standalone hubs for network expansion. 
__________________19. A hub designed to be connected and stacked or positioned on top
of another hub, forming an expanding stack.

__________________20. A network hub that is configured by adding different modules,


each supporting a topology, such as Ethernet, Token Ring, FDDI, etc. See hub.
__________________21. Amplify or boost signals
__________________22. This network device select which path a specific signal will travel
__________________23. It divides network into smaller, more manageable sections helping
traffic.

__________________24. It helps determine how data moves over large networks.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
__________________25. A device that forwards data packets between Local or Wide Area
Network groups.

Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
REFERENCES

https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://www.tutorialspoint.com/what-is-network-interface-card-nic
https://pediaa.com/what-is-the-difference-between-internet-and-ethernet/
https://www.webopedia.com/quick_ref/topologies.asp

Pre-Test: What Do You Already Know?

Pre-Test LO 1 B

A. IDENTIFICATION: Identify what is being asked.

_________________1. It is the medium through which information usually moves from one
network device to another.
_________________2. These are widely used in the computer and telecommunications
industry as Ethernet cables and telephone wires.
_________________3. It is similar to unshielded twisted pair (UTP); however, it contains an
extra foil wrapping or copper braid jacket to help shield the cable signals from interference.
_________________4. A type of copper cable specially built with a metal shield and other
components engineered to block signal interference.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
_________________5. It consists of a center glass core surrounded by several layers of
protective materials. It transmits light rather than electronic signals eliminating the problem
of electrical interference.
_________________6. A type of twisted pair cable that is used in local area networks to
connect a computer to a network hub such as a router.
_________________7. A type of cable installation that is used for the interconnection of two
similar devices.
_________________8. A type of connector commonly used for Ethernet networking.
_________________9. Straight-through cable code for RJ45.
_________________10. Cross Over cable code for RJ45.

B. Arrange the procedure in creating LAN Cable. Label your answer from 1(first step) to 8 (last
step).

________Carefully insert the wires all the way into the modular connector.
________Push the connector inside the crimping tool and squeeze the crimper all the way
down.
________Repeat steps 1-6 for the other end of the cable.
________Spread the four pairs of twisted wire apart.
________Strip the cable jacket about 1.5 inch down from the end.
________To make sure you've successfully terminated each end of the cable, use a cable
tester to test each pin.
________Untwist the wire pairs and neatly align them in the T568B orientation.
________Use Crimping tool to cut the wires as straight as possible.

DISCUSSION: INFORMATION SHEET

NETWORK CABLE
Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some cases, a
network will utilize only one type of cable, other networks will use a variety of cable types. The type
of cable chosen for a network is related to the network’s topology, protocol, and size. Understanding
the characteristics of different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.

Examples of network media:

 Unshielded Twisted Pair (UTP) Cable


 Shielded Twisted Pair (STP) Cable
 Coaxial Cable
 Wireless LANs
 Cable Installation Guides

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Unshielded Twisted Pair (UTP) Cable
Unshielded twisted pair (UTP) cables are widely used in the computer and
telecommunications industry as Ethernet cables and telephone wires. a popular type of
cable that consists of two unshielded wires twisted around each other. Due to its low cost,
UTP cabling is used extensively for local-area networks (LANs) and telephone connections.
UTP cabling does not offer as high bandwidth or as good protection from interference
as coaxial or fiber optic cables, but it is less expensive and easier to
work with.
This is a plastic connector that looks like a large telephone-
style connector (see fig.2). A slot allows the RJ-45 to be inserted
only one way. RJ stands for Registered Jack, implying that the
connector follows a standard borrowed from the telephone
industry. This standard designates which wire goes with each pin
inside the connector.

Shielded Twisted Pair (STP) Cable

Shielded twisted pair (STP) cable was originally designed by IBM for token ring
networks that include two individual wires covered with a foil shielding, which prevents
electromagnetic interference, thereby transporting data faster.

STP is similar to unshielded twisted pair (UTP); however, it contains an extra foil
wrapping or copper braid jacket to help shield the cable signals from interference. STP
cables are costlier when compared to UTP, but has the advantage of being capable of
supporting higher transmission rates across longer distances.

Although UTP is the least expensive cable,


it may be susceptible to ratio and electrical
frequency interference (it should not be too close
to electric motors, fluorescent lights, etc.). if you
must place cable in environments with lots of
potential interference, or if you must place cable in
extremely sensitive environments that may be susceptible to the electrical current in the
UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the
maximum distance of the cables.
Coaxial Cable
Coaxial cable is a type of copper cable specially built
with a metal shield and other components engineered to
block signal interference. It is primarily used by cable TV
companies to connect their satellite antenna facilities to customer homes and businesses.
Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and a braided metal shield. The metal shield helps
to block any outside interference from fluorescent lights, motors, and other computers. This
cable is commonly used by television industries.
COMPUTER SYSTEMS SERVICING
K to 12 Technology and Livelihood Education
Fiber Optic Cable
Fiber optic cabling consists of a center glass
core surrounded by several layers of protective
materials. It transmits light rather than electronic
signals eliminating the problem of electrical
interference. This makes it ideal for certain environments that contain a large amount of
electrical interference. It has also made it the standard for connecting networks between
buildings, due to its immunity to the effects of moisture and lighting.

WIRELESS LANs
More and more netwoks are operating without cables, in the wireless mode. Wireless LANs
use high frequency radio signals, infrared light beams, or lasers to communicate between the
workstation, servers, or hubs. Each workstation and file server on a wireless network has some sort
of transceiver/antenna to send and receive the data. Information is relayed between transceivers
and if they were physically connected. For longer distance, wireless communications an also take
place through cellular telephone technology, microwave transmission, or by satellite.

Wireless netwoeks are great for alowing laptop computers, portable devices, or remote
computer s to connect to the LAN. Wireless networks are also beneficial in older buildings where it
may be difficult or impossible to install cables.

Cable Installation Guides


The two most common network cable:

1. Straight through cable


2. Crossover cable

1. A straight-through cable is a type of twisted pair cable that is used in local area networks
to connect a computer to a network hub such as a router. This type of cable is also
sometimes called a patch cable and is an alternative to wireless connections where one or
more computers access a router through a wireless signal.
2. A crossover cable 
A crossover cable is a type of cable installation that is used for the interconnection of two
similar devices. It is enabled by reversing the transmission and receiving pins at both ends,
so that output from one computer becomes input to the other, and vice versa.

What is RJ45

RJ45 is a type of connector commonly used


for Ethernet networking. It looks similar to a telephone jack, but is

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
slightly wider. Since Ether net cables have an RJ45 connector on each end, Ethernet cables
are sometimes also called RJ45 cables.

The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking
interface. The "45" simply refers to the number of the interface standard. Each RJ45
connector has eight pins, which means an RJ45 cable contains eight separate wires. If you
look closely at the end of an Ethernet cable, you can actually see the eight wires, which are
each a different color. Four of them are solid colors, while the other four are striped.

Wiring Standards for RJ45

1. T568A
2. T568B

Step-by-Step Procedure in Creating LAN Cable

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Before you get started, make sure you have the necessary tools, and decide whether you're
going to use Cat 5e or Cat 6 network cables.

What you'll need:

 Unshielded twisted pair (UTP) patch cable


 Modular connector (8P8C plug, aka RJ45)
 Crimping tool
 Cable tester (optional, but recommended)

There are four pairs of wires in an Ethernet cable, and an Ethernet connector (8P8C)
has eight pin slots. Each pin is identified by a number, starting from left to right, with the clip
facing away from you.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 1: Strip the cable jacket about 1.5 inch down from the
end.

Step 2: Spread the four pairs of twisted wire apart. For Cat
5e, you can use the pull string to strip the jacket farther
down if you need to, then cut the pull string. Cat 6 cables
have a spine that will also need to be cut.

Step 3: Untwist the wire pairs and neatly align them in the
T568B orientation. Be sure not to untwist them any farther
down the cable than where the jacket begins; we want to
leave as much of the cable twisted as possible.

Step 4: Use Crimping tool to cut the wires as straight as


possible, about 0.5 inch above the end of the jacket.

Step 5: Carefully insert the wires all the way into the
modular connector, making sure that each wire passes
through the appropriate guides inside the connector.

Step 6: Push the connector inside the crimping tool and


squeeze the crimper all the way down.

Step 7: Repeat steps 1-6 for the other end of the cable.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 8: To make sure you've successfully terminated each end of the cable, use a cable
tester to test each pin.

When you're all done, the connectors should look like this:

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Post-Test: How Much Have You Learned?

Post-Test LO 1 B

A. IDENTIFICATION: Identify what is being asked.

_________________1. It is the medium through which information usually moves from one network
device to another.
_________________2. These are widely used in the computer and telecommunications
industry as Ethernet cables and telephone wires.
_________________3. It is similar to unshielded twisted pair (UTP); however, it contains an
extra foil wrapping or copper braid jacket to help shield the cable signals from interference.
_________________4. A type of copper cable specially built with a metal shield and other
components engineered to block signal interference.
_________________5. It consists of a center glass core surrounded by several layers of
protective materials. It transmits light rather than electronic signals eliminating the problem
of electrical interference.
_________________6. A type of twisted pair cable that is used in local area networks to
connect a computer to a network hub such as a router.
_________________7. A type of cable installation that is used for the interconnection of two
similar devices.
_________________8. A type of connector commonly used for Ethernet networking.
_________________9. Straight-through cable code for RJ45.
_________________10. Cross Over cable code for RJ45.

B. Arrange the procedure in creating LAN Cable. Label your answer from 1(first step) to 8 (last
step).

________Carefully insert the wires all the way into the modular connector.
________Push the connector inside the crimping tool and squeeze the crimper all the way
down.
________Repeat steps 1-6 for the other end of the cable.
________Spread the four pairs of twisted wire apart.
________Strip the cable jacket about 1.5 inch down from the end.
________To make sure you've successfully terminated each end of the cable, use a cable
tester to test each pin.
________Untwist the wire pairs and neatly align them in the T568B orientation.
________Use Crimping tool to cut the wires as straight as possible.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
PERFORMANCE TEST: How Do You Apply What You Learned?

Title: Creating LAN Cable


Materials Needed:
UTP Wire/Cable
RJ45
LAN Tester
Crimping Tool

PERFORMANCE SCORE CARD

PERFORMANCE CRITERIA SCORING


1 2 3 4 5
1. Prepare/presented necessary materials to bee use
precisely.

2. Use materials according to their functions.

3. Tied the RJ45 and wire properly.

4. Test the LAN cable using LAN Tester (free from


errors).

5. Apply 5R & 3S after performing the activity.

5 - Excellently Performed
4 - Very Satisfactorily Performed
3 - Satisfactorily Performed
2 - Fairly Performed
1 - Poorly Performed

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!

REFERENCES

https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://networkencyclopedia.com/hub/
https://www.techopedia.com/definition/13454/unshielded-twisted-pair-cable-utp
https://www.webopedia.com/TERM/U/UTP.html
https://www.techopedia.com/definition/14153/shielded-twisted-pair-stp
https://www.techopedia.com/definition/13358/straight-through-cable
https://www.techopedia.com/definition/2933/crossover-cable
https://techterms.com/definition/rj45
https://www.cnet.com/how-to/how-to-make-your-own-ethernet-cable/

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Pre-Test: What Do You Already Know?

Pre-Test LO 1 C

A. MATCHING TYPE: Match the Terms in Column B with their functions in Column A.
Write the letter of your answers before every number.

Column B Column A
_____1. A wireless router is a device that
performs the functions of a router and also
includes the functions of a wireless access
point.
_____2. Multiple computers and devices
connected in the same network to access one
or more printers.
_____3. Commonly used for telephone
systems, data networks, and low-speed serial a. Host configuration
connections.
_____4.  A piece of computer hardware or b. Modular Box
software that accesses a service made available
by a server c. Network configuration
_____5. A board in a switchboard, computer,
or other device with a number of electric d. Patch Panel
sockets that may be connected in various
combinations. e. Shared Printer
_____6. - networking hardware that connects
devicesl.on a computer network by using packet f. Software configuration
switching to receive and forward data to the
destination device. g. Switch
_____7. - A Computer device that connects to
a Wi-Fi (wireless) network. h. Wi-Fi
_____8. The process of setting a network's
controls, flow and operation to support the i. Wired Client
network communication of an organization
and/or network owner. j. Wireless Client

_____9. Sets up a network connection on a k. Wireless Router


host computer/laptop by logging the default
network settings, such as IP addressing, proxy,
network name and ID/password, to enable
network connection and communication.

_____10. Any network-based software, like an


intrusion detection system (IDS), is allowed
access and provided with the appropriate
credentials to monitor network traffic.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Pre-Test: What Do You Already Know?

Pre-Test LO 1 C

B. Arrange the following procedure in Changing the Wi-Fi name and password. Label
your answer from (1 first step) to (10 last step)

_____1. Click Advanced to access the advanced router settings.


_____2. Click Change Password located along the left side
_____3. Click OK on the popup message, confirming the password change.
_____4. Click Tools at the top menu bar.
_____5. Enter the current password in the Old Password box,
_____6. Enter the new password into both the New Password and Confirm New
Password boxes.
_____7. Open a web browser,
_____8. The administrator password for the router has been successfully changed.
_____9. Type the Password as admin in the bars to login the setting page
_____10. Type 192.168.0.1 in the address bar and then press Enter.

ENUMERATION: Give at least 10 Useful Options You Can Configure in Your Router’s Web
Interface
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
DISCUSSION: INFORMATION SHEET

Patch Panel
A patch panel in a local area network (LAN) is a
mounted hardware assembly that
contains ports used to connect and manage
incoming and outgoing LAN cables. Patch
panels are also referred to as patch bays, patch
fields or jack fields and are also commonly used
in radio and television.

Patch Panel Cable Management


Neat Patch is the ultimate in patch panel rack
cable management system - a storage solution
unlike anything the network cabling world has ever
known. Its unique design enables network installers
and IT techs to store excess patch cable length in a
neat and tidy compartment that installs discretely
(and discreetly!) between patch cable distribution panels. Instead of stuffing patch cord
slack into finger duct, the end user simply coils the excess and slides it into place. Neat Patch
panel rack is compliant with telecom/Datacom industry standards, and supports proper
bend radius requirements.
Network Configuration
Network configuration is the process of setting a network's controls, flow and
operation to support the network communication of an organization and/or network owner.
This broad term incorporates multiple configuration and setup processes on network
hardware, software and other supporting devices and components.
Network configuration allows a system administrator to set up a network to meet
communication objectives. The process involves the following tasks::

 Router configuration: Specifies the correct IP addresses and route settings, etc.
 Host configuration: Sets up a network connection on a host computer/laptop by
logging the default network settings, such as IP addressing, proxy, network name and
ID/password, to enable network connection and communication.
 Software configuration: Any network-based software, like an intrusion detection
system (IDS), is allowed access and provided with the appropriate credentials to
monitor network traffic.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Moreover, network configuration includes Internet/network sharing, software
/application installation and firewall installation/configuration.
Below is an example of basic network configuration in Computer Systems Servicing.

Materials used in the diagram


Wireless Router - A wireless router is a device that performs the functions of a router and
also includes the functions of a wireless access point. It is used to provide access to the
Internet or a private computer network.
Shared Printer – Multiple computers and devices connected in the same network to access
one or more printers. Printer can be use by multiple client computers.
Modular Box - Modular connectors are commonly used for telephone systems,
data networks, and low-speed serial connections. A modular connector typically has a clear,
plastic body, with a tab that locks the plug and jack into place when connected. In the
vernacular used by the technology industry, they are called "RJ" connectors.
Wired Client -  client is a piece of computer hardware or software that accesses a service
made available by a server. The server is often (but not always) on
another computer system, in which case the client accesses the service by way of a network.
Patch Panel - a board in a switchboard, computer, or other device with a number of electric
sockets that may be connected in various combinations.
Switch - A network switch (also called switching hub, bridging hub, officially MAC
bridge) is networking hardware that connects devices on a computer network by
using packet switching to receive and forward data to the destination device.
Wireless Client - A Computer device that connects to a Wi-Fi (wireless) network.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Router
A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. Data sent through
the internet, such as a web page or email, is in the form of data packets. A packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork (e.g. the Internet) until it reaches its destination node

Router Configuration
Specifies the correct IP addresses and route settings, etc. Host configuration: Sets up
a network connection on a host computer/laptop by logging the default network settings,
such as IP addressing, proxy, network name and ID/password, to enable
network connection and communication.
How to Change the Wifi Name and Wifi Password
The cause of the change WIFI name and wireless password is to protect the wireless
network. This article will guide you how to change the Wi-Fi name and wireless password.
Part 1: Login the homepage of router
Part 2: Change the SSID and wireless password
Part 3: Reboot the router

Step-by-Step Procedure in Changing the Wifi name and Password.


Step 1: Open a web browser, type 192.168.0.1 in the address bar, and then press Enter.

Step 2: Type the Password as admin in the bars to login the setting page.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 3: Click Advanced to access the advanced router settings.

Step 4: Click Tools at the top menu bar.


Step 5: Click Change Password located along the left side.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Step 6: Enter the current password in the Old Password box, then enter the new password
into both the New Password and Confirm New Password boxes. Finally, click OK.

Step 7: Click OK on the popup message, confirming the password change. The administrator
password for the router has been successfully changed.

Router
Vs. Modem

Router

A router connects multiple networks and routes


network traffic between them. It’s really that simple. In the
case of your home network, your router has one connection
to the Internet and one connection to your private local
network. In addition, most routers also contain built-in
switches that let you connect multiple wired devices. Many
also contain wireless radios that let you connect Wi-Fi devices.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
The simple way to think about routers—especially on your home network—is like
this. The router sits in between your Internet connection and your local network. It lets you
connect multiple devices to the Internet through one physical Internet connection and also
lets those devices communicate with one another over the local network. In addition, the
router offers some protection to your devices over being exposed directly to the Internet.
To the Internet, all the traffic coming from your house looks like it’s coming from a single
device. The router keeps track of what traffic goes to which actual device on your network.

Note: you can’t connect directly to the Internet with just a router. Instead, your router must
be plugged into a device that can transmit your digital traffic over whatever type of Internet
connection you have. And that device is a modem.

Modem

Modem serves as a bridge between your local


network and the Internet. Historically, the term “modem” is
shorthand for modulator-demodulator. Modems were used
to modulate the signals on telephone lines so that digital
information could be encoded and transmitted over them and
then demodulated—and decoded—on the other end. Though
more modern broadband connections—like cable and satellite—don’t really work the same
way, we kept using the term “modem” because it’s a device people were already familiar
with and associated with connecting to the Internet.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Useful Options You Can Configure in Your Router’s Web Interface

Your wireless router has a variety of useful options you can configure. These are
practically hidden—you wouldn’t know these features exist unless you were digging through
your router’s configuration pages. But they’re worth knowing about.
Bear in mind that different routers have different options. You may not have all the
options listed here on your own router. The options will also be in different places with
different names.

1. Accessing Your Router’s Web Interface

The vast majority


of routers have web-
based configuration
pages that you can
access in your web
browser as long as you’re
on the same local
network as the router. To
access your router’s web
interface, you’ll first need
to find your router’s local
IP address (find the IP
address in your router).
In general, you can just
pop open the settings for
your network connection and look for the “default gateway,” “gateway,” or “router” entry.

Once you have the IP address, all you have to do is type it into your browser’s
address bar and hit Enter. On most routers, you’ll be asked to log in with your username and
password combination. If you don’t know these—or you’ve never changed them—your
router is probably using its default credentials. Check your router’s manual or perform a
web search for its model number and “default password.” If you’ve previously changed the
password and can’t remember it, you can reset your router’s password to the default.

Once you’ve logged in, you can now browse your router’s web-based administration
pages and configure its settings.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
2. See Who’s Connected

Your router likely provides a way to see who’s connected to your wireless network. You
can usually find this
option on a general status
page or in the wireless
section, and the feature
will be named something
like “client list,”
“connected devices,” or
similar.

If you give your devices


and computers
meaningful names, this
will help you verify that
only approved devices are
connected.

The router’s administration pages also show other information about the Internet
connection, including your external IP address (the one the Internet sees), wireless security
options, and more.

3. Wireless Channel

You can modify a variety


of wireless network settings in
your router’s web interface,
including its wireless channel.
Changing your router’s wireless
channel can speed up your Wi-Fi.
If many other wireless networks
in your area are using the same
wireless channel, interference
will result in a slower connection.

Before changing your wireless


channel, use something like Wi-Fi Analyzer for Android or the inSSIDer utility for Windows.
They’ll scan the networks in the local area and find the best wireless channel with the least
interference.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
4. Extend an Existing Network

If you need to
create a wireless network
covering a large area, one
router may not be
enough. While you can
use tools designed for
the job—like range
extenders or mesh
networks—you can also
use multiple wireless
routers if you have extras
around. But you don’t
necessarily want to
create separate wireless networks for each individual router. With the repeating feature
found on many routers, you can have the router join itself to the main network, functioning
as a repeater for that network. This allows you to create one large Wi-Fi network from many
different routers.

5. Quality of Service

Many routers contain quality


of service, or QoS, features.
QoS prioritizes traffic to give you a
better experience. For example, QoS
can reduce the network bandwidth
available to BitTorrent transfers and
prioritize web pages, preventing
your BitTorrent transfers from
slowing down your web browsing.
This is particularly useful if you have
a network with multiple people and
want to prevent one bad apple from
slowing down the entire network.
QoS features are often fairly
configurable, so you may even be
able to prioritize one computer’s
network connections over others.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
6. Dynamic DNS

If you’re hosting some


sort of server on your computer,
you’ll need to be able to connect
to that computer from over the
Internet. However, many ISPs
assign dynamic IP addresses that
change regularly. Dynamic DNS
gets around this by assigning a
special address like
yourcomputer.service.com to
your computer. Whenever your
external IP address changes, your
router will check in with the
dynamic DNS service and update
the IP address associated with
yourcomputer.service.com, so
you’ll always be able to connect to your computer there.

Routers generally have Dynamic DNS or DDNS pages where this feature can be
configured. You’ll need to create an account with a supported service and choose a
hostname first—check your router’s DDNS page for a list of supported services, and
then check out our guide to getting it all set up.

7. Port Forwarding, Port Triggering, DMZ & UPnP

Because of the way


network address
translation (NAT)
works, routers block
incoming traffic by
default. If you want to set
up a computer as a server
or use other services that
require incoming
connections—such as
peer-to-peer file transfers
or some forms of VoIP—
you may need these
incoming connections.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Routers provide a variety of ways to enable this. You can forward ports so incoming
connections on these ports will always be sent to a certain computer. You can set up port
triggering, so port forwarding will automatically be enabled whenever a program opens a
connection on a certain port. You can use a demilitarized zone (DMZ) to automatically send
all incoming connections on your network to a single computer. UPnP is also generally
enabled by default. UPnP allows programs to forward their own ports on demand,
although it isn’t very secure.

If you’re setting up port forwarding or a DMZ, you should also consider assigning a


static IP address so the internal computer’s IP address won’t change and break your port
forwarding rules. All of these options—and more—are available in your router’s web
interface.

8. Set a Network-Wide DNS Server

You can change the


DNS server for your entire
network on your router.
This allows you to enable
parental controls for every
device on your network, or
just make them use a
faster DNS server. There
are many reasons why you
might want to use a third-
party DNS server.

9. Parental
Controls, Website Blocking, and Access Scheduling

Routers often contain


parental control features,
allowing you to block certain
types of traffic or specific
websites. You also may be able
to control times when Internet
access is disabled, preventing
your children from using the
Internet at 3am. On some
routers, you may even be able
to configure this on a per-
computer basis, limiting only
specific computers. Even if your router doesn’t contain parental controls, you can still set up
parental controls by changing your DNS server to OpenDNS, as mentioned above.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
10. Reboot Your Router

Sometimes,
rebooting your
router can help fix
network issues. You
can do this by
unplugging the
router or pressing a
button on it, but the
router may be in a
hard-to-get-to
location.

You’ll usually
find a convenient button to reboot your router somewhere on its configuration pages, so
you can reset your router without even getting up.

11. For Advanced Users: Third-Party Router Firmwares

If you want more out of


your router, you can install a
variety of third-party router
firmwares. You’ll need to have a
router that’s supported by these
firmwares, so this isn’t for
everyone. In fact, if you really want
to use these router firmwares, you
should take this into account when
you buy a router and ensure it’s
compatible.

Popular router firmwares


include DD-WRT, Tomato,
and OpenWRT. These firmwares all
provide additional options that you wouldn’t normally get on your router. OpenWRT in
particular is a full embedded Linux distribution with a package manager, allowing you to
access a Linux shell and install software on your router, effectively allowing you to use it as
an always-running, low-power server.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Pre-Test: What Do You Already Know?

Post-Test LO 1 C

Column B Column A
_____1. A wireless router is a device that
performs the functions of a router and also
includes the functions of a wireless access
point.
_____2. Multiple computers and devices
connected in the same network to access one
or more printers.
_____3. Commonly used for telephone
systems, data networks, and low-speed serial m. Host configuration
connections.
_____4.  A piece of computer hardware or n. Modular Box
software that accesses a service made available
by a server o. Network configuration
_____5. A board in a switchboard, computer,
or other device with a number of electric p. Patch Panel
sockets that may be connected in various
combinations. q. Shared Printer
_____6. - networking hardware that connects
devicesx.on a computer network by using packet r. Software configuration
switching to receive and forward data to the
destination device. s. Switch
_____7. - A Computer device that connects to
a Wi-Fi (wireless) network. t. Wi-Fi
_____8. The process of setting a network's
controls, flow and operation to support the u. Wired Client
network communication of an organization
and/or network owner. v. Wireless Client

_____9. Sets up a network connection on a w. Wireless Router


host computer/laptop by logging the default
network settings, such as IP addressing, proxy,
network name and ID/password, to enable
network connection and communication.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
_____10. Any network-based software, like an intrusion detection system (IDS), is allowed
access and provided with the appropriate credentials to monitor network traffic.

Pre-Test: What Do You Already Know?

Post-Test LO 1 C

A. Arrange the following procedure in Changing the Wi-Fi name and password. Label
your answer from (1 first step) to (10 last step)

_____1. Click Advanced to access the advanced router settings.


_____2. Click Change Password located along the left side
_____3. Click OK on the popup message, confirming the password change.
_____4. Click Tools at the top menu bar.
_____5. Enter the current password in the Old Password box,
_____6. Enter the new password into both the New Password and Confirm New
Password boxes.
_____7. Open a web browser,
_____8. The administrator password for the router has been successfully changed.
_____9. Type the Password as admin in the bars to login the setting page
_____10. Type 192.168.0.1 in the address bar and then press Enter.

ENUMERATION: Give at least 10 Useful Options You Can Configure in Your Router’s Web
Interface
1.
2.
3.
4.
5.
6.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
7.
8.
9.
10.

Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!

REFERENCES

https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://www.cableorganizer.com/neat-patch/
https://www.techopedia.com/definition/25766/network-configuration
https://www.techopedia.com/definition/25766/network-configuration
https://en.wikipedia.org/wiki/Router_(computing)
https://www.microcenter.com/tech_center/article/8154/how-to-change-the-admin-pas
sword-on-the-tenda-n301-wireless-router

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Pre-Test: What Do You Already Know?

Pre-Test LO 1 D

A. ENUMERATION: enumerate the following:

a. Tests you can conduct to make sure your network is functional.

1.

2.

3.

b. Types of IP Address

1.

2.

B. Arrange the following procedures on how to set a Static IP Address. Label your answer from
1 (first step) to 5 (last step)
_________1. Right click Local Area Network and select Properties

_________2. Right Click on Wi-Fi icon (Laptop) or LAN icon (PC) at the notification bar and select
Open Network and Sharing Center

_________3. Select Change adapter settings

_________4. Select Internet Protocol Version 4 and click on Properties

_________5. Select Use the following IP address and enter the following IP Addresses

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
DISCUSSION: INFORMATION SHEET

TESTING YOUR COMPUTER NETWORK

You’ve set up all your network switches, plugged in all the cables, and configured all your
commuters. One task remains before you can declare your network finished: you must verify that
the network works as expected.

Here are few simple tests you can conduct to make sure your network is functional.

 Check the physical connections.


Check that the link light – the little red or green light next to the RJ45 port – is lit on every
computer. You must check this light both on the computer itself and on the switch or router
the computer is plugged into. If this light is not on, you have a connection problem- most
likely a bad cable.
 Verify that you can log on.
When you’re sure that physical connections are good, you should attempt to log on to each
of your network computers sing a valid domain user account.
 Check the network configuration.
Click the Start button, type CMD and press Enter. Then, enter the command ipconfig/all and
press Enter.

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
 This command will spit out numerous lines of information. The line you’re looking should
resemble this:

 Verify that the computers can ping each other


Another basic test you should perform is to use the ping command from a command prompt
to makes sure that computers on your network can contact one another.

Ping another computer (LAN only)


Click the Start button, type CMD and press Enter. Then, enter the command PING
192.168.100 and press Enter.

Ping a website (WAN-Internet)

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Click the Start button, type cmd and press Enter. Then, enter the command PING
192.168.8.100

WHAT IS IP ADDRESS?
An internet protocol address (IP address) in layman’s terms is basically the address
given to your computer when its connected to a network. Technically speaking, an IP
address is a 32-bit number that signifies the address of both the sender and receiver of
packets on a network.

The two main types of IP Address


1. Static IP Address
As the name speaks, the static IP addresses are those types of IP address that never
change once they are assigned to a device on a network. No doubt this type of addressing is
cost effective but could have a high security risk. Static IP addresses are mostly used by web,
email and gaming servers who don’t care much about hiding their locations.
2. Dynamic IP Address
On the other hand, a Dynamic IP address changes each time the device logs in to a
network. This kind of IP address is very tough to trace and are thus used by companies and
business firms.

You must be thinking as to who or what allocates this Dynamic IP address every time
the device logs in. Well, these IP address are assigned using DHCP (Dynamic Host

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
Configuration Protocol). Talking about DHCP in detail is beyond the scope of this article and
we will take it up in a future post.

How to set a Static IP Address?


Normally, your computer’s IP address has a dynamic IP Address. To find out your computer’s
Dynamic IP simply click the Start button, type cmd and press Enter. Then, enter the command
IPCONFIG and press Enter.

To permanently set it as your Static IP

1. Right Click on Wi-Fi icon (Laptop) or LAN icon (PC) at the notification bar and select Open
Network and Sharing Center

2. Select Change adapter settings 3. Right click Local Area Network and select
Properties

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
4. Select Internet Protocol Version 4 and click on Properties

5. Select Use the following IP

Note: If you change the default gateway and preferred DNS server, you will lose your internet
connection.

Post-Test: What Do You Already Know?

Pre-Test LO 1 D

A. ENUMERATION: enumerate the following:

a. Tests you can conduct to make sure your network is functional.

1.

2.

3.

b. Types of IP Address

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
1.

2.

B. Arrange the following procedures on how to set a Static IP Address. Label your answer from
1 (first step) to 5 (last step)
_________1. Right click Local Area Network and select Properties

_________2. Right Click on Wi-Fi icon (Laptop) or LAN icon (PC) at the notification bar and select
Open Network and Sharing Center

_________3. Select Change adapter settings

_________4. Select Internet Protocol Version 4 and click on Properties

_________5. Select Use the following IP address and enter the following IP Addresses

Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education
REFERENCES

https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://www.dummies.com/programming/networking/testing-your-computer-network/
https://kb.netgear.com/27476/How-do-I-set-a-static-IP-address-in-Windows
https://www.lmi.net/support/common/dsl-support/ip-addresses/

Post-Test: How Much Have You Learned?

COMPUTER SYSTEMS SERVICING


K to 12 Technology and Livelihood Education

You might also like