Professional Documents
Culture Documents
LO 1 New
LO 1 New
Learning Outcomes:
At the end of this lesson, you are expected to do
the following:
Pre-Test LO 1 A
Objectives:
1.1 Plan cable routes in accordance with network design and actual installation site
1.2 Determine cable routes in accordance with network design and actual installation
site 1.3 Identify necessary network materials in accordance with established procedures
and check against system requirements
1.4 Obtain necessary network materials in accordance with established procedures and
check against system requirements
1.5 Obtain tools, equipment, and testing devices in accordance with established
procedure
1.6 Check tools, equipment and testing devices in accordance with established
procedures
1.7 Follow OHS policies
1.8 Use appropriate PPE
1.9 Perform copper cable splicing based on Electronic Industries Alliance /
Telecommunications Industry Association (EIA/TIA) standards
1.10 Install network cables and cable raceways in accordance with established
procedures and installation requirements
1.11 Perform installation work and check for unnecessary damage that has occurred
and complies with requirements
1.12 Follow OHS standards and 5S principles according to enterprise requirements
1.13 Dispose excess components and materials based on WEEE directives and 3Rs waste
management program
Computer Networking
Computer Network is a digital telecommunications
network for sharing resources between nodes, which
are computing devices that use a common
telecommunications technology. Data transmission between
nodes is supported over data links consisting of
physical cable media, such as twisted pair or fibre-optic
cables, or by wireless methods, such as Wi-Fi, microwave
transmission, or free-space optical communication.
There are mainly three types of computer networks
based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)
1. Local area network is a group of computers connected with each other in a small place
such as school, hospital, apartment etc.
2. LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
3. LAN due to their small size are considerably faster, their speed can range anywhere from
100 to 100Mbps.
4. LANs are not limited to wire connection, there is a new evolution to the LANs that allows
local area network to work on a wireless connection.
MAN
Advantages of WAN:
Privacy: We can setup the WAN in such a way that it encrypts the data that we share
online that way the data is secure and minimises the risk of unauthorized access.
Increased Bandwidth: With the WAN we get to choose the bandwidth based on the
need, a large organization can have larger bandwidth that can carry large amount of data
faster and efficiently.
Area: A WAN can cover a large area or even a whole world though internet
connection thus we can connect with the person in another country through WAN which is
not possible is other type of computer networks.
Disadvantages of WAN:
Antivirus: Since our systems are connected with the large amount of systems, there is
possibility that we may unknowingly download the virus that can affect our system and
become threat to our privacy and may lead to data loss.
Issue resolution: Issue resolution takes time as the WAN covers large area, it is
really difficult to pin point the exact location where the issues raised and causing the
problem.
2. Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus
topology may have problem while multiple hosts sending data at the same time. Therefore,
Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to
solve the issue. It is one of the simple forms of networking where a failure of a device does
not affect the other devices. But failure of the shared communication line can make all other
devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one
direction and as soon as it reaches the extreme end, the terminator removes the data from the
line.
3. Star Topology
All hosts in Star topology are connected to a central device, known as hub device,
using a point-to-point connection. That is, there exists a point to point connection between
hosts and hub. The hub device can be any of the following:
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating
a circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring. Thus, every connection in the
ring is a point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology
has hosts in point-to-point connection with every other host or may also have hosts which
are in point-to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct
point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides the
most reliable network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host.
Hosts connect to each other in some arbitrarily fashion. This topology exists where we
need to provide reliability to some hosts out of all.
Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of
bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs,
a network is bifurcated into three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as distribution layer, which works
as mediator between upper layer and lower layer. The highest layer is known as core layer,
and is central point of the network, i.e. root of the tree from which all nodes fork.
All neighboring
hosts have point-to-point connection between them. Similar to the Bus topology, if the root
goes down, then the entire network suffers even. Though it is not the single point of failure.
Every connection serves as point of failure, failing of which divides the network into
unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all
hosts are connected to two hosts only, except the end hosts.Means, if the end hosts in daisy
chain are connected then it represents Ring topology.
Each link in
daisy chain topology represents single point of failure. Every link failure splits the network
into two segments. Every intermediate host works as relay for its immediate hosts.
Hybrid Topology
What is Internet
Internet is a global network that
connects computer networks worldwide. It
is a massive network of networks. It uses the
TCP/IP protocol for data transmission. Users
can share information instantly with the help
of the internet. It allows sharing resources
and providing services such as file
sharing, World Wide Web and electronic
mailing. In the internet, desktop computers,
routers, switches and other devices are
connected to each other using cables or
through a wireless network or more
advanced technology such as fiber optics.
Internet is one of the most vital and
effective communication methods in today’s world. It is helpful in almost all the fields such
as business, education, medicine, media, etc. It is an excellent source of information for the
user.
What is Ethernet
Ethernet provides a standard way to
connect the computers to the network through a
wired connection. It is an interface that connects
multiple devices such as computer and switches.
It is used for Local Area Networks which is a
network limited to a small geographical area.
Network Hardware
Network Interface Card (NIC) is a hardware component
without which a computer cannot be connected over
a network. It is a circuit board installed in a computer
that provides a dedicated network connection to the
computer. It is also called network interface
controller, network adapter or LAN adapter.
Network Hub – Also called hub, is a common connection
point for devices in a network. Hubs are devices
Kinds of Hubs
Standalone Hubs - usually include some method of linking them to other standalone
hubs for network expansion. Standalone hubs are usually
the least expensive type of hub, and are best suited for
small, independent workgroups, departments, or offices,
typically with fewer than 12 users per LAN.
Post-Test LO 1 A
Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!
https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://www.tutorialspoint.com/what-is-network-interface-card-nic
https://pediaa.com/what-is-the-difference-between-internet-and-ethernet/
https://www.webopedia.com/quick_ref/topologies.asp
Pre-Test LO 1 B
_________________1. It is the medium through which information usually moves from one
network device to another.
_________________2. These are widely used in the computer and telecommunications
industry as Ethernet cables and telephone wires.
_________________3. It is similar to unshielded twisted pair (UTP); however, it contains an
extra foil wrapping or copper braid jacket to help shield the cable signals from interference.
_________________4. A type of copper cable specially built with a metal shield and other
components engineered to block signal interference.
B. Arrange the procedure in creating LAN Cable. Label your answer from 1(first step) to 8 (last
step).
________Carefully insert the wires all the way into the modular connector.
________Push the connector inside the crimping tool and squeeze the crimper all the way
down.
________Repeat steps 1-6 for the other end of the cable.
________Spread the four pairs of twisted wire apart.
________Strip the cable jacket about 1.5 inch down from the end.
________To make sure you've successfully terminated each end of the cable, use a cable
tester to test each pin.
________Untwist the wire pairs and neatly align them in the T568B orientation.
________Use Crimping tool to cut the wires as straight as possible.
NETWORK CABLE
Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some cases, a
network will utilize only one type of cable, other networks will use a variety of cable types. The type
of cable chosen for a network is related to the network’s topology, protocol, and size. Understanding
the characteristics of different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.
Shielded twisted pair (STP) cable was originally designed by IBM for token ring
networks that include two individual wires covered with a foil shielding, which prevents
electromagnetic interference, thereby transporting data faster.
STP is similar to unshielded twisted pair (UTP); however, it contains an extra foil
wrapping or copper braid jacket to help shield the cable signals from interference. STP
cables are costlier when compared to UTP, but has the advantage of being capable of
supporting higher transmission rates across longer distances.
WIRELESS LANs
More and more netwoks are operating without cables, in the wireless mode. Wireless LANs
use high frequency radio signals, infrared light beams, or lasers to communicate between the
workstation, servers, or hubs. Each workstation and file server on a wireless network has some sort
of transceiver/antenna to send and receive the data. Information is relayed between transceivers
and if they were physically connected. For longer distance, wireless communications an also take
place through cellular telephone technology, microwave transmission, or by satellite.
Wireless netwoeks are great for alowing laptop computers, portable devices, or remote
computer s to connect to the LAN. Wireless networks are also beneficial in older buildings where it
may be difficult or impossible to install cables.
1. A straight-through cable is a type of twisted pair cable that is used in local area networks
to connect a computer to a network hub such as a router. This type of cable is also
sometimes called a patch cable and is an alternative to wireless connections where one or
more computers access a router through a wireless signal.
2. A crossover cable
A crossover cable is a type of cable installation that is used for the interconnection of two
similar devices. It is enabled by reversing the transmission and receiving pins at both ends,
so that output from one computer becomes input to the other, and vice versa.
What is RJ45
The "RJ" in RJ45 stands for "registered jack," since it is a standardized networking
interface. The "45" simply refers to the number of the interface standard. Each RJ45
connector has eight pins, which means an RJ45 cable contains eight separate wires. If you
look closely at the end of an Ethernet cable, you can actually see the eight wires, which are
each a different color. Four of them are solid colors, while the other four are striped.
1. T568A
2. T568B
There are four pairs of wires in an Ethernet cable, and an Ethernet connector (8P8C)
has eight pin slots. Each pin is identified by a number, starting from left to right, with the clip
facing away from you.
Step 2: Spread the four pairs of twisted wire apart. For Cat
5e, you can use the pull string to strip the jacket farther
down if you need to, then cut the pull string. Cat 6 cables
have a spine that will also need to be cut.
Step 3: Untwist the wire pairs and neatly align them in the
T568B orientation. Be sure not to untwist them any farther
down the cable than where the jacket begins; we want to
leave as much of the cable twisted as possible.
Step 5: Carefully insert the wires all the way into the
modular connector, making sure that each wire passes
through the appropriate guides inside the connector.
Step 7: Repeat steps 1-6 for the other end of the cable.
When you're all done, the connectors should look like this:
Post-Test LO 1 B
_________________1. It is the medium through which information usually moves from one network
device to another.
_________________2. These are widely used in the computer and telecommunications
industry as Ethernet cables and telephone wires.
_________________3. It is similar to unshielded twisted pair (UTP); however, it contains an
extra foil wrapping or copper braid jacket to help shield the cable signals from interference.
_________________4. A type of copper cable specially built with a metal shield and other
components engineered to block signal interference.
_________________5. It consists of a center glass core surrounded by several layers of
protective materials. It transmits light rather than electronic signals eliminating the problem
of electrical interference.
_________________6. A type of twisted pair cable that is used in local area networks to
connect a computer to a network hub such as a router.
_________________7. A type of cable installation that is used for the interconnection of two
similar devices.
_________________8. A type of connector commonly used for Ethernet networking.
_________________9. Straight-through cable code for RJ45.
_________________10. Cross Over cable code for RJ45.
B. Arrange the procedure in creating LAN Cable. Label your answer from 1(first step) to 8 (last
step).
________Carefully insert the wires all the way into the modular connector.
________Push the connector inside the crimping tool and squeeze the crimper all the way
down.
________Repeat steps 1-6 for the other end of the cable.
________Spread the four pairs of twisted wire apart.
________Strip the cable jacket about 1.5 inch down from the end.
________To make sure you've successfully terminated each end of the cable, use a cable
tester to test each pin.
________Untwist the wire pairs and neatly align them in the T568B orientation.
________Use Crimping tool to cut the wires as straight as possible.
5 - Excellently Performed
4 - Very Satisfactorily Performed
3 - Satisfactorily Performed
2 - Fairly Performed
1 - Poorly Performed
REFERENCES
https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://networkencyclopedia.com/hub/
https://www.techopedia.com/definition/13454/unshielded-twisted-pair-cable-utp
https://www.webopedia.com/TERM/U/UTP.html
https://www.techopedia.com/definition/14153/shielded-twisted-pair-stp
https://www.techopedia.com/definition/13358/straight-through-cable
https://www.techopedia.com/definition/2933/crossover-cable
https://techterms.com/definition/rj45
https://www.cnet.com/how-to/how-to-make-your-own-ethernet-cable/
Pre-Test LO 1 C
A. MATCHING TYPE: Match the Terms in Column B with their functions in Column A.
Write the letter of your answers before every number.
Column B Column A
_____1. A wireless router is a device that
performs the functions of a router and also
includes the functions of a wireless access
point.
_____2. Multiple computers and devices
connected in the same network to access one
or more printers.
_____3. Commonly used for telephone
systems, data networks, and low-speed serial a. Host configuration
connections.
_____4. A piece of computer hardware or b. Modular Box
software that accesses a service made available
by a server c. Network configuration
_____5. A board in a switchboard, computer,
or other device with a number of electric d. Patch Panel
sockets that may be connected in various
combinations. e. Shared Printer
_____6. - networking hardware that connects
devicesl.on a computer network by using packet f. Software configuration
switching to receive and forward data to the
destination device. g. Switch
_____7. - A Computer device that connects to
a Wi-Fi (wireless) network. h. Wi-Fi
_____8. The process of setting a network's
controls, flow and operation to support the i. Wired Client
network communication of an organization
and/or network owner. j. Wireless Client
Pre-Test LO 1 C
B. Arrange the following procedure in Changing the Wi-Fi name and password. Label
your answer from (1 first step) to (10 last step)
ENUMERATION: Give at least 10 Useful Options You Can Configure in Your Router’s Web
Interface
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Patch Panel
A patch panel in a local area network (LAN) is a
mounted hardware assembly that
contains ports used to connect and manage
incoming and outgoing LAN cables. Patch
panels are also referred to as patch bays, patch
fields or jack fields and are also commonly used
in radio and television.
Router configuration: Specifies the correct IP addresses and route settings, etc.
Host configuration: Sets up a network connection on a host computer/laptop by
logging the default network settings, such as IP addressing, proxy, network name and
ID/password, to enable network connection and communication.
Software configuration: Any network-based software, like an intrusion detection
system (IDS), is allowed access and provided with the appropriate credentials to
monitor network traffic.
Router Configuration
Specifies the correct IP addresses and route settings, etc. Host configuration: Sets up
a network connection on a host computer/laptop by logging the default network settings,
such as IP addressing, proxy, network name and ID/password, to enable
network connection and communication.
How to Change the Wifi Name and Wifi Password
The cause of the change WIFI name and wireless password is to protect the wireless
network. This article will guide you how to change the Wi-Fi name and wireless password.
Part 1: Login the homepage of router
Part 2: Change the SSID and wireless password
Part 3: Reboot the router
Step 2: Type the Password as admin in the bars to login the setting page.
Step 7: Click OK on the popup message, confirming the password change. The administrator
password for the router has been successfully changed.
Router
Vs. Modem
Router
Note: you can’t connect directly to the Internet with just a router. Instead, your router must
be plugged into a device that can transmit your digital traffic over whatever type of Internet
connection you have. And that device is a modem.
Modem
Your wireless router has a variety of useful options you can configure. These are
practically hidden—you wouldn’t know these features exist unless you were digging through
your router’s configuration pages. But they’re worth knowing about.
Bear in mind that different routers have different options. You may not have all the
options listed here on your own router. The options will also be in different places with
different names.
Once you have the IP address, all you have to do is type it into your browser’s
address bar and hit Enter. On most routers, you’ll be asked to log in with your username and
password combination. If you don’t know these—or you’ve never changed them—your
router is probably using its default credentials. Check your router’s manual or perform a
web search for its model number and “default password.” If you’ve previously changed the
password and can’t remember it, you can reset your router’s password to the default.
Once you’ve logged in, you can now browse your router’s web-based administration
pages and configure its settings.
Your router likely provides a way to see who’s connected to your wireless network. You
can usually find this
option on a general status
page or in the wireless
section, and the feature
will be named something
like “client list,”
“connected devices,” or
similar.
The router’s administration pages also show other information about the Internet
connection, including your external IP address (the one the Internet sees), wireless security
options, and more.
3. Wireless Channel
If you need to
create a wireless network
covering a large area, one
router may not be
enough. While you can
use tools designed for
the job—like range
extenders or mesh
networks—you can also
use multiple wireless
routers if you have extras
around. But you don’t
necessarily want to
create separate wireless networks for each individual router. With the repeating feature
found on many routers, you can have the router join itself to the main network, functioning
as a repeater for that network. This allows you to create one large Wi-Fi network from many
different routers.
5. Quality of Service
Routers generally have Dynamic DNS or DDNS pages where this feature can be
configured. You’ll need to create an account with a supported service and choose a
hostname first—check your router’s DDNS page for a list of supported services, and
then check out our guide to getting it all set up.
9. Parental
Controls, Website Blocking, and Access Scheduling
Sometimes,
rebooting your
router can help fix
network issues. You
can do this by
unplugging the
router or pressing a
button on it, but the
router may be in a
hard-to-get-to
location.
You’ll usually
find a convenient button to reboot your router somewhere on its configuration pages, so
you can reset your router without even getting up.
Post-Test LO 1 C
Column B Column A
_____1. A wireless router is a device that
performs the functions of a router and also
includes the functions of a wireless access
point.
_____2. Multiple computers and devices
connected in the same network to access one
or more printers.
_____3. Commonly used for telephone
systems, data networks, and low-speed serial m. Host configuration
connections.
_____4. A piece of computer hardware or n. Modular Box
software that accesses a service made available
by a server o. Network configuration
_____5. A board in a switchboard, computer,
or other device with a number of electric p. Patch Panel
sockets that may be connected in various
combinations. q. Shared Printer
_____6. - networking hardware that connects
devicesx.on a computer network by using packet r. Software configuration
switching to receive and forward data to the
destination device. s. Switch
_____7. - A Computer device that connects to
a Wi-Fi (wireless) network. t. Wi-Fi
_____8. The process of setting a network's
controls, flow and operation to support the u. Wired Client
network communication of an organization
and/or network owner. v. Wireless Client
Post-Test LO 1 C
A. Arrange the following procedure in Changing the Wi-Fi name and password. Label
your answer from (1 first step) to (10 last step)
ENUMERATION: Give at least 10 Useful Options You Can Configure in Your Router’s Web
Interface
1.
2.
3.
4.
5.
6.
Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!
REFERENCES
https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://www.cableorganizer.com/neat-patch/
https://www.techopedia.com/definition/25766/network-configuration
https://www.techopedia.com/definition/25766/network-configuration
https://en.wikipedia.org/wiki/Router_(computing)
https://www.microcenter.com/tech_center/article/8154/how-to-change-the-admin-pas
sword-on-the-tenda-n301-wireless-router
Pre-Test LO 1 D
1.
2.
3.
b. Types of IP Address
1.
2.
B. Arrange the following procedures on how to set a Static IP Address. Label your answer from
1 (first step) to 5 (last step)
_________1. Right click Local Area Network and select Properties
_________2. Right Click on Wi-Fi icon (Laptop) or LAN icon (PC) at the notification bar and select
Open Network and Sharing Center
_________5. Select Use the following IP address and enter the following IP Addresses
You’ve set up all your network switches, plugged in all the cables, and configured all your
commuters. One task remains before you can declare your network finished: you must verify that
the network works as expected.
Here are few simple tests you can conduct to make sure your network is functional.
WHAT IS IP ADDRESS?
An internet protocol address (IP address) in layman’s terms is basically the address
given to your computer when its connected to a network. Technically speaking, an IP
address is a 32-bit number that signifies the address of both the sender and receiver of
packets on a network.
You must be thinking as to who or what allocates this Dynamic IP address every time
the device logs in. Well, these IP address are assigned using DHCP (Dynamic Host
1. Right Click on Wi-Fi icon (Laptop) or LAN icon (PC) at the notification bar and select Open
Network and Sharing Center
2. Select Change adapter settings 3. Right click Local Area Network and select
Properties
Note: If you change the default gateway and preferred DNS server, you will lose your internet
connection.
Pre-Test LO 1 D
1.
2.
3.
b. Types of IP Address
2.
B. Arrange the following procedures on how to set a Static IP Address. Label your answer from
1 (first step) to 5 (last step)
_________1. Right click Local Area Network and select Properties
_________2. Right Click on Wi-Fi icon (Laptop) or LAN icon (PC) at the notification bar and select
Open Network and Sharing Center
_________5. Select Use the following IP address and enter the following IP Addresses
Congratulations!
You did a great job! Rest and relax while then
move on to the next lesson. Good Luck!
https://www.deped.gov.ph/wp-content/uploads/2019/01/Computer-Systems-Se
rvicing-NC-II-CG.pdf
https://tesda.gov.ph/Download/Training_Regulations?Searchcat=Training%20Re
gulations
https://www.dummies.com/programming/networking/testing-your-computer-network/
https://kb.netgear.com/27476/How-do-I-set-a-static-IP-address-in-Windows
https://www.lmi.net/support/common/dsl-support/ip-addresses/