Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

LO 2.

Set Network Configuration (TLE_IACSS9- 12SUCN-Ia-e-34)


HOW TO USE THIS MODULE

Welcome to the Module “SET-UP COMPUTER NETWORKS”. This module


contains training materials and activities for you to complete.

The unit of competency “SETTING-UP COMPUTER NETWORKS” contains


knowledge, skills and attitudes required for a Computer System Servicing NC II
course.

You are required to go through a series of learning activities in order to


complete each of the learning outcomes of the module. In each learning outcome
there are Information Sheets, Task Sheets, and Job Sheets. Follow these activities
on your own and answer the Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your Trainer for assistance.

Recognition of Prior Learning (RPL)


You may already have some of the knowledge and skills covered in this module
because you have:
➢ Been working for some time
➢ Already have completed training in this area.

If you can demonstrate to your Trainer that you are competent in a particular
skill or skills, talk to him/her about having them formally recognized so you don’t
have to do the same training again. If you have a qualification or Certificate of
Competency from previous trainings show it to your teacher. If the skills you
acquired are still current and relevant to this module, they may become part of the
evidence you can present for RPL. If you are not sure about the currency of your
skills, discuss it with your Trainer.

After completing this module ask your Trainer to assess your competency.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome may
have more than one learning activity.
Program/Course : COMPUTER SYSTEM SERVICING NC II
Unit of Competency : SET-UP COMPUTER NETWORKS
Module : SETTING-UP COMPUTER NETWORKS

INTRODUCTION:

This module contains information and suggested learning activities on


Computer System Servicing NCII. It includes activities and materials on Setting up
Computer Network.

Completion of this module will help you better understand the succeeding
module on the SETTING-UP COMPUTER SERVERS.

This module consists of 3 learning outcomes. Each learning outcome contains


learning activities supported by each instruction sheets. Before you perform the
instructions, read the information sheets and answer the self-check and activities
provided to ascertain to yourself and your trainer that you have acquired the
knowledge necessary to perform the skill portion of the particular learning outcome.

Upon completion of this module, report to your trainer for assessment to check
your achievement of knowledge and skills requirement of this module. If you pass
the assessment, you will be given a certificate of completion.

LEARNING OUTCOMES
At the end of this lesson, learners are expected to:
LO 1. Install Network Cables (TLE_IACSS9-12SUCN-IVa-j-33);
LO 2. Set Network Configuration (TLE_IACSS9- 12SUCN-Ia-e-34) ; and
LO 3. Set Router/Wi-Fi/Wireless Access Point/Repeater Configuration.
ASSESSMENT CRITERIA:

1. Check network connectivity of each terminal in accordance with network


design
2. Diagnose and repair any problem or fault in the network system in line with
standard operating procedures
3. Configure Network Interface Card (NIC) in accordance with the network
design
4. Carry out communication check between terminals in accordance with
operating systems network configuration guides
5. Respond to unplanned events or conditions in accordance with established
procedures
Information Sheets

In this information sheet, you will learn the fundamentals of network configuration, which
will be necessary in understanding the following discussions.

NETWORK CONFIGURATION OUTLINE:


As discussed in the previous Learning Outcomes, we need to consider the size and geographical
area of the network. The network configuration and the manner by which computers share
information in a network determine whether the network should be peer-to-peer or server-based
(another important network classification).

PEER-TO-PEER NETWORK VS SERVER-BASED NETWORK


Peer-to-Peer Network:
In this type of network, a group of computers are connected to each other so that
users can share resources and information. There are no hierarchies, and no device
serves as a central station or location for security and file
storage, or as a source of other network management services.
This means that it is only required to log in to every computer
when a user needs it to access files shared by another
computer.
This kind of network is applicable if:
1. your network has fewer than 10 users;
2. users share resources such as files, folders, and printer/scanners, but no
dedicated servers exist;
3. security and levels of access are not needed; and
4. your organization and network will only have a limited growth in number of users.
Server-Based Network:
Also known as a Client/Server Network, a server-based network utilizes a
dedicated server that serves as the central location for network management and
services. The server computer controls the level of access
each user has, which makes this type of network more
secure. Other security procedures can be done to increase
the integrity of a network. In a server-based network, the
shared data is saved in one central location, which makes it
easier to access, backup and protect shared data.

NOTE: Computers that are connected to a server-based network are called client
computers, hence the name client/server. In this kind of network, computer clients who
want to access shared data must login with their designated username and password.
Information Sheets

In network configuration, you need to learn how to identify the correct subnet mask that
can accommodate the number of devices that will connect to your network.
In this information sheet, you will learn how to compute for the subnet, what the range of
usable IP addresses for the hosts is, and other concepts related to DNS and IP addressing.

What is Internet Protocol (IP)?


Internet Protocol (IP) is the basic network protocol by which data is sent over the
internet or across networks. It gives computers on a network a unique address,
which is called an IP address. IP is also known as TCP/IP because it is often used
with the Transport Control Protocol (TCP), which is a higher-level protocol. All
internet software applications commonly used by people on Web browsers and email
programs require IP. Because IP functions at the third level of the OSI model, it can
rely on data link interfaces such as Wi-Fi and Ethernet.

Before anything else, let us discuss a few terms and concepts you need to know for
you to perform IP addressing and subnetting:
1. IP address – a unique 32-bit number that represents a device or interface (ex.
a network interface card) either on your intranet or on the internet. These
addresses are normally expressed in dotted-decimal format, with four groups
of number separated by dots. An IP address is actually composed of binary
numbers but for convenience, it is usually expressed in decimal format.
2. Subnet – logical subdivision of a larger network
3. Subnet mask/CIDR/Default subnet – 32-bit number that masks an IP
address, and breaks the IP address into a network address and a host address.
It is made by setting all network bits to 1s and setting all host bits to 0s.
4. Subnetting – the process of dividing a large network into smaller networks by
adding “1s” to the network bits in a subnet mask.
5. Host – a computer or device connected to the network.
6. Network Address – the address where the hosts are connected.
7. Default Gateway – a default access point or IP router that a network host or
computer uses to send information to another network or the internet.
8. DHCP – hands out IP addresses to hosts and keeps addresses unique. It also
provides a database of addresses statically away from the administrators.
9. Private IP Addresses – special non-routable IP addresses that are used in the
Intranet. These addresses need to be translated to public internet IP addresses
when the device needs to talk to the internet.
10. CIDR Prefix/Notation (Classless Inter-Domain Routing Prefix) – the shorter
representation of an IP address and its associated routing prefix. It is
composed of a slash (/) and a decimal number. The decimal number is the
number of 1s in a subnet mask.
For example:
Given Subnet Mask:
255.255.255.0 = 11111111.11111111.11111111.00000000

NOTE: Count the 1s, there are 8 bits per group/octet, and the first three groups are
all 1, so there are 24 1s all in all, therefore we have a “/24” or in verbal “CIDR twenty
four” or “slash twenty four”.

IPv4 and IPv6 Addressing:


An IP address is an address used in order to uniquely identify a device on an IP
network. The address is made up of 32 binary bits, which can be divisible into a
network portion and host portion with the help of a subnet mask. The 32 binary
bits are broken into four octets (1 octet = 8 bits).

Each octet is converted to decimal and


separated by a period (dot). For this reason,
an IP address is said to be expressed in
dotted decimal format (for example,
172.16.81.100). The value in each octet
ranges from 0 to 255 decimal, or 00000000
– 11111111 binary.
Classes of IP Address:
The internet community originally defined five address classes to accommodate
networks of varying sizes. Microsoft TCP/IP supports class A, B, and C addresses
assigned to hosts. The class of address defines which bits are used for the network
ID and which bits are used for the host ID. It also defines the possible number of
networks and the number of hosts per network.

CLASS A
Class A addresses are assigned to networks with a very large number of hosts. The
high order bit in a Class A address is always set to zero or binary 0.

The next seven bits (completing the first octet)


complete the network ID. The remaining 24
bits (the last three octets) represent the host
ID. This allows for 126 networks and
16,777,214 hosts per network.

CLASS B
Class B addresses are assigned to medium-
sized to large-sized networks. The two high-
order bits in a Class B address are always set
to binary 10.

CLASS C
Class C addresses are used for small networks.
The three high-order bits in a networks. The three
high-order bits in a Class C address are always
set to binary 101.
CLASS D
Class D addresses are reserved for IP multicast addresses. The four high-order bits
in a Class D address are always set to binary 1110. The remaining bits are for the
address that interested hosts recognize. Class D addresses for applications to
multicast data to multicast-capable hosts on an internetwork.

CLASS E
Class E addresses is an experimental address that is reserved for future use. The
high-order bits in a Class E address are set to binary 1111.

To identify the class of an IP address get the first octet or first group of numbers of
the IP address and check the ranged specified in the table.

For example.
Given IP Address: 11.20.30.1 → first octet is 11
Therefore, the given IP Address is a Class A.

These are reserved and cannot be used to assign IP address to interfaces.


• 0 is the default route so it is not used.
• Ranges 127.x.x.x are reserved for the loopback addresses or localhost.
127.0.0.1 is an example of a loopback address.
• 255.255.255.255 is your IP broadcast address.

You need to remember the ranges, classes, and subnet masks mentioned in the
table above. They will be necessary in identifying the ideal subnet masks depending
on the number of hosts or users your network will have.

A common question in laying out a network is “What subnet mask do I need to


use for the network?”.

STEP 1. Identify the current number of hosts of the network and estimate the growth
of number of users in the future.

The number of hosts, of course includes all devices that are to be connected to your
network. Computers network cards, printers, and other network devices are
included in this estimation. Say today, you have a network with 10 hosts and you
think in the near future, your network will have 300 hosts.

STEP 2. Assume a subnet mask depending on the identified required numbers of


host.

Now, say you have the IP address space 192.168.0.0. We can assume that with
only 10 hosts, it is best to use the Class C’s 255.255.255.0 as your subnet mask.
This means you will have 192.168.0.x as your network ID and x.x.x.0 – 255 hosts.
Before you use that subnet mask, check if it fits the requirements. Remember you
need a subnet mask that will be able to accommodate 10 to 300 hosts.

To check the subnet mask, use the host’s formula (# of hosts = 2n – 2) to identify
how many hosts will be allowed on a network for a certain subnet mask. n is the
number of 0s in the subnet mask, in its binary notation.

STEP 3. Convert the subnet mask to binary notation.

Again, an IP address or subnet mask, is actually a 32-bit number that is divided


into four groups called octets (8-bit or octet). We usually see IP addresses in its
decimal format, like for example, 255.255.255.255.

This is also equivalent to 11111111.11111111.11111111.11111111 in binary


notation.

For you to distinguish the number of hosts allowed in your assumed subnet (which
is 255.255.255.0), convert it first into binary.

(NOTE: For decimal to binary conversion, please refer to your Computer System
Servicing Lesson in Grade 11 CSS Module)

IPv6 ADDRESSING
In the early 1990s, the IETF realized that a new version of IP would be needed, and
the Task Force started by drafting the new protocol’s requirements. IP Next
Generation (IPng) was created, which then became IPv6 (RFC 1883) IPv6 provides
several improvements over its predecessor.
The following list summarizes the characteristics of IPv6 and the improvements it
can deliver.
Larger address space: Multicast: increased use Quality of Service (QoS)
increased address size of efficient one-to-many capabilities: QoS
from 32 bits to 128 bits communications markings of packets and
flow labels that help
identify priority traffic
Streamlined Protocol Jumbograms: The ability Anycast: Redundant
header: improves packet- to have very large packet services using non-unique
forwarding efficiency payloads for greater addresses
efficiency
Stateless Network Layer Security: Mobility: Simpler
Autoconfiguration: The Encryption and handling of mobile or
ability for nodes to authentication of roaming nodes
determine their own communication
address
IPv6 addresses are 128 bits long. They are logically divided into a network prefix
and a host identifier. The number of bits in the network prefix is represented by a
prefix length (for example, /64).

The remaining bits are used for the host identifier. If you do not specify a prefix
length for an IPv6 address, the default prefix length is /64.

SELF-CHECK 1.1: Direction: Multiple Choice. Chose the correct answer in the answer sheets found
in a separate paper. (Note: You are not allowed to use another paper, avoid erasures)
Information Sheets

Network Administrators often need to divide networks, especially large


networks, into subnetworks, or subnets, to provide scalability. This topic describes
the purposes and functions of subnets and their addressing schemes.

SUBNETS
There can be problems within a single broadcast domain.
• The domain relies on MAC Addresses for packet delivery.
• Larger amounts of broadcast traffic consume resources.
• All devices share the same broadcast domain.

A subnet segments the hosts within the network. Without subnets, the network has
a flat topology. A flat topology has a short routing table and relies on MAC addresses
to deliver packets. MAC addresses have no hierarchical structure. As the network
grows, the use of the network bandwidth becomes less efficient.

Solution: Subnetworks
• Smaller networks are easier to manage.
• Overall traffic is reduced.
• You can apply network security policies more easily.
The advantages of subnetting a network are as follows:
• Smaller networks are easier to manage and map to geographical or functional
requirements.
• Overall network traffic is reduced, which can improve performance.
• You can more easily apply network security measures at the interconnections
between subnets than within a large single network.

SUBNET MASKS:
A subnet masks:
• Defines the number of bits that represented the network and subnet part of
the address.
• Used by end systems to identify the destination IP address as either local or
remote.
• Used by Layer 3 devices to determine network path.

Octet Values of a Subnet Mask:


• Subnet masks, like IP addresses, are represented in the dotted decimal format,
such as 255.255.255.0.
• The binary 1 reflects the network and subnetwork part of the IP address.
Usable Subnetworks and Hosts:
One of the decisions you must make when creating subnets is to determine the
optimal number of subnets and hosts.
Consider a Class B network address in which 16-bits are used for the network ID
and 16-bits are used for the host ID. Therefore, there are 65,536 (216) possible
addresses that are available to assign to hosts. Of these, 65,534 are usable
addresses after subtracting the two addresses that cannot be used----the broadcast
and subnet addresses.

Now, imagine that this Class B network is divided into subnets. If 2-bits are
borrowed from the default 16-bit host field, the size of the host field decreases to
14-bits. All possible combinations of 0s and 1s that could occur in the remaining
14-bits produce a total number of possible hosts that could be assigned in each
subnet. Thus, the number of hosts that are assigned to each subnet is now 16,382.

In the same Class B network, if 3-bits are borrowed, the size of the host field
decreases to 13-bits, and the total number of assignable hosts for each subnet
decreases to 8,192 (213). The number of usable host numbers decreases to 8,190
(8,192 – 2). This last example shows six (8 – 2) usable subnets in a Class B network.
Each of these six subnets can have 8,190 (8,192 – 2) usable host addresses.

A common question in laying out a network is “What subnet mask do I need to


use for the network?”.
STEP 1. Identify the current number of hosts of the network and estimate the growth
of number of users in the future.
STEP 2. Assume a subnet mask depending on the identified required numbers of
host.

For you to distinguish the number of hosts allowed in your assumed subnet (which
is 255.255.255.0), convert it first into binary.
This is equivalent to: 11111111.11111111.11111111.00000000 in binary notation.
STEP 3. Count the “0”s in the binary notation of your subnet mask.

That number of “1”s is the CIDR or your subnet mask. In this subnet mask, we have
24 “1”s, so we have CIDR 24 or /24. (CIDR is the count of all “1”s in the subnet
masks in its binary notation?.

STEP 4. Use the host’s formula to compute the number of hosts that can connect using
the subnet mask you assumed.

The host formula is: # of hosts available = 2n – 2, where n is the number of 0s in


your subnet mask.

For Example:
Given: n = eight 0s
# of hosts available = 28 – 2 = 256 – 2, therefore:
# of hosts available is = 254 hosts available
254 hosts can connect to the network with a subnet mask of 255.255.255.0

STEP 5. Verify if the number of hosts available complies with the initial requirements
(10 – 100 hosts). The subnet mask you assumed suits the 10-user network now but
does not comply with the future 300-user requirement.

Now that you know that 255.255.255.0, or /24, does not provide our required
number of hosts. It is best to prepare a future-proof subnet mask for the first time
you set up a network. This prevents you from returning back later to change all IP
addresses on the network.

STEP 6. Now to fix that, if you noticed, if you add 1s to the subnet mask, meaning
from: 11111111.11111111.11111111.00000000 = 255.255.255.0 = 254 hosts

Then add “1”:


11111111.11111111.11111111.10000000 = 255.255.255.128 = 125 hosts
the number of hosts available is lessened. So instead, take away 1s from the subnet
mask, to get more hosts.

11111111.11111111.11111111.00000000 = 255.255.255.0 = 254 hosts

Then add “1”:


11111111.11111111.11111110.00000000 = 255.255.254.0 = 510 hosts

Again, this number of hosts is computed using formula # of hosts available = 2n – 2

Now, with subnet mask 255.255.254.0, or 192.168.0.0/23, you have reached, even
exceeded the requirement of 300 hosts.
Considering this information, you already know the following:
a. the most efficient subnet mask for your network is 255.255.254.0
b. valid hosts are from 192.168.0.1 to 192.168.1.254
c. the broadcast address is 192.168.1.255
d. subnet mask 255.255.254.0 has 510 usable hosts

SUMMARY OF IP ADDRESS CLASSES AND SUBNET MASKS


CLASS Range Subnet Mask & CIDR Prefix Network ID Host ID Available Available Hosts
(1st Octet) Portion Portion Address
A 1-126 255.0.0 or /8 w x.y.z 126 16,777,214
B 128-191 255.255.0.0 or /16 w.x y.z 16,384 65,534
C 192-223 255.255.255.0 or /24 w.x.y z 2,097,152 254

VERSION OF IP ADDRESSES
Currently, there are two versions of IP that are in widespread use, namely Internet
Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). IPv4 provides about
4.3 billion IP addresses that are 32 bits long, while IPv6 provides trillions more that
are 128 bits long.

Data on an IP is allocated into messages called packets (or datagrams). These


packets contain a header, which includes information such as the source and the
destination of the message, and the actual message, data. The base header is 5
longwords (20 bytes) long, not including additional header options, and is followed
by data. IP does not have its own datagram footer.

SELF-CHECK 1.2: Direction: Fill the blanks with your correct answers in the answer sheets found in a
separate paper. (Note: You are not allowed to use another paper, avoid erasures)

ACTIVITY SHEET
In a sheet of paper, try to compute for the ideal subnet mask for the following
requirements. Show your solution.

Use 192.168.0.0 as your IP address space.


1. ABC company requires a network with 1000 hosts. Identify the following:
a. Ideal subnet mask - <255.255.252.0>
b. CIDR /n - </23> slash is required
c. Number of usable hosts - <1020>
d. Usable IP address range for the hosts - <192.168.0.1 to 192.168.3.254>
Information Sheets

In this information sheet, you will familiarize yourself with the common
concepts and ideas behind the Domain Name System and some basic DNS network
configurations. This information sheet is essential for the next lesson, which is
about server configuration.

THE DOMAIN NAME SYSTEM


The Internet and several private IP networks depend on the Domain Name System
(DNS) to assist in directing traffic. The DNS is a naming system that translates
Internet domain or host names into IP addresses and names. It also creates ways
by which computers can query the database remotely.

Although all public websites already have IP addresses that are publicly accessible.
DNS allows a simpler and more practical means to access them by recognizing and
translating the simpler names that they have been designated with into IP
addresses. This is a process known as forward IP address lookup. Translating an IP
address into the corresponding domain name is known as reverse IP address lookup.

Another use of DNS is to find the servers to which email is delivered. By default,
network requests that support DNS lookups run on top of port 53 of UDP and TCP.

DNS uses a client/server model. DNS servers refer to the computers that store
database records, while clients refer to devices such as PCs and smartphones. DNS
servers can also act as clients to each other when necessary.

DNS servers are organized into a hierarchy, with root name servers being at the very
top (for the Internet). Root name servers manage the top-level domains (TLDs), an
example of which is country code TLDs like .uk or .ph. Second-level domains refer
to the names that are placed immediately left of a top-level domain, and the
succeeding level domains manage sub-domain names.

Private business and Internet-governing organizations maintain and install DNS


server, with a small number of root name server supporting hundreds of top-level
domains. Small-scale DNS configuration can also be done by other organizations.

DNS NETWORK CONFIGURATION


DNS must first be configured on a network if a DNS client (or resolver) wants to use
it. A resolver queries the static IP address of DNS servers. DNS server addresses can
be obtained either from the network administrator’s ISP or from third-party DNS
providers. Client devices can then automatically retrieve these addresses once they
have been configured on a router, or each client device can have address configured
on them individually.

DNS CACHES
Cashing is the process of storing information in a cache. DNS caching involves
creating local copies of DNS records that have been accessed recently in order to
process multiple or heavy requests more efficiently by not generating network traffic
through the server hierarchy. The originals from where cached information is taken
remain on their respective servers.

There are two potential problems with DNS caches, the first being that connectivity
issues may come out of these caches becoming outdated. The second is that network
hackers often target DNS cache in their attacks. DNS caches can be flushed using
utilities such as ipconfig.

DYNAMIC DNS
Dynamic DNS (DDNS) is a service that maps domain names to IP addresses. Unlike
standard DNS, which only works with static IP addresses stored in a database,
DDNS also works with devices with dynamic IP addresses. It is thus suitable for
home networks, as ISPs often provide clients with different IP addresses over time.
For dynamic clients to have their IP addresses mapped, DDNS adds network
protocol extensions to standard DNS.

Additional software installation on the existing local network is required if you want
to setup an Internet DDNS environment, which can be used to remotely access your
home network, for example. A number of third-party providers that can monitor
linked devices and update the DNS name server as necessary are available.

DNS ALTERNATIVES
Microsoft provides a name resolution service known as Windows Internet Naming
Service (WINS) exclusively to Windows networks. Another alternative is a free and
open-source software project known as Dot-BIT, which is based on BitCoin.

SUMMATIVE TEST #1. Direction: Multiple Choice. Chose the correct answer in the answer sheets
found in a separate paper. (Note: You are not allowed to use another paper, avoid erasures)

POST TEST: Take the assessment post-test after accomplishing all the exercises and
activities as required.

You might also like