Professional Documents
Culture Documents
CSS NC II G12 Quarter 2 Module No2 LO#2 SUCN
CSS NC II G12 Quarter 2 Module No2 LO#2 SUCN
If you have questions, don’t hesitate to ask your Trainer for assistance.
If you can demonstrate to your Trainer that you are competent in a particular
skill or skills, talk to him/her about having them formally recognized so you don’t
have to do the same training again. If you have a qualification or Certificate of
Competency from previous trainings show it to your teacher. If the skills you
acquired are still current and relevant to this module, they may become part of the
evidence you can present for RPL. If you are not sure about the currency of your
skills, discuss it with your Trainer.
After completing this module ask your Trainer to assess your competency.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.
Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome may
have more than one learning activity.
Program/Course : COMPUTER SYSTEM SERVICING NC II
Unit of Competency : SET-UP COMPUTER NETWORKS
Module : SETTING-UP COMPUTER NETWORKS
INTRODUCTION:
Completion of this module will help you better understand the succeeding
module on the SETTING-UP COMPUTER SERVERS.
Upon completion of this module, report to your trainer for assessment to check
your achievement of knowledge and skills requirement of this module. If you pass
the assessment, you will be given a certificate of completion.
LEARNING OUTCOMES
At the end of this lesson, learners are expected to:
LO 1. Install Network Cables (TLE_IACSS9-12SUCN-IVa-j-33);
LO 2. Set Network Configuration (TLE_IACSS9- 12SUCN-Ia-e-34) ; and
LO 3. Set Router/Wi-Fi/Wireless Access Point/Repeater Configuration.
ASSESSMENT CRITERIA:
In this information sheet, you will learn the fundamentals of network configuration, which
will be necessary in understanding the following discussions.
NOTE: Computers that are connected to a server-based network are called client
computers, hence the name client/server. In this kind of network, computer clients who
want to access shared data must login with their designated username and password.
Information Sheets
In network configuration, you need to learn how to identify the correct subnet mask that
can accommodate the number of devices that will connect to your network.
In this information sheet, you will learn how to compute for the subnet, what the range of
usable IP addresses for the hosts is, and other concepts related to DNS and IP addressing.
Before anything else, let us discuss a few terms and concepts you need to know for
you to perform IP addressing and subnetting:
1. IP address – a unique 32-bit number that represents a device or interface (ex.
a network interface card) either on your intranet or on the internet. These
addresses are normally expressed in dotted-decimal format, with four groups
of number separated by dots. An IP address is actually composed of binary
numbers but for convenience, it is usually expressed in decimal format.
2. Subnet – logical subdivision of a larger network
3. Subnet mask/CIDR/Default subnet – 32-bit number that masks an IP
address, and breaks the IP address into a network address and a host address.
It is made by setting all network bits to 1s and setting all host bits to 0s.
4. Subnetting – the process of dividing a large network into smaller networks by
adding “1s” to the network bits in a subnet mask.
5. Host – a computer or device connected to the network.
6. Network Address – the address where the hosts are connected.
7. Default Gateway – a default access point or IP router that a network host or
computer uses to send information to another network or the internet.
8. DHCP – hands out IP addresses to hosts and keeps addresses unique. It also
provides a database of addresses statically away from the administrators.
9. Private IP Addresses – special non-routable IP addresses that are used in the
Intranet. These addresses need to be translated to public internet IP addresses
when the device needs to talk to the internet.
10. CIDR Prefix/Notation (Classless Inter-Domain Routing Prefix) – the shorter
representation of an IP address and its associated routing prefix. It is
composed of a slash (/) and a decimal number. The decimal number is the
number of 1s in a subnet mask.
For example:
Given Subnet Mask:
255.255.255.0 = 11111111.11111111.11111111.00000000
NOTE: Count the 1s, there are 8 bits per group/octet, and the first three groups are
all 1, so there are 24 1s all in all, therefore we have a “/24” or in verbal “CIDR twenty
four” or “slash twenty four”.
CLASS A
Class A addresses are assigned to networks with a very large number of hosts. The
high order bit in a Class A address is always set to zero or binary 0.
CLASS B
Class B addresses are assigned to medium-
sized to large-sized networks. The two high-
order bits in a Class B address are always set
to binary 10.
CLASS C
Class C addresses are used for small networks.
The three high-order bits in a networks. The three
high-order bits in a Class C address are always
set to binary 101.
CLASS D
Class D addresses are reserved for IP multicast addresses. The four high-order bits
in a Class D address are always set to binary 1110. The remaining bits are for the
address that interested hosts recognize. Class D addresses for applications to
multicast data to multicast-capable hosts on an internetwork.
CLASS E
Class E addresses is an experimental address that is reserved for future use. The
high-order bits in a Class E address are set to binary 1111.
To identify the class of an IP address get the first octet or first group of numbers of
the IP address and check the ranged specified in the table.
For example.
Given IP Address: 11.20.30.1 → first octet is 11
Therefore, the given IP Address is a Class A.
You need to remember the ranges, classes, and subnet masks mentioned in the
table above. They will be necessary in identifying the ideal subnet masks depending
on the number of hosts or users your network will have.
STEP 1. Identify the current number of hosts of the network and estimate the growth
of number of users in the future.
The number of hosts, of course includes all devices that are to be connected to your
network. Computers network cards, printers, and other network devices are
included in this estimation. Say today, you have a network with 10 hosts and you
think in the near future, your network will have 300 hosts.
Now, say you have the IP address space 192.168.0.0. We can assume that with
only 10 hosts, it is best to use the Class C’s 255.255.255.0 as your subnet mask.
This means you will have 192.168.0.x as your network ID and x.x.x.0 – 255 hosts.
Before you use that subnet mask, check if it fits the requirements. Remember you
need a subnet mask that will be able to accommodate 10 to 300 hosts.
To check the subnet mask, use the host’s formula (# of hosts = 2n – 2) to identify
how many hosts will be allowed on a network for a certain subnet mask. n is the
number of 0s in the subnet mask, in its binary notation.
For you to distinguish the number of hosts allowed in your assumed subnet (which
is 255.255.255.0), convert it first into binary.
(NOTE: For decimal to binary conversion, please refer to your Computer System
Servicing Lesson in Grade 11 CSS Module)
IPv6 ADDRESSING
In the early 1990s, the IETF realized that a new version of IP would be needed, and
the Task Force started by drafting the new protocol’s requirements. IP Next
Generation (IPng) was created, which then became IPv6 (RFC 1883) IPv6 provides
several improvements over its predecessor.
The following list summarizes the characteristics of IPv6 and the improvements it
can deliver.
Larger address space: Multicast: increased use Quality of Service (QoS)
increased address size of efficient one-to-many capabilities: QoS
from 32 bits to 128 bits communications markings of packets and
flow labels that help
identify priority traffic
Streamlined Protocol Jumbograms: The ability Anycast: Redundant
header: improves packet- to have very large packet services using non-unique
forwarding efficiency payloads for greater addresses
efficiency
Stateless Network Layer Security: Mobility: Simpler
Autoconfiguration: The Encryption and handling of mobile or
ability for nodes to authentication of roaming nodes
determine their own communication
address
IPv6 addresses are 128 bits long. They are logically divided into a network prefix
and a host identifier. The number of bits in the network prefix is represented by a
prefix length (for example, /64).
The remaining bits are used for the host identifier. If you do not specify a prefix
length for an IPv6 address, the default prefix length is /64.
SELF-CHECK 1.1: Direction: Multiple Choice. Chose the correct answer in the answer sheets found
in a separate paper. (Note: You are not allowed to use another paper, avoid erasures)
Information Sheets
SUBNETS
There can be problems within a single broadcast domain.
• The domain relies on MAC Addresses for packet delivery.
• Larger amounts of broadcast traffic consume resources.
• All devices share the same broadcast domain.
A subnet segments the hosts within the network. Without subnets, the network has
a flat topology. A flat topology has a short routing table and relies on MAC addresses
to deliver packets. MAC addresses have no hierarchical structure. As the network
grows, the use of the network bandwidth becomes less efficient.
Solution: Subnetworks
• Smaller networks are easier to manage.
• Overall traffic is reduced.
• You can apply network security policies more easily.
The advantages of subnetting a network are as follows:
• Smaller networks are easier to manage and map to geographical or functional
requirements.
• Overall network traffic is reduced, which can improve performance.
• You can more easily apply network security measures at the interconnections
between subnets than within a large single network.
SUBNET MASKS:
A subnet masks:
• Defines the number of bits that represented the network and subnet part of
the address.
• Used by end systems to identify the destination IP address as either local or
remote.
• Used by Layer 3 devices to determine network path.
Now, imagine that this Class B network is divided into subnets. If 2-bits are
borrowed from the default 16-bit host field, the size of the host field decreases to
14-bits. All possible combinations of 0s and 1s that could occur in the remaining
14-bits produce a total number of possible hosts that could be assigned in each
subnet. Thus, the number of hosts that are assigned to each subnet is now 16,382.
In the same Class B network, if 3-bits are borrowed, the size of the host field
decreases to 13-bits, and the total number of assignable hosts for each subnet
decreases to 8,192 (213). The number of usable host numbers decreases to 8,190
(8,192 – 2). This last example shows six (8 – 2) usable subnets in a Class B network.
Each of these six subnets can have 8,190 (8,192 – 2) usable host addresses.
For you to distinguish the number of hosts allowed in your assumed subnet (which
is 255.255.255.0), convert it first into binary.
This is equivalent to: 11111111.11111111.11111111.00000000 in binary notation.
STEP 3. Count the “0”s in the binary notation of your subnet mask.
That number of “1”s is the CIDR or your subnet mask. In this subnet mask, we have
24 “1”s, so we have CIDR 24 or /24. (CIDR is the count of all “1”s in the subnet
masks in its binary notation?.
STEP 4. Use the host’s formula to compute the number of hosts that can connect using
the subnet mask you assumed.
For Example:
Given: n = eight 0s
# of hosts available = 28 – 2 = 256 – 2, therefore:
# of hosts available is = 254 hosts available
254 hosts can connect to the network with a subnet mask of 255.255.255.0
STEP 5. Verify if the number of hosts available complies with the initial requirements
(10 – 100 hosts). The subnet mask you assumed suits the 10-user network now but
does not comply with the future 300-user requirement.
Now that you know that 255.255.255.0, or /24, does not provide our required
number of hosts. It is best to prepare a future-proof subnet mask for the first time
you set up a network. This prevents you from returning back later to change all IP
addresses on the network.
STEP 6. Now to fix that, if you noticed, if you add 1s to the subnet mask, meaning
from: 11111111.11111111.11111111.00000000 = 255.255.255.0 = 254 hosts
Now, with subnet mask 255.255.254.0, or 192.168.0.0/23, you have reached, even
exceeded the requirement of 300 hosts.
Considering this information, you already know the following:
a. the most efficient subnet mask for your network is 255.255.254.0
b. valid hosts are from 192.168.0.1 to 192.168.1.254
c. the broadcast address is 192.168.1.255
d. subnet mask 255.255.254.0 has 510 usable hosts
VERSION OF IP ADDRESSES
Currently, there are two versions of IP that are in widespread use, namely Internet
Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). IPv4 provides about
4.3 billion IP addresses that are 32 bits long, while IPv6 provides trillions more that
are 128 bits long.
SELF-CHECK 1.2: Direction: Fill the blanks with your correct answers in the answer sheets found in a
separate paper. (Note: You are not allowed to use another paper, avoid erasures)
ACTIVITY SHEET
In a sheet of paper, try to compute for the ideal subnet mask for the following
requirements. Show your solution.
In this information sheet, you will familiarize yourself with the common
concepts and ideas behind the Domain Name System and some basic DNS network
configurations. This information sheet is essential for the next lesson, which is
about server configuration.
Although all public websites already have IP addresses that are publicly accessible.
DNS allows a simpler and more practical means to access them by recognizing and
translating the simpler names that they have been designated with into IP
addresses. This is a process known as forward IP address lookup. Translating an IP
address into the corresponding domain name is known as reverse IP address lookup.
Another use of DNS is to find the servers to which email is delivered. By default,
network requests that support DNS lookups run on top of port 53 of UDP and TCP.
DNS uses a client/server model. DNS servers refer to the computers that store
database records, while clients refer to devices such as PCs and smartphones. DNS
servers can also act as clients to each other when necessary.
DNS servers are organized into a hierarchy, with root name servers being at the very
top (for the Internet). Root name servers manage the top-level domains (TLDs), an
example of which is country code TLDs like .uk or .ph. Second-level domains refer
to the names that are placed immediately left of a top-level domain, and the
succeeding level domains manage sub-domain names.
DNS CACHES
Cashing is the process of storing information in a cache. DNS caching involves
creating local copies of DNS records that have been accessed recently in order to
process multiple or heavy requests more efficiently by not generating network traffic
through the server hierarchy. The originals from where cached information is taken
remain on their respective servers.
There are two potential problems with DNS caches, the first being that connectivity
issues may come out of these caches becoming outdated. The second is that network
hackers often target DNS cache in their attacks. DNS caches can be flushed using
utilities such as ipconfig.
DYNAMIC DNS
Dynamic DNS (DDNS) is a service that maps domain names to IP addresses. Unlike
standard DNS, which only works with static IP addresses stored in a database,
DDNS also works with devices with dynamic IP addresses. It is thus suitable for
home networks, as ISPs often provide clients with different IP addresses over time.
For dynamic clients to have their IP addresses mapped, DDNS adds network
protocol extensions to standard DNS.
Additional software installation on the existing local network is required if you want
to setup an Internet DDNS environment, which can be used to remotely access your
home network, for example. A number of third-party providers that can monitor
linked devices and update the DNS name server as necessary are available.
DNS ALTERNATIVES
Microsoft provides a name resolution service known as Windows Internet Naming
Service (WINS) exclusively to Windows networks. Another alternative is a free and
open-source software project known as Dot-BIT, which is based on BitCoin.
SUMMATIVE TEST #1. Direction: Multiple Choice. Chose the correct answer in the answer sheets
found in a separate paper. (Note: You are not allowed to use another paper, avoid erasures)
POST TEST: Take the assessment post-test after accomplishing all the exercises and
activities as required.