SlideShare une entreprise Scribd logo
1  sur  92
COMPETENCY-BASED LEARNING MATERIAL
COMPUTER SYSTEMS SERVICING NCII
Sector :
ELECTRONIC SECTOR
Qualification :
COMPUTER SYSTEMS
SERVICING NCII
Unit of
Competency : SET-UP COMPUTER NETWORKS
Module Title :
SETTING-UP COMPUTER
NETWORKS
MARIA CRISTINA NATIONAL HIGH SCHOOL
INFORMATION COMMUNICATION
TECHNOLOGY
HOW TO USE THIS COMPETENCY –BASED LEARNING MATERIAL
Welcome!
The unit of competency, Setting up Computer Networks“”,
is one of competencies of Computer Systems Servicing NCII, a course which comprises
the knowledge, skills and attitudes in logging/recording business transactions
in an and Configuring Firewall with Advance Settings.
In this module, you are required to go through a series of learning activities in
order to complete each learning outcome. In each learning outcome are
Information Sheets, Self-Checks, Operation Sheets and Task/Job Sheets.
Follow and perform the activities on your own. If you have questions, do not
hesitate to ask for assistance from you facilitator.
Remember to:
Work through all the information and complete the activities in each
section.
Read information sheets and complete the self-check. Suggested
references are included to supplement the materials provided in this
module.
Most probably, your trainer will also be your supervisor or manager.
He is there to support you and show you the correct way of doing
things.
You will be given plenty of opportunities to ask questions and practice
on the job. Make sure you practice your new skills during regular work
shifts. This way you will improve you speed, memory and your
confidence.
Use the Self-Checks, Operation Sheets or Task or Job Sheets at the
end of each section to test your own progress. Use the Performance
Criteria Checklist located after the sheet to check your own
performance.
When you feel confident that you have had sufficient practice, ask your
Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No. Unit of Competency Module Title Code
1.
Install and configure Installing and configuring ELC724331
computer systems computer systems
2.
Set-up Computer Setting up Computer ELC724332
Networks Networks
3.
Set-up Computer Setting up Computer ELC724333
Servers Servers
Maintain and Repair Maintaining and
ELC724334
4. Computer Systems and Repairing Computer
Networks Systems and Networks
MODULE CONTENT
UNIT OF COMPETENCY SET UP COMPUTER NETWORK
MODULE TITLE Setting up Computer Network
MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.
NOMINAL DURATION: 40 HOURS
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1. Install Ethernet cables
2. Set network configuration
3.Inspect and test the configured computer networks
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network
design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Ethernet cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program.
10. Network connectivity of each terminal is checked in accordance with
network design.
11. Any fault or problem in the network system is diagnosed and remedied in
line with the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance with
network design.
13. Communication checking between terminals are carried out in accordance
with OS network configuration guides
14. Unplanned events or conditions are responded to in accordance with
established procedures
15. Client Device systems settings are configured in accordance with
manufacturers’ instructions-user preferences and end
16. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network des
17. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network des
18. Wireless settings are configured in accordance manufacturers’ instructions, network
design and end-user preferences
19. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions-user preferences and end
20. Final inspections are undertaken to ensure that the configuration done on
The computer networks conforms with the man instruction/manual
21. Computer networks are checked to ensure safe operation.
22. Reports are prepared/completed according to company requirements.
UNIT OF COMPETENCY SET UP COMPUTER NETWORK
MODULE TITLE Setting up Computer Network
MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.
 LEARNING OUTCOME NO.1
 INSTALLING ETHERNET CABLES
CONTENTS:
1. NETWORK MATERIALS,TOOLS AND EQUIPMENT
2. CREATING A NETWORK CABLE DEVICE
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and obtained
in accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work
are obtained in accordance with established procedures and checked for correct
operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage
has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
Excess components and materials are disposed of based on WEEE directives and 3Rs waste
management program
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Determine the network materials,tools and equipments
2. Identify the network materials,tools and equipments
Network equipment and cables
An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
 Cables and connectors. These link together the computers, printers, servers and
other equipment on your network.
 A router. This manages network traffic, ensuring devices can communicate with
each other via both wired and wireless connections, and provides internet
connectivity.
 A wireless access point (optional). This will extend your wireless network if the
router is incapable of offering coverage in certain parts of the building.
 An internet connection. This could be a faster fibre connection or dedicated
leased line.
 A hardware firewall. This creates a secure barrier between your network and the
internet, blocking security threats. Networks sometimes include an on-site network
server which runs central applications, acts as an email server and provides file
storage.
Network hardware building blocks
Some businesses still build their network with cables because they're very reliable
and fast. The most common type is Ethernet cable, which is rated for speed. Cat 6
cables can carry data fast enough for any business purpose.
When building their network most businesses install network sockets at convenient
locations in their premises, so computers and other devices can be plugged into the
network. The sockets cost about £3 each.
The router: a vital network component
The router acts as a signpost, indicating where data on your network should go and
enables devices to communicate with one another.
Routers also connect directly to the internet and share the connection via cable or
Wi-Fi with devices on the network.
A basic router with four wired connections will cost from £70. A more advanced
model, with 24 connections, could cost £150 or more.
Going wireless
Routers also include Wi-Fi capability, enabling people to connect
laptops, smartphones, tablets and other devices to the network wirelessly.
Wi-Fi is ideal for providing network access to staff with mobile devices and in meeting
rooms or common areas. It's also useful for offering internet access to visitors, with
many routers including a separate 'guest' network for the purpose. Wireless routers
start at around £70.
Network equipment speeds
Most network equipment complies with common standards, so you can combine
routers, cables and firewalls from different manufacturers. However, the speed of
your network might be governed by the slowest element. For example, if all your
cables and computers are rated to Cat 6, make sure your router is rated to Cat 6 too.
There are a number of wireless networking standards to take into account, although
the majority of modern devices will include support for the latest versions. Try to get
a wireless router or access point rated to 'Wireless n' or '802.11n'; it's the fastest type
available, but will still work with older wireless equipment, too.
What are the Equipment, tools and materials needed in Connecting
two computers using wired connection ?
RJ45
RJ means Registered jack. This is a
standard physical Network Interface
used for connecting telecommunications
equipment commonly, a computer networking
equipment
UTP CABLE
The cheapest cable use in computer in
networking is the UTP
(Unshielded Twisted Pair) cable.
Other use the STP (Shielded Twisted Pair)
cable which is cost much than UTP but more reliable.
CRIMPER
Crimping tool is used to join the
RJ-45 and RJ-11 connectors to
the both ends of either phone
or CAT5 cable.
WIRE STRIPPER
A tool designed to remove the protective
covering (jacket) off of a cable to expose
the inner wires. Because different wires
come in different shapes, there are dozens
of different wire strippers available.
LAN TESTER
A cable tester is a device that
is used to test the strength and
connectivity of a particular
type of cable or other wired assemblies.
NETWORK INTERFACE CARD
Short for Network Interface Card,
the NIC is also referred to as an
Ethernet card and network adapter.
It is an expansion card that enables
a computer to connect to a network;
ROUTER
A router is a networking device that forwards data
packets between computer networks.
A packet is typically forwarded from one router to
another router through the networks that
constitute an internetwork (e.g. the Internet)
until it reaches its destination node.
SWITCH HUB
A network switch (also called switching hub,
bridging hub, and by the IEEE MAC bridge)
is networking hardware that connects devices
on a computer network by using packet
switching to receive and forward data
to the destination device.
BAY RACK
A rack, in an IT (information technology)
context, is a supporting framework that
holds hardware modules. In this context,
racks typically contain servers, hard disk
drives and other computing equipment.
Racks make it possible to contain a lot of
equipment in a small physical footprint
without requiring shelving.
PATCH PANEL
a board in a switchboard, computer,
or other device with a number of
electric sockets that may be
connected
in various combinations.
Modular box
A modular PC is a computer that has
individually-housed components,
which are interconnected but separately
removable for service or upgrading. .
While Piston is upgradable, modules
are not actually individually housed,
making them more similar to the way
typical desktops are modular, with bare
PCB-based parts.
2 COMPUTER DESKTOP
an electronic device for storing and processing data,
typically in binary form, according to instructions
given to it in a variable program.
RACEWAY or SLOTTED
Slotted PVC cable raceways are very
convenient for cable laying of
on-wall installations in offices,
laboratories, workshops etc.
Raceways are made of very hard,
self-extinguishing PVC,
with temperature resistance to 70 Co.
COMPUTER TABLE
a flat surface, usually supported by
four legs, used for putting things on
UNINTERRUPTIBLE POWER SUPPLY
An uninterruptible power supply (UPS)
is a device that allows a computer to
keep running for at least a short time.
SELF-CHECK 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT
Fill the blank : Write the correct answer in the blank
_______________1. Its is a network switch (also called switching hub,
bridging hub, and by the IEEE MAC bridge) is networking hardware that
connects deviceson a computer network by using packet
switching to receive and forward datato the destination device.
_______________2. Its is a board in a switchboard, computer,
or other device with a number of electric sockets that may be
connectedin various combinations.
_______________3. is a networking device that forwards data
packets between computer networks. A packet is typically forwarded
from one router toanother router through the networks thatconstitute an
internetwork (e.g. the Internet) until it reaches its destination node.
_______________4. A cable tester is a device that
is used to test the strength andconnectivity of a particular type of cable
or other wired assemblies.
________________5. is a standard physical Network Interface
used for connecting telecommunications equipment commonly, a
computer networking equipment.
Enumeration: write in your whole sheet of pad paper
1.what are the Equipment, tools and materials needed in Connecting two
computers using wired connection?
2. what is to build a network you will need a range of equipment?
TASK SHEET 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT
Performance Objective: given necessary tools,equipment and materials,
you should be able to networking material,tools, and equipment ff.
Standard operating procedures within 1 hour
Supplies/Materials and Equipment:
Rj45 , crimper ,utp cable, lan tester ,router ,switch hub,bay rack
2 computer systems unit,table, etc.
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
4.Follow the steps / procedures below:
Memories and familiar of the networking material,tools, and equipment
.
Assessment Method:
Demonstration
INFORMATION SHEET 1.1-2
CREATING A NETWORK CABLE DEVICE
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Determine the netwok cable device
2. Identify to creating a network cable device
What is a network cable device?
Networking cables are networking hardware used to connect one network device to
other network devices or to connect two or more computers to share printers,
scanners etc.Electrical connections using twisted pair or coaxial cable are used
within a building.
Different Types Of Network Cabling
Four Types Of Network Cabling
Network cable acts like a medium
through which information travels
from one network device to the other. The
type of cable selected for a network
depends on the network’s size,
topology, and procedure. The various
types of network cables act as the
backbone of the network
infrastructure.
Selecting the correct type of network
cabling can effect various business functions because enterprise network admins
employ new technologies. The type of network cable used in any network
infrastructure is one of the most vital aspect of networking in various industries.
Coaxial Cable
It has a single copper conductor in the middle. A
plastic layer provides insulation between the
braided metal shield and center conductor. The
metal shield blocks outer interference from
motors, fluorescent lights, and other computers.
Coaxial cabling is extremely resistant to signal
obstruction though it is complex to install. It can
handle great cable lengths between network
devices than the twisted pair cable. The two types
of coaxial cables are thin coaxial and thick coaxial.
Shielded Twisted Pair (STP) Cable
It is a special kind of copper telephone wiring used
in business installations. An external shield which
functions as a ground is added to the normal
twisted pair telephone wires. Shielded twisted pair
may be the answer if you want to place the cable in an
area with potential interference and risk to the
electrical current in the UTP. Shielded cables can also
help in expanding the distance between the
cables.
Fiber Optic Cable
Fiber optic cabling consists of a center
glass core surrounded by many layers of
protective materials. It removes the
problem of electrical obstruction by
transmitting light rather than electronic
signals. This makes them perfect for
certain atmospheres which contain huge
amount of electrical interference. It has
become the standard for connecting
networks between buildings because of its
resistance to lighting and moisture.
Ensure your system establishment is 100% consistent and converse with
Dimtech today.
Unshielded Twisted Pair
It is the most admired type of network
cable in the world. UTP cable is used for
both conventional telephone and
computer networking.
The various wiring schemes for UTP are:
 CAT1 which is used for telephone wire.
CAT2 supports speeds up to 4 Mbps and used frequently for token ring networks.
 CAT3 and CAT4 are both used for Token Ring networks for higher network speeds.
 CAT5 wire is now replaced by the CAT5e designs providing an enhanced crosstalk
specification allowing it to support speeds up to 1 Gbps. It is the most used network
cabling specification in the world.
 CAT6 support speeds of 1 Gbps for length up to 100 meters and 10 Gbps up to 55
meters. Organizations using CAT6 cabling should use a specialized cable analyzer to
request a complete test report, to ensure that the the CAT6 guidelines and standards
have been followed during the installation.
 The CAT7 is a fresh copper cable pattern which can support speeds of 10Gbps and
length up to 100 meters.
For the development of a successful network in an organization, understanding the
different types of cable and how they affect other aspects of a network is vital.
Network Cabling in Perth
RJ45 and CAT 6 are the most widely recognized innovations out there with regards to
organize cabling. As system cabling masters, Dimtech comprehends the significance
of utilising the right cabling.
Our network cabling work consents to all statutes, directions, and models. This is
vital on the grounds that numerous suppliers will utilise shabby, substandard
cabling which does not follow national norms. Ensure your system establishment is
100% consistent and converse with Dimtech today.
STEPS IN CREATING A NETWORK CABLE
STRAIGHT THROUGH
TYPE A TYPE B
CROSS OVER COLOR CODE
NOTED:
Memorize the color code combination before doing this activity.
Above, you could see the color
assigned for each pin.
Creating of a STRAIGHT THROUGH network cable
Materials Needed:
2 RJ45
1 meter Network Cable – UTP cable
Tools Needed:
Crimping Tool
Wire Stripper
LAN Tester
Equipment Needed:
2 Working computers with Network Adapter (LAN port)
STEP BY STEP TO STRAIGHT THROUGH CABLE
Cut the cable insulator to show all the eight wires
Strip off the insulator
Separate all eight wires
Position all eight wires according to its assigned pins in the RJ45
Position all wires. Make sure that all are in proper pin assignment
Cut the wires
Make sure that the cut is even and small enough for the RJ45
Put all wires inside the RJ45.
Make sure all wires reach the pins
HOW TO TEST YOUR NETWORK CABLE?
A LAN TESTER is a hand held electronic device. It is used to verify electrical
connections in a cable network. Signal strength, particularly in a computer networks,
is crucial for data transmission.
A LAN TESTER can come in one of many shapes &
sizes, and may have multiple functions. A hand held
battery-powered tester checks for insulation losses and
crossed wiring, and is generally easy to use. Most
testers are designed with two parts – the tester itself
and a remote. Testers typically have different testing
ports to test today’s most popular media including
ports for RJ-45, RJ-11, USB and BNC.
WHEN TO USE A LAN TESTER:
Once you are ready to check if a cable is set up properly to achieve a strong
connection between source and destination. That time is, typically, after installation
/ set up is complete. It is good practice to test the system once all components are
connected in order to assure the job has been done properly. If the test shows
connectivity troubleshoots, you can address the issue(s) and retest.
POSSIBLE ISSUES:
Connection between server and computer(s) is weak
Outside interference causing data loss or decreased signal strength
Faulty cable
HOW TO USE A LAN TESTER:
1. Select the cable to be tested and
make sure it is not plugged to any
electrical power and free of any
packaging or tangled with other
cables, to prevent false reading.
2. Visually inspect the cable for
damage. If cable is broken or torn it
should be replaced.
3. Plug the network cable into the
appropriate port on the cable
tester, and then connect the
other end of the cable to the
remote.
4. Switch the tester on to test
your cable. The tester will
show results, and if
applicable, will indicate what
the potential problem is
PC to PC Networking
Requirements:
1. Two Computers with compatible O.S. and Ethernet adapter.
2. Cross Over Cable
1.Plug the both End of cross over network cable on
two ethernet port of
two computers as
shown above.
2.Assign the following on both
computers: IP Address,
Subnet Mask, Gateway,
Computer Name and
Workgroup Name.
To Assign IP address on computer, follow these steps:
SELF-CHECK 1.1-2
CREATING A NETWORK CABLE DEVICE
ENUMERATION: Write the correct answer in your whole sheet of pad paper
1.What is the color coding of straight through?
2.What is the color coding of cross over?
3. What is the network cable devices?
4. Four Types Of Network Cable?
5. How to test Network Cable?
TASK SHEET 1.1-2
CREATING A NETWORK CABLE DEVICE
Performance Objective: given necessary tools,equipment and materials,
you should be able to creating a network cable device ff.
Standard operating procedures within 1 half hour
Supplies/Materials and Equipment:
Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, etc.
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
4.Follow the steps / procedures below:
.
 Unroll the required length of network cable and add a little extra wire, just in
case.
 Carefully remove the outer jacket of the cable
 Inspect the newly revealed wires for any cuts or scrapes that expose the
 Untwist the pairs so they will lay flat between your fingers.
 Arrange the wires based on the wiring specifications you are following.
 You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires
are switched.
 Press all the wires flat and parallel between your thumb and forefinger
 Keep the wires flat and in order as you push them into the RJ-45 plug with
the flat surface of the plug on top
 Place the wired plug into the crimping tool
 Repeat all of the above steps with the other end of the cable
 Test the cable to ensure that it will function in the field
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 1.1-2
CRITERIA YES NO
Did you……
Wear your ppe
Observe safety and proper sanitation
Gather the necessary materrials and equipment
Unroll the required length of network cable and add a little extra wire,
just in case.
Carefully remove the outer jacket of the cable
Inspect the newly revealed wires for any cuts or scrapes that expose the
Untwist the pairs so they will lay flat between your fingers.
Arrange the wires based on the wiring specifications you are following.
You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which
wires are switched.
Press all the wires flat and parallel between your thumb and forefinger
Keep the wires flat and in order as you push them into the RJ-45 plug
with the flat surface of the plug on top
Place the wired plug into the crimping tool
Repeat all of the above steps with the other end of the cable
Test the cable to ensure that it will function in the field
 LEARNING OUTCOME NO.2
 SETTING NETWORK CONFIGURATION
CONTENTS:
1. CONFIGURE A WIRELESS ROUTER
2. CONFIGURE NETWORK CONNECTIVITY
ASSESSMENT CRITERIA:
1. Network connectivity of each terminal is checked in accordance with network
design.
2. Any fault or problem in the network system is diagnosed and remedied in line
with the standard operating procedures.
3. Network interface card (NIC) settings are configured in accordance with network
design.
4. Communication checking between terminals are carried out in accordance with
OS network configuration guides
5.Unplanned events or conditions are responded to in accordance with established
procedures
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-1
CONFIGURE A WIRELESS ROUTER
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Determine the configure a wireless router
2. Identify the configure a wireless router
Wireless Configuration (WZC),
also known as Wireless Auto
Configuration, or WLAN
AutoConfig, is a wireless
connection management
utility included with Microsoft
Windows XP and later operating
systems as a service that
dynamically selects a wireless
network to connect to based on a
user's preferences and various
default settings.[1][2] This can be
used instead of, or in the absence
of, a wireless network utility from
the manufacturer of a computer's
wireless networking device. The
drivers for the wireless adapter query the NDIS Object IDs and pass the available
network names (SSIDs) to the service. The service then lists them in the user
interface on the Wireless Networks tab in the connection's Properties or in
the Wireless Network Connection dialog box accessible from the notification area.
A checked (debug)[3] build version of the WZC service can be used by developers to
obtain additional diagnostic and tracing information logged by the service.
SET-UP A WIRELES ROUTER
As more and more devices are able to connect to wireless networks, setting up a
wireless router has become a crucial step for virtually any home network. Setting
up a wireless network will allow your devices to connect to the internet from
practically anywhere in the house, without the need for messy wires.[1] To get
started setting your
HOW TO SET UP A WIRELESS ROUTER
Purchase a wireless router. Routers come in all shapes and sizes. Compare
features to find the router that is right for you. If you have more area that you need
to cover, or have lots of walls in your home, you’ll need a router that offers the
option of upgrading antenna(s) with high gain types - if not supplied in the box. If
more than one wireless device will be connecting at the same time at different
speeds, a MiMo type router is recommended, otherwise the speed for all devices will
drop the highest supported by all at that time.
 All modern routers should support 802.11n, or Wireless-N). This is the most
stable, offers the fastest speeds and is backwards compatible with older
standards such as 802.11g.
2.Connect your router to your modem.[2] Routers and wireless
routers enable you to share your broadband internet connection with
multiple devices. To do so, you will need to connect your broadband modem
to the router. For best results, place your router near your modem.
 Connect the router and the modem with an Ethernet cable. Most routers
come packaged with a short Ethernet cable that you can use for this.
 Connect the modem to the WAN / Internet Port on your router. It is usually
offset, and may be a different color from the LAN Ports. WAN stands for
"Wide Area Network" which is what the internet actually is. LAN stands for
"Local Area Network". The router will assign a local or "private" IP address to
any device connected to its LAN Ports or WiFi signal from a pool of private
addresses (listed further below).
3.Connect any devices you want to hard wire with CAT 5 (or better) Ethernet
cables. If you have computers that are close, or a video game console or TV, you
can connect them to the router via Ethernet.[3] This will result in a more stable
and faster connection, and doesn’t require any extra configuration.
4.Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings. You
can disconnect this computer afterwards if you want to connect wirelessly. You can
also connect your laptop wirelessly for the first time, the wifi network name and the
default password will be printed on the router's label
PART 2 SET-UP :
1.When you power on the router, it will only create its wi-fi network, and the
device will be connected to the router's wi-fi connection, not the internet. To
connect the router to the internet, with some internet providers (i.e. GTPL in India),
it is required to register router's MAC address to the internet service provider's
website.
 MAC of the router can be found printed on router or in the documents etc.
2.Go to the internet service provider's website. Type ip address Log in with the
username and password provided by the internet service provider and go to MAC
address update option. one can see their existing laptop / computers MAC address
there. Add the router's MAC address there and save it. This process means that the
router is authorized to use the internet provide by the broadband company.
PART 3 SET-UP: Configuring the Router
1.Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the
router or in the documentation.[4] If you can’t find the router’s IP address
anywhere, you can do a web search for the router model to see what the default
address is.
 IP addresses are formatted as four groups of up to three digits, separated by
periods.
 Commonly found "default" Local IP addresses for routers are 192.168.0.1,
192.168.1.1, 192.168.2.1, 10.0.0.1. Note that all the addresses in the
follow ranges: 192.168.0.0 - 192.168.255.255, 172.16.0.0 - 172.31.255.255
& 10.0.0.0 - 10.255.255.255 have been set aside for exclusive use in a LAN;
and one address in the range of any of them of them would be assigned to
the connected router.
2.Enter your username and password. In order to access the configuration page,
you will need to be on the router's IP address and enter a valid username and
password at the prompt. Most routers have a basic account set up that you will
need to use to log on. This varies from model to model, but should be printed on
the router or in the documentation.
 The most typical username is “admin”.
 The most typical passwords are “admin” and “password”.
 Many routers will only require a username and a blank password, and some
allow you to leave all fields blank.
 If you can’t figure out the correct IP address, your username or password,
search for your router model online to see what the default login is. If it has
been changed, press the Reset button on the back of the router for 10 (to
30+ seconds as dictated in the instructions for the router model) to restore
factory defaults and try again.
3.Open the Wireless Settings. When you log in to your router, you will be taken to
the router’s main menu or status screen. There will be several options to choose
from. The Internet section can usually be left at default settings, unless you
received specific instructions from your internet service provider. The Wireless
section will allow you to set up your wireless network.
4.Enter a name for your wireless network. In the Wireless section, you should
see a field labeled SSID or Name. Enter a unique name for your wireless network.
This is what other devices will see when scanning for networks.
 Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the
signal. *See the Tips section below for additional information on the SSID
setting.
3. Choose a security method. Choose from the list of available security
options. For the best security, choose WPA2-PSK as the encryption method.
This is the most difficult security to crack, and will give you the most
protection from hackers and intruders.
4.Save your settings. Once you are finished naming and securing your
wireless network, click the Apply or Save button. The changes will be applied
to your router, which may take a few moments. Once the router has finished
resetting, your wireless network will be enabled.
PART 4 SET-UP: Connecting Your Devices
1. Connect a computer, tablet, or smartphone to the wireless network. Scan
for the wireless network with the SSID you provided above. On any device that
supports wireless networks, you should see your new network as long as you are
within range of the router. Select it and you will be prompted for the passphrase.
2. Enter your wireless passphrase. Once you enter the passphrase, your device
will be automatically connected to the wireless network. The network will be stored
in your devices memory and will automatically connect whenever you are within
range.
 For detailed instructions on selecting and joining a wireless network for your
specific computer, tablet, or smartphone, follow this guide.
3.Connect your other devices. Besides other computers and tablets, you can
connect other devices as well, such as printers, game consoles, TVs and more. See
the following guides for instructions for your specific device.
SELF-CHECK 2.1-1
CONFIGURE A WIRELESS ROUTER
ENUMERATION: Write your answer in your whole sheet of pad paper
1. What is the wireles configuration?
2. HOW TO SET UP A WIRELESS ROUTER ?
TASK SHEET 2.1-1
CONFIGURE A WIRELESS ROUTER
Performance Objective: given necessary tools,equipment and materials,
you should be able to configure a wireless router ff.
Standard operating procedures within 1 half hour
Supplies/Materials and Equipment:
computer systems unit,table, wireless router tp-link
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
4.Follow the steps / procedures below:
. Mentioned in this article
Step 1: Place your wireless router.
Step 2: Configure your wireless router gateway.
Step 3: Connect your gateway to your new router.
Step 4: Change your wireless router's admin password.
Step 5: Update the router's firmware.
Step 6: Establish a password for your Wi-Fi network.
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-1
CRITERIA YES NO
Did you……
Wear your ppe
Observe safety and proper sanitation
Gather the necessary materrials and equipment
Place your wireless router
Configure your wireless router gateway
Connect your gateway to your new router
Change your wireless router's admin password
Update the router's firmware
Establish a password for your Wi-Fi network
INFORMATION SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Determine the configuration of network connectivity
2. Identify the configuration of network connectivity
Network Connectivity
Definition - What does Network Connectivity mean?
Network connectivity describes the extensive process of connecting various parts of
a network to one another, for example, through the use of routers, switches and
gateways, and how that process works.
What is a Network?
A network consists of two or more
computers that are linked in order
to share resources (such as printers
and CDs), exchange files, or allow
electronic communications. The
computers on a network may be
linked through cables, telephone
lines, radio waves, satellites, or
infrared light beams.
Two very common types of networks include:
 Local Area Network (LAN)
 Wide Area Network (WAN)
You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).
Local Area Network
A Local Area Network (LAN)
is a network that is confined
to a relatively small area. It is
generally limited to a
geographic area such as a
writing lab, school, or
building.
Computers connected to a
network are broadly
categorized as servers or
workstations. Servers are
generally not used by humans directly, but rather run continuously to provide
"services" to the other computers (and their human users) on the network. Services
provided can include printing and faxing, software hosting, file storage and
sharing, messaging, data storage and retrieval, complete access control (security)
for the network's resources, and many others.
Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally
considered a desktop, consisting of a computer, keyboard, display, and mouse, or a
laptop, with with integrated keyboard, display, and touchpad. With the advent of
the tablet computer, and the touch screen devices such as iPad and iPhone, our
definition of workstation is quickly evolving to include those devices, because of
their ability to interact with the network and utilize network services.
Servers tend to be more powerful than workstations, although configurations are
guided by needs. For example, a group of servers might be located in a secure area,
away from humans, and only accessed through the network. In such cases, it
would be common for the servers to operate without a dedicated display or
keyboard. However, the size and speed of the server's processor(s), hard drive, and
main memory might add dramatically to the cost of the system. On the other hand,
a workstation might not need as much storage or working memory, but might
require an expensive display to accommodate the needs of its user. Every computer
on a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or wirelessly.
Wireless access to a wired network is made possible by wireless access points
(WAPs). These WAP devices provide a bridge between computers and networks. A
typical WAP might have the theoretical capacity to connect hundreds or even
thousands of wireless users to a network, although practical capacity might be far
less.
Nearly always servers will be connected by cables to the network, because the cable
connections remain the fastest. Workstations which are stationary (desktops) are
also usually connected by a cable to the network, although the cost of wireless
adapters has dropped to the point that, when installing workstations in an existing
facility with inadequate wiring, it can be easier and less expensive to use wireless
for a desktop.
See the Topology, Cabling, and Hardware sections of this tutorial for more
information on the configuration of a LAN.
Wide Area Network
Wide Area Networks (WANs) connect networks in larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a
matter of seconds, without paying enormous phone bills. Two users a half-world
apart with workstations equipped with microphones and a webcams might
teleconference in real time. A WAN is complicated. It uses multiplexers, bridges,
and routers to connect local and metropolitan networks to global communications
networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.
DIAGRAM NETWORK CONNECTIVITY
HOW TO STEP BY STEP NETWORK CONNECTIVITY
FIRST : CONNECT CABLE MODEM TO ROUTER
SECOND: CONNECT NETWORK CABLE TO ROUTER
THIRD : CONNECT ROUTER TO SWITCH HUB
FOURTH: CONNECT SWITCH HUB TO PATCH PANEL
FIFTH: CONNECT PATCH PANEL TO 2 SYSTEMS UNIT
Configuring Network Connections for
Windows 7 & window 2008 r2
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each computer
on the network its own individual IP address. This process is handled
automatically if you're using a router. Think of an IP address as a mailing
address. Each computer on the network needs a unique IP address so that
information sent across the network reaches the correct destination.
CONNECT TO ASSIGN AN IP ADDRESS TO THE CLIENT:
Click Open Network and Sharing Center.
Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
Click the Use the following IP address radio button.
Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.
Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.
Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.
This is the ip address of router take note:
Click OK. This will save the settings for that computer. This computer is now
configured on your network with a unique IP address.
Network Connecting to Windows 2008 R2
CONNECT TO ASSIGN AN IP ADDRESS TO THE SERVER:
A. Click Start
B. Right-click Network and click Properties
C. Click Local Area Connection
D. Click Details. Make note (on a piece of paper) of the address on the
right side of IPv4 Address:
(For our example, we are building a small network and we will just use a small
range of IP addresses. In the real world or for a large network, you would need to
actually know TCP/IP, design a range of IP addresses you plan to use, then assign
those IP addresses, or design a way to assign the IP addresses to the computers)
E. Click Close
F. In the Local Area Connection Status dialog box, click Properties
G. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
Click Properties
H. Click Use the Following IP Address
I. Type the IP address you want the server to use. For our example,
and based on the above dialog box, we type 192.168.001.001
J. Press Tab
K. Type the subnet mask (normally, it should be added automatically
when you press Tab from the previous IP address text box) and
press Tab
L. Type the default gateway address (use the first and the second octets
of the IP address you had provided (such as 192.168) and use
001.001 for the other two bytes)
M.Provide the Preferred DNS server address (we use 127.0.0.1 for our
example) and the Alternate DNS Server address (we leave ours
empty)
N. Click Advanced to check the values that were put in the IP Settings
and DNS property pages
O. Click OK
P. Click OK
Q. Click Close
R. Click Close
INFORMATION SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY
ESSAY: write the correct definition in your whole sheet of pad paper
1.What is the LAN?
2.What is the WAN?
3. What does Network Connectivity mean?
4. Draw the network connectivity diagram?
5. How to step by step network connectivity?
6. how to configure the connection of window 7 and window 2008 r2 server
TASK SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY
Performance Objective: given necessary tools,equipment and materials,
you should be able to configure network connectivity ff.
standard operating procedures within 1 half hour
Supplies/Materials and Equipment:
2 computer systems unit,table, wireless router tp-link,switch hub,patch
panel,network cable,modem internet
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
4.Follow the steps / procedures below:
1.Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.
2.Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
3.Click the Use the following IP address radio button.
4.Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.
5.Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.
6.Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.
o This is the ip address of router take note:
7.Click OK. This will save the settings for that computer. This computer is now
configured on your network with a unique IP address.
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-2
CRITERIA YES NO
Did you……
Wear your ppe
Observe safety and proper sanitation
Gather the necessary materrials and equipment
Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't
uncheck it, just highlight it.Click Properties.
Click the Use the following IP address radio button.
Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.
Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.
Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.
his is the ip address of router take note:
Click OK. This will save the settings for that computer. This computer
is now configured on your network with a unique IP address.
 LEARNING OUTCOME NO.3
 INSPECT AND TEST THE COMFIGURED COMPUTER NETWORKS
CONTENTS:
1. Testing the configured computer networks
2. Secured configured computer networks
ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the configuration done
on the computer networks conforms with the manufacturer’s
instruction/manual
2. Computer networks are checked to ensure safe operation.
3. Reports are prepared/completed according to company requirements.
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 3.1-1
TESTING THE CONFIGURED COMPUTER NETWORKS
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Determine the testing computer networks
2. Identify and test the computer networks
Network testing definition
What is network testing, really? Since I am not very good at explaining things,
I went to the Wikipedia article on software testing and found this:
“Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software
testing can also provide an objective, independent view of the software to allow
the business to appreciate and understand the risks of software
implementation.” –
That sounds pretty good to me. But if we take that passage and replace
“software” with “network”, we get:
“Network testing is an
investigation conducted to provide
stakeholders with information about
the quality of the product or service
under test. Network testing can also
provide an objective, independent
view of the network to allow the
business to appreciate and
understand the risks of network
implementation.”
Couldn’t be further from the truth.
Network testing is, in the end,
making sure that your network
configuration works as designed. Network testing is very similar to software
testing, with one exception: in contrast to software testing, network testing
often has to happen in a production environment, after the configuration
change was made. In fact, it is sometimes very difficult, or almost impossible,
to model a complex system like a large enterprise network, or the Internet
itself, in a lab environment. Thus, network testing is a MUST-HAVE step in the
network implementation process.
What is Use Case in Testing?
A Use Case in Testing is a brief
description of a particular use of the
software application by an actor or
user. Use cases are made on the basis
of user actions and the response of the
software application to those user
actions. It is widely used in developing
test cases at system or acceptance
level.
Use Case Testing
Use Case Testing is a software testing technique that helps to identify test
cases that cover entire system on a transaction by transaction basis from start
to end. Test cases are the interactions between users and software application.
Use case testing helps to identify gaps in software application that might not be
found by testing individual software components.
HOW TO TEST COMPUTER NETWORKS?
1.Testing Network Connectivity
A few tools can help you determine whether the network can send data
between computers; these tools test the network protocols as well as low-level
network hardware layers.
Ping
ping is a fundamental tool for testing TCP/IP network connectivity. Because
most networks today use the Internet (TCP/IP) protocol for file and printer
sharing services, as well as for Internet access, most Windows users can use
the ping test to confirm that their network cabling, hardware, and the TCP/IP
protocol are all functioning correctly. Ping sends several data packets to a
specified computer and waits for the other computer to send the packets back.
By default, it sends four packets and prints the results of the four tests.
To see whether the network can carry data between a pair of computers, use
the ipconfig command (described previously) to find the IP address of the two
computers. Then, on one computer, open a command prompt window by
choosing Start, All Programs, Accessories, Command Prompt.
Next, type the following command:
Ping 127.0.0.1
This command tests the networking software of the computer itself by sending
packets to the special internal IP address 127.0.0.1. This test has the computer
send data to itself. It should print the following:
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
If it doesn't, the TCP/IP protocol itself is incorrectly installed or configured;
check the computer's IP address configuration, or, if that seems correct,
remove and reinstall the Internet Protocol from Local Area Connection in
Network Connections. (I have to say, in more than 10 years of working with PC
networks, I've never seen this test fail.)
If your computer can send data to itself, try another computer on your LAN.
Find its IP address by running ipconfig on that computer and then issue
the ping command again on the first computer, as in this example:
Ping 192.168.0.23
Of course, you should use the other computer's real IP address in place of
192.168.0.23. You should get four replies as before:
Reply from 192.168.0.23: bytes=32 time<10ms TTL=32
Reply from 192.168.0.23: bytes=32 time<10ms TTL=32
Reply from 192.168.0.23: bytes=32 time<10ms TTL=32
Reply from 192.168.0.23: bytes=32 time<10ms TTL=32
These replies indicate that you have successfully sent data to the other
machine and received it back.
If, on the other hand, the ping command returns Request timed out, the
packets either didn't make it to the other computer or they were not returned.
In either case, you have a problem with your cabling, network adapter, or the
TCP/IP protocol setup.
You can use ping to determine which computers can send to which other
computers on your LAN or across wide area networks (WANs) or the
Internet. ping works when given a computer's IP address or its network name.
NOTE
If you enter a computer name, and ping can't determine the computer's IP
address, the problem isn't necessarily a wiring problem—it could be that the
DNS or WINS name lookup systems are not working correctly. Try using an IP
address with ping in this case to help determine what the problem really is.
How to Use the Ping Command to Test Your Network
Connectivity
The ping command sends packets of data to a specific IP address on a network,
and then lets you know how long it took to transmit that data and get a
response. It’s a handy tool that you can use to quickly test various points of
your network. Here’s how to use it.
How Does Ping Work?
Ping comes from a term used in sonar technology that sends out pulses of
sound, and then listens for the echo to return. On a computer network, a ping
tool is built into most operating systems that works in much the same way.
You issue the ping command along with a specific URL or IP address. Your
computer sends several packets of information out to that device, and then
waits for a response. When it gets the response, the ping tool shows you how
long each packet took to make the round trip—or tells you there was no reply.
It sounds simple, and it is. But you can use it to good effect. You can test
whether your computer can reach another device—like your router—on your
local network, or whether it can reach a device on the Internet. This can help
you determine if a network problem is somewhere on your local network, or
somewhere beyond. The time it takes packets to return to you can help you
identify a slow connection, or if you’re experiencing packet loss.
And it pretty much doesn’t matter what operating system you’re using. Pull up
a terminal or Command Prompt window, and you can use ping on macOS,
Linux, or any version of Windows.
How to Use Ping
We’re going to use the Windows Command Prompt in our example here. But
you can also use the ping command in Windows PowerShell, or in the Terminal
app on macOS or any Linux distro. Once you get to using the actual command,
it works the same everywhere.
In Windows, hit Windows+R. In the Run window, type “cmd” into the search
box, and then hit Enter.
At the prompt, type “ping” along with the URL or IP address you want to ping,
and then hit Enter. In the image below, we’re pinging www.howtogeek.com and
getting a normal response.
That response shows the URL you’re pinging, the IP address associated with
that URL, and the size of the packets being sent on the first line. The next four
lines show the replies from each individual packet, including the time (in
milliseconds) it took for the response and the time-to-live (TTL) of the packet,
which is the amount of time that must pass before the packet is discarded.
At the bottom, you’ll see a summary that shows how many packets were sent
and received, as well as the minimum, maximum, and average response time.
And in the next image, we’re pinging the router on our local network using its
IP address. We’re also getting a normal response from it.
When the ping tool does not get a response from whatever devices you’re
pinging, it lets you know that, too.
And that’s how to use ping at its most basic. Of course, like most commands,
there are some advanced switches you can use to make it behave a bit
differently. For example, you can have it keep pinging a destination until you
stop the command, specify the number of times you want it to ping, set how
often it should ping, and more. But unless you’re doing some very specific
types of troubleshooting, you won’t need to worry much about those advanced
switches.
If you’re curious about them, though, just type “ping /?” at the Command
Prompt to see a list.
So, What Can You Do With Ping?
Now that you know how to use the command, here are some interesting things
you can do with it:
 Ping a URL (like www.howtogeek.com) or IP address to see if you can reach
an internet destination. If you get a successful response, you know that all
the networking devices between you and that destination are working,
including the network adapter in your computer, your router, and whatever
devices exist on the internet between your router and the destination. And if
you’re interested in exploring those routes further, you can use
another networking tool named tracert to do just that.
 Ping a URL to resolve its IP address. If you want know the IP address for a
particular URL, you can ping the URL. The ping tool shows you right at the
top the IP address it’s working with.
 Ping your router to see if you can reach it. If you can’t successfully ping an
internet location, you can then try pinging your router. A successful
response lets you know that your local network is working okay, and that
the problem reaching the internet location is somewhere out of your control.
 Ping your loopback address (127.0.0.1). If you can’t successfully ping your
router, but your router appears to be turned on and working, you can try
pinging what’s known as a loopback address. That address is always
127.0.0.1, and pinging it successfully lets you know that the network
adapter on your computer (and the networking software in your OS) is
working properly.
Note: You may not get a ping response from other computers on your local
network because the built-in firewalls on those devices prevent them from
responding to ping requests. If you want to be able to ping those devices, you’ll
need to turn off that setting to allow pings through the firewall.
The list above uses a kind of outside-in approach, where you ping the furthest
destination first, and then work your way in to the more local devices. Some
people like to work inside-out by pinging the loopback address first, then their
router (or another local device), and then an internet address.
And of course, what we’re talking about in this article is mostly about using
ping to perform troubleshooting on a home or small business network. On
larger networks, there’s a lot more complexity to worry about. Plus, if you’re
tasked with troubleshooting larger networks, you probably already know how
to use ping and many other networking tools.
TASK SHEET 3.1-1
TESTING THE CONFIGURED COMPUTER NETWORKS
Performance Objective: given necessary tools,equipment and materials,
you should be able to testing the configured computer networks ff.
standard operating procedures within 1 half hour
Supplies/Materials and Equipment:
2 computer systems unit,table, wireless router tp-link,switch hub,patch
panel,network cable,modem internet,Lan tester.
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
4.Follow the steps / procedures below:
PERFORMANCE CRITERIA CHECKLIST 3.1-1
CRITERIA YES NO
Did you……
INFORMATION SHEET 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS
Wear your ppe
Observe safety and proper sanitation
Gather the necessary materrials and equipment
Check the physical connections. Check that the Link light — the little
red or green light next to the RJ-45 port — is lit on every computer
1. Verify that you can log on
Check the network configuration
2. This command will spit out numerous lines of information
3.
4. Verify that the computers can ping each other
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Determine and secured the computer networks
2. Identify and secured the computer netwroks
Checking Network Configuration
If hardware isn't at fault, you may have a fundamental network configuration
problem. Often the Event Log or Device Manager gives these problems away,
but if they don't, you can use another batch of tools to check the computer's
network configuration.
ipconfig
If your computer can't communicate with others on your LAN, after you check
the Event Log and Device Manager, use the ipconfig command-line utility to see
whether your computer has a valid IP address. Check other computers on the
LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs,
Accessories, Command Prompt), type the following command:
ipconfig /all
The results should look something like this:
Windows IP Configuration
Host Name . . . . . . . . . . . . : myvpc-hb
Primary Dns Suffix . . . . . . . : mycompany.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : Yes
WINS Proxy Enabled. . . . . . . . : No
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel 21140-Based PCI Fast Ethernet Adapter
Physical Address. . . . . . . . . : 00-03-FF-DD-CA-5F
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::ed10:dff9:693c:803d%8(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.15.108(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Friday, October 20, 2006 5:55:11 PM
Lease Expires . . . . . . . . . . : Friday, October 27, 2006 5:55:23 PM
Default Gateway . . . . . . . . . : 192.168.15.1
DHCP Server . . . . . . . . . . . : 192.168.15.1
DHCPv6 IAID . . . . . . . . . . . : 201327615
DNS Servers . . . . . . . . . . . : 192.168.15.1
NetBIOS over Tcpip. . . . . . . . : Enabled
(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that
mention Tunnel adapters.)
The most important items to look for are the following:
 Host name—This should be set to the desired name for each computer. If
you can correspond with some computers but not others, be sure that the
ones that don't work are turned on and correctly named. Make sure that
you don't have two computers with the same name, and that none of the
computer names is the same as the workgroup name.
 IP address—This should be set appropriately for your network. If your LAN
uses Internet Connection Sharing, the address will be a number in the
range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for
automatic configuration, your network manager can tell you whether the IP
address is correct. Networks with cable/DSL sharing routers usually use
numbers starting with 192.168.x where x is a number from 0 to 15.
If you see a number in the range 169.254.0.1 through 169.254.255.254,
your computer is set for automatic configuration, but no DHCP server was
found, so Windows has chosen an IP address by itself. This is fine if your
LAN uses this automatic configuration system. However, if there should
have been a DHCP server, or if you use Internet Connection Sharing or a
hardware Internet Connection router, this is a problem. Restart the ICS
computer or the router, and then restart your computer and try again.
 Network mask—This usually looks like 255.255.255.0, but other settings
are possible. At the least, all computers on the same LAN should have the
same network mask.
Each computer on the same LAN should have a similar valid IP address and
the same network mask. If they don't, check your network configuration. The
built-in Windows "Repair" function may also be used to help fix problems with
DHCP-based (automatic) IP address assignment.
NOTE
To learn more about IP addressing, network masks, and configuration, visit
support.microsoft.com and search for article number 164015, which is titled
"Understanding TCP/IP Addressing and Subnetting Basics."
Computer
You can check your computer's identification and workgroup or domain
membership setup from the Computer window. To do so, click Start,
Computer. Look in the Details pane at the bottom of the screen for the
computer name and domain or workgroup name, as shown in
On a Windows Workgroup network, the workgroup name should be the same
on all computers on your workgroup LAN. All of the computer names must be
different from each other.
NOTE
None of your computers can use the workgroup or domain name as its
computer name. For example, if your workgroup is MSHOME, you can't also
name a computer MSHOME. If you find this on one of your computers, change
that computer's name.
On a Windows domain network, you should see your computer's name
displayed as part of a Windows domain name (for example, my computer
named myvpc-hb would be called myvpc-hb.mycompany.com on a domain
network) and the domain name. Your domain name might not include .com. It
might say .local instead, or may use a different ending. In any case, be sure
that your computer is actually a domain member. If the word "workgroup"
appears instead, your computer is not a domain member and will not be able
to use domain logins or some domain resources.
Network Connections
You can manually check all installed network protocols and services and their
configuration by viewing Network Connections and viewing the properties for
Local Area Connection. To view this screen, click Start, Network. At the top of
the Network window, click Network and Sharing Center. In the left pane of that
window, click Manage Network Settings. Then, right-click your Local Area
Connection icon (or the appropriate wireless connection icon) and select
Properties.
Confirm that each required protocol is installed and correctly configured. In
general, the settings on each computer on your LAN should match, except that
the IP address differs (usually only in the last of its four dot-separated
numbers). If your LAN uses Automatic IP address configuration, you need to
use the ipconfig command, described earlier, to check the settings.
HOW TO CHECK THE SERVER AND CLIENT NETWORK?
What Is a Client-Server Network?
A client-server network is designed for end-users, called clients, to access
resources such as files, songs, video collections, or some other service from a
central computer called a server. A server's sole purpose is to do what its name
implies - serve its clients! You may have been using this configuration and not
even have known it. Have you ever played Xbox Live or used the PlayStation
Network? Your Xbox One is the client, and when it logs into the network, it
contacts the Xbox Live servers to retrieve gaming resources like updates, video,
and game demos.
How Does It Work?
Imagine a customer sitting
at a restaurant. He is
waiting for the server to
come by and take his
order. The same rules
apply in a client-server
network; the client, which
can be a laptop, desktop, a
smartphone, or pretty
much any computerized
device, can make a request
from the server.
The client uses
the network as a way to
connect with and speak to
the server. Just as the customer speaks to his server, the client uses the
network to send and receive communications about its order, or request. The
server will take the request and make sure that the request is valid. If
everything checks out okay, then the server will fetch the request and serve the
client.
The server can make a request from the client as well. It may want to check up
on the status of the client, or ask if it has received any security patches, or if it
still needs resources from the server. If not, the server will close the connection
in order to free up network traffic.
Can you imagine a server standing next to a customer who just stares at the
menu without ordering anything? After 15 minutes, it would be a good idea for
the server to leave and check on other customers. In both cases, the server
moves on to other clients as needed.
What Are the Advantages of a
Client-Server Network?
The biggest advantage to using this
setup is central management of the
server. Only one server is used to host
the resources that all the clients
request and use. This is especially
good for server administrators,
because they only have to be in one
place and can solve all the problems
in one place, as well. Having to
manually update several hundred
servers would take much more time.
One centrally managed server is the
key to ease of management, and it is
cost effective, too.
Another advantage of using one physical server is that the configuration is
simple to set up and takes less time to troubleshoot. For instance, if there were
a site with multiple servers providing redundant services, and it was having
issues, it could take an extreme amount of work to effectively troubleshoot why
services are being hindered. In a single server role, all troubleshooting takes
place at one physical server, so it takes much less time.
How To Secure & check your Computer System And Network
Technology advancements have helped us improve our security and safety –
think security cameras. It has helped us increase our productivity – think
smartphones.
However, at times we technology also presents to us some potential threats
that we need to deal with. For instance, in offices as well as households, we
have wireless networks connecting all major electronic devices. This can
potentially bring about a security concern – as hackers can aim to attack your
system or network and steal your confidential information.
How Severe Is The Threat?
According to a report by Javelin Strategy and Research, the cost of recovering
from such security damage for major organizations can be as high as $7
Million. And this is just the economic loss – there is always the damage done to
brand image and reputation that is far more disastrous.
How Can You Deal With It?
So, how do you protect devices from the prying eyes of the hackers?
Here are some of the ways in which you
can secure your home or office system
and network.
1. Securing your system with
Passwords
It may seem unnecessary for having
passwords and encrypted system
altogether, but this has been among
one of the main reasons why hackers
are easily able to attack to the systems
because of weak password and accessibility to access points.
All the wireless networks and secretive information should be well encrypted
with unique username and passwords making it difficult for the hackers to
break into the system. Using a WPA2 encryption is more secure way than any
other encryption protocol as it is not easily hacked into.
2. Safe and Secure Wireless Router
The wireless router allows multiple users to use the internet at the same time,
but if that is kept wide open, it can be dangerous. Any Individual with
malicious intention can use your internet for free, and can even steal your
valuable information or may use for some cyber crime. So it is always advised
to change the SSID provided by the service network and use firewall.
3. Active checking of the system
This majorly applies for the office users, as there may be some of the malicious
insiders, employees from the company who may hack into the systems. It is
comparatively easy for the employees to steal and hack the accounts, as they
are well aware of the system and networks. Such hackers are dangerous for the
organization. So a thorough screening of the employees is advised. Also, the
important files should be admin encrypted so nobody can use it whenever
required.
4. Encrypt the whole disk
This is especially true for Laptop users, as such devices can be stolen easily.
One can even lose it, and there may be some of the important files on the
laptop which can be accessible by the potential hacker or stealer.
So it is a better idea to protect your laptops or systems with whole disk
encryption. They are not very costly but gives protection to your valuable
information.
5. Updated security software
Always make sure to update the operating system, web browser and most
importantly security software. They prove good against any of the viruses or
malware. Make sure to scan any of the USBs and other external devices with
your software security scan to guard against any of the threats. It is important
to keep the software updated.
6. Keeping your in-house security out of reach
Most offices as well as households have been using CCTV cameras to keep
their home or office secure and are attached to the home or office network to
view them anytime and anywhere. But this can be dangerous at times.
If the CCTV hooked up with the system is not encrypted strongly than hackers
can easily view your updates of home or office and steal prime information.
Hackers could get all the insights of your office and household and can make a
right move at the right time.So it is very important to keep it secure with
username and password which may not be guessed. You can have an alarm
and security features if any unknown device hacks into it to keep your system
safe.
7. Beware of Spoofing and Phishing
Hackers know how and when to break into the system. They may attract the
home mobile users or office desktop users by asking them to download or
install any software to speed up the performance of the system. Upon
downloading, all lucrative information can be stolen by them.
Do not register on any untrusted websites asking for personal details or
installing any such software. Also avoid opening unknown email attachments
as they may have a virus, worms or Trojans. These emails can be sent from
trusted sources – so think before clicking.
 Secure your Computer Network
Enable encryption on your
access point. Using 128-bit
encryption or higher makes your
Wireless Network more secure.
WEP and WPA are entirely
different encryption schemes.
WEP has been proven insecure
and can be cracked in a few
minutes using free utilities that
can be downloaded from the
Internet. Using at least WPA is recommended, because it is much more secure,
but is sometimes a bit harder to set up correctly than WEP is, and isn't
completely secure.[1] [2] Some older access points or wireless cards do not
support WPA2. If you have one of these, it is recommended that you purchase
a newer one that supports WPA2, depending on how important you consider
your security.
2. Set the router access password. Anybody who gains access to the router
configuration settings can disable the security you have set up. If you forget
the password, most routers have a hardware reset that will restore all of the
settings to factory defaults. The best option is to use a random sequence of
the maximum length of characters - you only have to type that once, so it is
not a big thing. When you connect to the router via LAN cable while setting
it up, you can copy and paste the password onto the router and onto your
local setting, so you never need to type it again.
Use a secure password. Don't use easily guessed passwords for your WPA2
or router access passwords, such as "ABC123", "Password", or a string of
numbers in order. Use something hard to guess that contains both upper
and lowercase letters as well as numbers. Special characters such as !@#$%
are not supported by some routers. The longer the key, the better, although
the WPA2 key has a minimum and maximum length. Try to make a little
mental effort -- good passwords might be hard to remember, but they are
harder to crack.
If you use a weak key then even WPA and WPA2 can be easily cracked
within a day using a combination of special precomputed tables and
dictionary attacks. The best way to generate a secure key is to use an offline
random number generator or write the entire alphabet in uppercase and
lowercase and numbers 0-9 on separate pieces of paper, mix the paper up
and randomly pick up pieces and return them, mixing them up again each
time; each character you pull out becomes a character in your key. You can
also try throwing a pair of dice and using the resulting numbers as your
password.
3. Disable MAC Address filtering on your Access Point or router. A MAC
(not to be confused with the computer model 'Mac') address is a code
unique to every wireless networking card in existence. MAC Address
filtering will register the hardware MAC Address of your networked devices,
and only allow devices with known MAC Addresses to connect to your
network. However, hackers can clone MAC addresses and still enter your
network, so MAC address filtering should not be used in place of proper
WPA2 encryption.
4. Don't disable the 'SSID Broadcast'. Do not disable the 'SSID Broadcast'
feature of your Access Point or router. This seems counter-intuitive, but it is
actually a bad idea.[3] Although this would make your network invisible to
your neighbors, any determined hacker can still sniff out your SSID; and
you are implicitly forcing your computer to shout out your SSID anywhere
you are, while it is trying to connect to it. Anyone could then impersonate
your router with that SSID, and get your credentials that way.
5. Disable remote login. The first router worm brute forces its way into the
router in this manner. Most default usernames are set to Admin. It isn't
hard for a virus/worm to crack the password if the username is known. The
good thing is that routers normally have this disabled by default. Be sure to
confirm that it is disabled when you first set up your router and periodically
thereafter. If you need to update your router setting remotely, only set up
access for the time you are going to be connected.
6. Disable wireless administrating. Finally, change the setting that allows
administrating the router through a wireless connection to 'off' (meaning
that you need to connect with a LAN cable for administration). This disables
any wireless hacking into the router.
7. Update your software regularly. Regular software updates are one of the
most effective steps you can take to improve the overall cybersecurity
posture of your home networks and systems. Besides adding new features
and functionality, software updates often include critical patches and
security fixes for newly discovered threats and vulnerabilities. Most modern
software applications will automatically check for newly released updates. If
automated updates are not available, consider purchasing a software
program that identifies and centrally manages all installed software
updates. (See Understanding Patches and Software Updates.)
8. Remove unnecessary services and software. Disable all unnecessary
services to reduce the attack surface of your network and devices, including
your router. Unused or unwanted services and software can create security
holes on a device’s system, which could lead to an increased attack surface
of your network environment. This is especially true with new computer
systems on which vendors will often pre-install a large number of trial
software and applications—referred to as “bloatware”—that users may not
find useful. The Cybersecurity and Infrastructure Security Agency (CISA)
recommends that you research and remove any software or services that are
not being used regularly.
9. Adjust factory-default configurations on software and hardware. Many
software and hardware products come “out of the box” with overly
permissive factory-default configurations intended to make them user-
friendly and reduce the troubleshooting time for customer service.
Unfortunately, these default configurations are not geared towards security.
Leaving them enabled after the installation may create more avenues for an
attacker to exploit. Users should take steps to harden the default
configuration parameters to reduce vulnerabilities and protect against
intrusions.
10. Change default log-in passwords and usernames. Most network
devices are pre-configured with default administrator passwords to simplify
setup. These default credentials are not secure—they may be readily
available on the internet, or may even be physically labeled on the device
itself. Leaving these unchanged creates opportunities for malicious cyber
actors to gain unauthorized access to information, install malicious
software, and cause other problems.
11. Use strong and unique passwords. Choose strong passwords to help
secure your devices. Additionally, do not use the same password with
multiple accounts. This way, if one of your accounts is compromised, the
attacker will not be able to breach any other of your accounts. (See
Choosing and Protecting Passwords for more information.)
12. Run up-to-date antivirus software. A reputable antivirus software
application is an important protective measure against known malicious
threats. It can automatically detect, quarantine, and remove various types
of malware, such as viruses, worms, and ransomware. Many antivirus
solutions are extremely easy to install and intuitive to use. CISA
recommends that all computers and mobile devices on your home network
run antivirus software. Additionally, be sure to enable automatic virus
definition updates to ensure maximum protection against the latest threats.
Note: because detection relies on signatures—known patterns that can
identify code as malware—even the best antivirus will not provide adequate
protections against new and advanced threats, such as zero-day exploits
and polymorphic viruses.
13. Install a network firewall. Install a firewall at the boundary of your
home network to defend against external threats. A firewall can block
malicious traffic from entering your home network and alert you to
potentially dangerous activity. When properly configured, it can also serve
as a barrier for internal threats, preventing unwanted or malicious software
from reaching out to the internet. Most wireless routers come with a
configurable, built-in network firewall that includes additional features—
such as access controls, web-filtering, and denial-of-service (DoS) defense—
that you can tailor to fit your networking environment. Keep in mind that
some firewall features, including the firewall itself, may be turned off by
default. Ensuring that your firewall is on and all the settings are properly
configured will strengthen the network security of your network. Note: your
internet service provider (ISP) may be able to help you determine whether
your firewall has the most appropriate settings for your particular
equipment and environment.
14. Install firewalls on network devices. In addition to a network firewall,
consider installing a firewall on all computers connected to your network.
Often referred to as host- or software-based, these firewalls inspect and
filter a computer’s inbound and outbound network traffic based on a
predetermined policy or set of rules. Most modern Windows and Linux
operating systems come with a built-in, customizable, and feature-rich
firewall. Additionally, most vendors bundle their antivirus software with
additional security features such as parental controls, email protection, and
malicious websites blocking.
15. Regularly back up your data. Make and store—using either external
media or a cloud-based service—regular backup copies of all valuable
information residing on your device. Consider using a third-party backup
application, which can simplify and automate the process. Be sure to
encrypt your backup to protect the confidentiality and integrity of your
information. Data backups are crucial to minimize the impact if that data is
lost, corrupted, infected, or stolen.
16. Increase wireless security. Follow the steps below to increase the
security of your wireless router. Note: consult your router’s instruction
manual or contact your ISP for specific instructions on how to change a
particular setting on your device.
17. Use the strongest encryption protocol available. CISA recommends
using the Wi-Fi Protected Access 3 (WPA3) Personal Advanced Encryption
Standard (AES) and Temporary Key Integrity Protocol (TKIP), which is
currently the most secure router configuration available for home use. It
incorporates AES and is capable of using cryptographic keys of 128, 192,
and 256 bits. This standard has been approved by the National Institute of
Standards and Technology (NIST).
18. Change the default service set identifier (SSID). Sometimes referred to
as the “network name,” an SSID is a unique name that identifies a
particular wireless local area network (WLAN). All wireless devices on a
Wireless Local Area Network (WLAN) must use the same SSID to
communicate with each other. Because the device’s default SSID typically
identifies the manufacturer or the actual device, an attacker can use this to
identify the device and exploit any of its known vulnerabilities. Make your
SSID unique and not tied to your identity or location, which would make it
easier for the attacker to identify your home network.
19. Disable Wi-Fi Protected Setup (WPS). WPS provides simplified
mechanisms for a wireless device to join a Wi-Fi network without the need
to enter the wireless network password. However, a design flaw in the WPS
specification for PIN authentication significantly reduces the time required
for a cyberattacker to brute force an entire PIN, because it informs them
when the first half of the eight-digit PIN is correct. Many routers lack a
proper lockout policy after a certain number of failed attempts to guess the
PIN, making a brute-force attack much more likely to occur. See Brute
Force Attacks Conducted by Cyber Actors.
20. Reduce wireless signal strength. Your Wi-Fi signal frequently
propagates beyond the perimeters of your home. This extended emission
allows eavesdropping by intruders outside your network perimeter.
Therefore, carefully consider antenna placement, antenna type, and
transmission power levels. By experimenting with your router placement
and signal strength levels, you can decrease the transmitting coverage of
your Wi-Fi network, thus reducing this risk of compromise. Note: while this
reduces your risk, a motivated attacker may still be able to intercept a
signal that has limited coverage.
21. Turn the network off when not in use. While it may be impractical to
turn the Wi-Fi signal off and on frequently, consider disabling it during
travel or extended periods when you will not need to be online. Additionally,
many routers offer the option to configure a wireless schedule that will
automatically disable the Wi-Fi at specified times. When your Wi-Fi is
disabled, you prevent outside attackers from being able to exploit your
home network.
22. Disable Universal Plug and Plan (UPnP) when not needed. UPnP is a
handy feature that allows networked devices to seamlessly discover and
establish communication with each other on the network. However, though
the UPnP feature eases initial network configuration, it is also a security
risk. Recent large-scale network attacks prove that malware within your
network can use UPnP to bypass your router’s firewall, allow attackers to
take control of your devices remotely, and spread malware to other devices.
You should therefore disable UPnP unless you have a specific need for it.
23. Upgrade firmware. Check your router manufacturer’s website to ensure
you are running the latest firmware version. Firmware updates enhance
product performance, fix flaws, and address security vulnerabilities. Note:
some routers have the option to turn on automatic updates.
24. Disable remote management. Most routers offer the option to view and
modify their settings over the internet. Turn this feature off to guard against
unauthorized individuals accessing and changing your router’s
configuration.
25. Monitor for unknown device connections. Use your router
manufacturer’s website to monitor for unauthorized devices joining or
attempting to join your network. Also see the manufacturer’s website for
tips on how to prevent unauthorized devices from connecting to your
network.
26. Mitigate Email Threats. Phishing emails continue to be one of the most
common initial attack vectors employed by for malware delivery and
credential harvesting. Attacking the human element—considered the
weakest component in every network—continues to be extremely effective.
To infect a system, the attacker simply has to persuade a user to click on a
link or open an attachment. The good news is that there are many
indicators that you can use to quickly identify a phishing email. The best
defense against these attacks is to become an educated and cautious user
and familiarize yourself with the most common elements of a phishing
attack.
27. Use a security-focused DNS service provider. By default, your router
will be configured to forward Domain Name System (DNS) requests to your
ISP, which means you have to trust your ISP to maintain a secure DNS
lookup service. Since DNS acts as the internet’s phone book, locating the IP
addresses of the websites you want to visit, hackers commonly target it to
direct users to malicious websites in a way that’s typically hard to spot.
Companies like Google, Cloudflare, OpenDNS (Cisco) and others offer
publicly available DNS resolvers that are security-focused and even have
encrypted versions.
SELF-CHECK 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS
Fill the blank: write the correct answer
--------------------------1. Its is a wireless router allows multiple users to use the
internet at the same time, but if that is kept wide open, it can be dangerous.
____________________2. Its is a reputable antivirus software application is an
important protective measure against known malicious threats. It can
automatically detect, quarantine, and remove various types of malware, such
as viruses, worms, and ransomware. Many antivirus solutions are extremely
easy to install and intuitive to use.
____________________3. Its is a Anybody who gains access to the router
configuration settings can disable the security you have set up. If you forget
the password, most routers have a hardware reset that will restore all of the
settings to factory defaults.
_____________________4.its is a while it may be impractical to turn the Wi-Fi
signal off and on frequently, consider disabling it during travel or extended
periods when you will not need to be online.
____________________5. Its is a regular software updates are one of the most
effective steps you can take to improve the overall cybersecurity posture of your
home networks and systems.
Enumeration: write the answer in your whole sheet pad paper
1. Gives the secure your computer network?
2. Gives the Secure & check your Computer System And Network?
TASK SHEET 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS
Performance Objective: given necessary tools,equipment and materials,
you should be able to secured the configured computer networks ff.
Standard operating procedures within 2 half hour
Supplies/Materials and Equipment:
Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, etc.
Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment
4. Follow the steps / procedures below:
1. Put In And Monitor Firewall Performance. A firewall is a piece or set of software
or hardware designed to block unauthorized access to computers and networks
2. Update Passwords At Least Every Quarter
3. Maintain Your Anti-Virus Software
4. Create A Virtual Private Network (VPN)
5. Training Your Employees
6. Ask for Help
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-2
CRITERIA YES NO
Did you……
Wear your ppe
Observe safety and proper sanitation
Gather the necessary materrials and equipment
Put In And Monitor Firewall Performance. A firewall is a piece or set of
software or hardware designed to block unauthorized access
to computers and networks
Update Passwords At Least Every Quarter
Maintain Your Anti-Virus Software
Create A Virtual Private Network (VPN)
Training Your Employees
Ask for Help

Contenu connexe

Tendances

Straight&Cross-over cable connection
Straight&Cross-over cable connectionStraight&Cross-over cable connection
Straight&Cross-over cable connectionHoracio Aceveda
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbcHanzel Metrio
 
CSS NC II learning Module
CSS NC II learning ModuleCSS NC II learning Module
CSS NC II learning ModuleEdmund Blanco
 
CSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMCSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMMarvin Bronoso
 
358111385 computer-systems-servicing-dll
358111385 computer-systems-servicing-dll358111385 computer-systems-servicing-dll
358111385 computer-systems-servicing-dllPrince Rainier
 
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSCSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSMarvin Bronoso
 
CSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptxCSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptxAngelito Villalon
 
Ethernet Cable Configuration PPT.pptx
Ethernet Cable Configuration PPT.pptxEthernet Cable Configuration PPT.pptx
Ethernet Cable Configuration PPT.pptxNitzEsplana1
 
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKSCSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKSEric Talamisan
 
TESDA TM1 Portfolio Computer Systems Servicing NC II
TESDA TM1 Portfolio Computer Systems Servicing NC IITESDA TM1 Portfolio Computer Systems Servicing NC II
TESDA TM1 Portfolio Computer Systems Servicing NC IIIan Mars Acut
 
CSS L14 - ETHERNET CABLING
CSS L14 - ETHERNET CABLINGCSS L14 - ETHERNET CABLING
CSS L14 - ETHERNET CABLINGMarvin Bronoso
 
CSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGCSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGMarvin Bronoso
 

Tendances (20)

Network Cable Splicing
Network Cable SplicingNetwork Cable Splicing
Network Cable Splicing
 
LAN Cabling
LAN CablingLAN Cabling
LAN Cabling
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
TLE 10 (ICT): LAN Cabling
TLE 10 (ICT): LAN CablingTLE 10 (ICT): LAN Cabling
TLE 10 (ICT): LAN Cabling
 
Straight&Cross-over cable connection
Straight&Cross-over cable connectionStraight&Cross-over cable connection
Straight&Cross-over cable connection
 
ICT 10 Lesson Plan
ICT 10 Lesson PlanICT 10 Lesson Plan
ICT 10 Lesson Plan
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 
2 set-up-computer-networks
2 set-up-computer-networks2 set-up-computer-networks
2 set-up-computer-networks
 
318245866 rating-sheet
318245866 rating-sheet318245866 rating-sheet
318245866 rating-sheet
 
CSS NC II learning Module
CSS NC II learning ModuleCSS NC II learning Module
CSS NC II learning Module
 
CSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMCSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEM
 
358111385 computer-systems-servicing-dll
358111385 computer-systems-servicing-dll358111385 computer-systems-servicing-dll
358111385 computer-systems-servicing-dll
 
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSCSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
 
CSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptxCSS-10-Q3-COC-2-Week-3-Day-1.pptx
CSS-10-Q3-COC-2-Week-3-Day-1.pptx
 
Ethernet Cable Configuration PPT.pptx
Ethernet Cable Configuration PPT.pptxEthernet Cable Configuration PPT.pptx
Ethernet Cable Configuration PPT.pptx
 
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKSCSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
CSS CORE 1 - INSTALL & CONFIGURE COMPUTER SYSTEMS AND NETWORKS
 
TESDA TM1 Portfolio Computer Systems Servicing NC II
TESDA TM1 Portfolio Computer Systems Servicing NC IITESDA TM1 Portfolio Computer Systems Servicing NC II
TESDA TM1 Portfolio Computer Systems Servicing NC II
 
LAN CABLING
LAN CABLING LAN CABLING
LAN CABLING
 
CSS L14 - ETHERNET CABLING
CSS L14 - ETHERNET CABLINGCSS L14 - ETHERNET CABLING
CSS L14 - ETHERNET CABLING
 
CSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSINGCSS L16 - IP ADDRESSING
CSS L16 - IP ADDRESSING
 

Similaire à COC2_edited.docx

lo-1-planning-and-designing-internet-infrastructure.docx
lo-1-planning-and-designing-internet-infrastructure.docxlo-1-planning-and-designing-internet-infrastructure.docx
lo-1-planning-and-designing-internet-infrastructure.docxSantaBest
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
CMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERCMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERHamesKellor
 
CMIT 265 Education Redefined / snaptutorial.com
CMIT 265  Education Redefined / snaptutorial.comCMIT 265  Education Redefined / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.comMcdonaldRyan211
 
Cmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comCmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comWilliamsTaylorza49
 
Networking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptxNetworking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptxTETALAVENKATASIVARED1
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
 
Majid Ali_original
Majid Ali_originalMajid Ali_original
Majid Ali_originalMazid Ali
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docxdohertyjoetta
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+CompTIA
 
Nagaraja B_CV
Nagaraja B_CVNagaraja B_CV
Nagaraja B_CVNagaraj B
 
Nagaraja B_CV
Nagaraja B_CVNagaraja B_CV
Nagaraja B_CVNagaraj B
 
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docxJeremiahvmacaraeg
 
IRJET- Wifi based Smart Electric Meter using IoT
IRJET-  	  Wifi based Smart Electric Meter using IoTIRJET-  	  Wifi based Smart Electric Meter using IoT
IRJET- Wifi based Smart Electric Meter using IoTIRJET Journal
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case StudiesControlEng
 

Similaire à COC2_edited.docx (20)

lo-1-planning-and-designing-internet-infrastructure.docx
lo-1-planning-and-designing-internet-infrastructure.docxlo-1-planning-and-designing-internet-infrastructure.docx
lo-1-planning-and-designing-internet-infrastructure.docx
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
CMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERCMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPER
 
En35793797
En35793797En35793797
En35793797
 
CMIT 265 Education Redefined / snaptutorial.com
CMIT 265  Education Redefined / snaptutorial.comCMIT 265  Education Redefined / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.com
 
Cmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comCmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.com
 
Networking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptxNetworking Essentials 2.0 Module2.pptx
Networking Essentials 2.0 Module2.pptx
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
Majid Ali_original
Majid Ali_originalMajid Ali_original
Majid Ali_original
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Week2
Week2Week2
Week2
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
 
AbdullahCV
AbdullahCVAbdullahCV
AbdullahCV
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+Keeping the World Connected with CompTIA Network+
Keeping the World Connected with CompTIA Network+
 
Nagaraja B_CV
Nagaraja B_CVNagaraja B_CV
Nagaraja B_CV
 
Nagaraja B_CV
Nagaraja B_CVNagaraja B_CV
Nagaraja B_CV
 
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
 
IRJET- Wifi based Smart Electric Meter using IoT
IRJET-  	  Wifi based Smart Electric Meter using IoTIRJET-  	  Wifi based Smart Electric Meter using IoT
IRJET- Wifi based Smart Electric Meter using IoT
 
Industrial Ethernet, Part 2: Case Studies
Industrial Ethernet,Part 2: Case StudiesIndustrial Ethernet,Part 2: Case Studies
Industrial Ethernet, Part 2: Case Studies
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

COC2_edited.docx

  • 1. COMPETENCY-BASED LEARNING MATERIAL COMPUTER SYSTEMS SERVICING NCII Sector : ELECTRONIC SECTOR Qualification : COMPUTER SYSTEMS SERVICING NCII Unit of Competency : SET-UP COMPUTER NETWORKS Module Title : SETTING-UP COMPUTER NETWORKS MARIA CRISTINA NATIONAL HIGH SCHOOL INFORMATION COMMUNICATION TECHNOLOGY
  • 2. HOW TO USE THIS COMPETENCY –BASED LEARNING MATERIAL Welcome! The unit of competency, Setting up Computer Networks“”, is one of competencies of Computer Systems Servicing NCII, a course which comprises the knowledge, skills and attitudes in logging/recording business transactions in an and Configuring Firewall with Advance Settings. In this module, you are required to go through a series of learning activities in order to complete each learning outcome. In each learning outcome are Information Sheets, Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the activities on your own. If you have questions, do not hesitate to ask for assistance from you facilitator. Remember to: Work through all the information and complete the activities in each section. Read information sheets and complete the self-check. Suggested references are included to supplement the materials provided in this module. Most probably, your trainer will also be your supervisor or manager. He is there to support you and show you the correct way of doing things.
  • 3. You will be given plenty of opportunities to ask questions and practice on the job. Make sure you practice your new skills during regular work shifts. This way you will improve you speed, memory and your confidence. Use the Self-Checks, Operation Sheets or Task or Job Sheets at the end of each section to test your own progress. Use the Performance Criteria Checklist located after the sheet to check your own performance. When you feel confident that you have had sufficient practice, ask your Trainer to evaluate you. The results of your assessment will be recorded in your Progress Chart and Accomplishment Chart. You need to complete this module before you can perform the next module, Inspect and test the configured computer networks.
  • 4. COMPETENCY-BASED LEARNING MATERIALS List of Competencies No. Unit of Competency Module Title Code 1. Install and configure Installing and configuring ELC724331 computer systems computer systems 2. Set-up Computer Setting up Computer ELC724332 Networks Networks 3. Set-up Computer Setting up Computer ELC724333 Servers Servers Maintain and Repair Maintaining and ELC724334 4. Computer Systems and Repairing Computer Networks Systems and Networks
  • 5. MODULE CONTENT UNIT OF COMPETENCY SET UP COMPUTER NETWORK MODULE TITLE Setting up Computer Network MODULE DESCRIPTOR: This module covers the outcomes required in Setting-up computers networks for LANs and Small-office home-office (SOHO) systems. It Consists of competencies to install Ethernet Cables, set network configuration, set router/Wi- Fi/ wireless access point/repeater configuration As well as to inspect and test the configured Computer networks. NOMINAL DURATION: 40 HOURS LEARNING OUTCOMES: At the end of this module you MUST be able to: 1. Install Ethernet cables 2. Set network configuration 3.Inspect and test the configured computer networks ASSESSMENT CRITERIA: 1. Cable routes are determined and planned in accordance with network design and actual installation site.
  • 6. 2. Network materials necessary to complete the work are identified and obtained in accordance with established procedures and checked against systems requirements 3. Tools, equipment and testing devices needed to carry out the installation work are obtained in accordance with established procedures and checked for correct operation and safety 4. Appropriate personal protective equipment is used and OHS policies and procedures are followed 5. Copper cable splicing is performed based on Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA) standards 6. Ethernet cables and cable raceway are installed in accordance with established procedures and installation requirements 7. Installation work is performed and is checked to ensure no unnecessary damage has occurred and complies with requirements 8. OHS standards and 5S principles are followed according to enterprise requirements 9. Excess components and materials are disposed of based on WEEE directives and 3Rs waste management program. 10. Network connectivity of each terminal is checked in accordance with network design. 11. Any fault or problem in the network system is diagnosed and remedied in line with the standard operating procedures. 12. Network interface card (NIC) settings are configured in accordance with network design. 13. Communication checking between terminals are carried out in accordance with OS network configuration guides 14. Unplanned events or conditions are responded to in accordance with established procedures 15. Client Device systems settings are configured in accordance with manufacturers’ instructions-user preferences and end 16. Local area network (LAN) port is configured in accordance with manufacturers’ instructions and network des 17. Wide area network (WAN) port is configured in accordance with manufacturers’ instructions and network des 18. Wireless settings are configured in accordance manufacturers’ instructions, network design and end-user preferences 19. Security/Firewall/Advance settings are configured in accordance with manufacturers’ instructions-user preferences and end
  • 7. 20. Final inspections are undertaken to ensure that the configuration done on The computer networks conforms with the man instruction/manual 21. Computer networks are checked to ensure safe operation. 22. Reports are prepared/completed according to company requirements.
  • 8. UNIT OF COMPETENCY SET UP COMPUTER NETWORK MODULE TITLE Setting up Computer Network MODULE DESCRIPTOR: This module covers the outcomes required in Setting-up computers networks for LANs and Small-office home-office (SOHO) systems. It Consists of competencies to install Ethernet Cables, set network configuration, set router/Wi- Fi/ wireless access point/repeater configuration As well as to inspect and test the configured Computer networks.  LEARNING OUTCOME NO.1  INSTALLING ETHERNET CABLES CONTENTS: 1. NETWORK MATERIALS,TOOLS AND EQUIPMENT 2. CREATING A NETWORK CABLE DEVICE ASSESSMENT CRITERIA: 1. Cable routes are determined and planned in accordance with network design and actual installation site. 2. Network materials necessary to complete the work are identified and obtained in accordance with established procedures and checked against systems requirements 3. Tools, equipment and testing devices needed to carry out the installation work are obtained in accordance with established procedures and checked for correct operation and safety 4. Appropriate personal protective equipment is used and OHS policies and procedures are followed 5. Copper cable splicing is performed based on Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA) standards 6. Network cables and cable raceway are installed in accordance with established procedures and installation requirements 7. Installation work is performed and is checked to ensure no unnecessary damage has occurred and complies with requirements 8. OHS standards and 5S principles are followed according to enterprise requirements
  • 9. Excess components and materials are disposed of based on WEEE directives and 3Rs waste management program RESOURCES: Tools, Materials and Equipment and Facilities METHODOLOGIES: Lecture /discussion Demonstration Self-learning
  • 10. INFORMATION SHEET 1.1-1 NETWORK MATERIALS,TOOLS AND EQUIPMENT LEARNING OBJECTIVES: After reading of this Information Sheet, you should be able to: 1. Determine the network materials,tools and equipments 2. Identify the network materials,tools and equipments Network equipment and cables An IT network connects all your devices, plus other peripheral equipment such as printers To build a network you will need a range of equipment including the following:  Cables and connectors. These link together the computers, printers, servers and other equipment on your network.  A router. This manages network traffic, ensuring devices can communicate with each other via both wired and wireless connections, and provides internet connectivity.  A wireless access point (optional). This will extend your wireless network if the router is incapable of offering coverage in certain parts of the building.  An internet connection. This could be a faster fibre connection or dedicated leased line.  A hardware firewall. This creates a secure barrier between your network and the internet, blocking security threats. Networks sometimes include an on-site network server which runs central applications, acts as an email server and provides file storage.
  • 11. Network hardware building blocks Some businesses still build their network with cables because they're very reliable and fast. The most common type is Ethernet cable, which is rated for speed. Cat 6 cables can carry data fast enough for any business purpose. When building their network most businesses install network sockets at convenient locations in their premises, so computers and other devices can be plugged into the network. The sockets cost about £3 each. The router: a vital network component The router acts as a signpost, indicating where data on your network should go and enables devices to communicate with one another. Routers also connect directly to the internet and share the connection via cable or Wi-Fi with devices on the network. A basic router with four wired connections will cost from £70. A more advanced model, with 24 connections, could cost £150 or more. Going wireless Routers also include Wi-Fi capability, enabling people to connect laptops, smartphones, tablets and other devices to the network wirelessly. Wi-Fi is ideal for providing network access to staff with mobile devices and in meeting rooms or common areas. It's also useful for offering internet access to visitors, with many routers including a separate 'guest' network for the purpose. Wireless routers start at around £70. Network equipment speeds Most network equipment complies with common standards, so you can combine routers, cables and firewalls from different manufacturers. However, the speed of your network might be governed by the slowest element. For example, if all your cables and computers are rated to Cat 6, make sure your router is rated to Cat 6 too. There are a number of wireless networking standards to take into account, although the majority of modern devices will include support for the latest versions. Try to get a wireless router or access point rated to 'Wireless n' or '802.11n'; it's the fastest type available, but will still work with older wireless equipment, too. What are the Equipment, tools and materials needed in Connecting two computers using wired connection ?
  • 12. RJ45 RJ means Registered jack. This is a standard physical Network Interface used for connecting telecommunications equipment commonly, a computer networking equipment UTP CABLE The cheapest cable use in computer in networking is the UTP (Unshielded Twisted Pair) cable. Other use the STP (Shielded Twisted Pair) cable which is cost much than UTP but more reliable. CRIMPER Crimping tool is used to join the RJ-45 and RJ-11 connectors to the both ends of either phone or CAT5 cable. WIRE STRIPPER A tool designed to remove the protective covering (jacket) off of a cable to expose the inner wires. Because different wires come in different shapes, there are dozens of different wire strippers available.
  • 13. LAN TESTER A cable tester is a device that is used to test the strength and connectivity of a particular type of cable or other wired assemblies. NETWORK INTERFACE CARD Short for Network Interface Card, the NIC is also referred to as an Ethernet card and network adapter. It is an expansion card that enables a computer to connect to a network; ROUTER A router is a networking device that forwards data packets between computer networks. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination node.
  • 14. SWITCH HUB A network switch (also called switching hub, bridging hub, and by the IEEE MAC bridge) is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. BAY RACK A rack, in an IT (information technology) context, is a supporting framework that holds hardware modules. In this context, racks typically contain servers, hard disk drives and other computing equipment. Racks make it possible to contain a lot of equipment in a small physical footprint without requiring shelving. PATCH PANEL a board in a switchboard, computer, or other device with a number of electric sockets that may be connected in various combinations. Modular box A modular PC is a computer that has individually-housed components, which are interconnected but separately removable for service or upgrading. . While Piston is upgradable, modules are not actually individually housed, making them more similar to the way typical desktops are modular, with bare PCB-based parts.
  • 15. 2 COMPUTER DESKTOP an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program. RACEWAY or SLOTTED Slotted PVC cable raceways are very convenient for cable laying of on-wall installations in offices, laboratories, workshops etc. Raceways are made of very hard, self-extinguishing PVC, with temperature resistance to 70 Co. COMPUTER TABLE a flat surface, usually supported by four legs, used for putting things on UNINTERRUPTIBLE POWER SUPPLY An uninterruptible power supply (UPS) is a device that allows a computer to keep running for at least a short time.
  • 16. SELF-CHECK 1.1-1 NETWORK MATERIALS,TOOLS AND EQUIPMENT Fill the blank : Write the correct answer in the blank _______________1. Its is a network switch (also called switching hub, bridging hub, and by the IEEE MAC bridge) is networking hardware that connects deviceson a computer network by using packet switching to receive and forward datato the destination device. _______________2. Its is a board in a switchboard, computer, or other device with a number of electric sockets that may be connectedin various combinations. _______________3. is a networking device that forwards data packets between computer networks. A packet is typically forwarded from one router toanother router through the networks thatconstitute an internetwork (e.g. the Internet) until it reaches its destination node. _______________4. A cable tester is a device that is used to test the strength andconnectivity of a particular type of cable or other wired assemblies. ________________5. is a standard physical Network Interface used for connecting telecommunications equipment commonly, a computer networking equipment. Enumeration: write in your whole sheet of pad paper 1.what are the Equipment, tools and materials needed in Connecting two computers using wired connection? 2. what is to build a network you will need a range of equipment?
  • 17. TASK SHEET 1.1-1 NETWORK MATERIALS,TOOLS AND EQUIPMENT Performance Objective: given necessary tools,equipment and materials, you should be able to networking material,tools, and equipment ff. Standard operating procedures within 1 hour Supplies/Materials and Equipment: Rj45 , crimper ,utp cable, lan tester ,router ,switch hub,bay rack 2 computer systems unit,table, etc. Steps / Procedure: 1.Wear your ppe 2.Observe safety and proper sanitation 3.Gather the necessary materrials and equipment 4.Follow the steps / procedures below: Memories and familiar of the networking material,tools, and equipment . Assessment Method: Demonstration
  • 18. INFORMATION SHEET 1.1-2 CREATING A NETWORK CABLE DEVICE LEARNING OBJECTIVES: After reading of this Information Sheet, you should be able to: 1. Determine the netwok cable device 2. Identify to creating a network cable device What is a network cable device? Networking cables are networking hardware used to connect one network device to other network devices or to connect two or more computers to share printers, scanners etc.Electrical connections using twisted pair or coaxial cable are used within a building. Different Types Of Network Cabling Four Types Of Network Cabling Network cable acts like a medium through which information travels from one network device to the other. The type of cable selected for a network depends on the network’s size, topology, and procedure. The various types of network cables act as the backbone of the network infrastructure. Selecting the correct type of network cabling can effect various business functions because enterprise network admins employ new technologies. The type of network cable used in any network infrastructure is one of the most vital aspect of networking in various industries.
  • 19. Coaxial Cable It has a single copper conductor in the middle. A plastic layer provides insulation between the braided metal shield and center conductor. The metal shield blocks outer interference from motors, fluorescent lights, and other computers. Coaxial cabling is extremely resistant to signal obstruction though it is complex to install. It can handle great cable lengths between network devices than the twisted pair cable. The two types of coaxial cables are thin coaxial and thick coaxial. Shielded Twisted Pair (STP) Cable It is a special kind of copper telephone wiring used in business installations. An external shield which functions as a ground is added to the normal twisted pair telephone wires. Shielded twisted pair may be the answer if you want to place the cable in an area with potential interference and risk to the electrical current in the UTP. Shielded cables can also help in expanding the distance between the cables. Fiber Optic Cable Fiber optic cabling consists of a center glass core surrounded by many layers of protective materials. It removes the problem of electrical obstruction by transmitting light rather than electronic signals. This makes them perfect for certain atmospheres which contain huge amount of electrical interference. It has become the standard for connecting networks between buildings because of its resistance to lighting and moisture.
  • 20. Ensure your system establishment is 100% consistent and converse with Dimtech today. Unshielded Twisted Pair It is the most admired type of network cable in the world. UTP cable is used for both conventional telephone and computer networking. The various wiring schemes for UTP are:  CAT1 which is used for telephone wire. CAT2 supports speeds up to 4 Mbps and used frequently for token ring networks.  CAT3 and CAT4 are both used for Token Ring networks for higher network speeds.  CAT5 wire is now replaced by the CAT5e designs providing an enhanced crosstalk specification allowing it to support speeds up to 1 Gbps. It is the most used network cabling specification in the world.  CAT6 support speeds of 1 Gbps for length up to 100 meters and 10 Gbps up to 55 meters. Organizations using CAT6 cabling should use a specialized cable analyzer to request a complete test report, to ensure that the the CAT6 guidelines and standards have been followed during the installation.  The CAT7 is a fresh copper cable pattern which can support speeds of 10Gbps and length up to 100 meters. For the development of a successful network in an organization, understanding the different types of cable and how they affect other aspects of a network is vital. Network Cabling in Perth
  • 21. RJ45 and CAT 6 are the most widely recognized innovations out there with regards to organize cabling. As system cabling masters, Dimtech comprehends the significance of utilising the right cabling. Our network cabling work consents to all statutes, directions, and models. This is vital on the grounds that numerous suppliers will utilise shabby, substandard cabling which does not follow national norms. Ensure your system establishment is 100% consistent and converse with Dimtech today. STEPS IN CREATING A NETWORK CABLE STRAIGHT THROUGH TYPE A TYPE B CROSS OVER COLOR CODE
  • 22. NOTED: Memorize the color code combination before doing this activity. Above, you could see the color assigned for each pin. Creating of a STRAIGHT THROUGH network cable Materials Needed: 2 RJ45 1 meter Network Cable – UTP cable Tools Needed: Crimping Tool Wire Stripper LAN Tester Equipment Needed: 2 Working computers with Network Adapter (LAN port) STEP BY STEP TO STRAIGHT THROUGH CABLE Cut the cable insulator to show all the eight wires
  • 23. Strip off the insulator Separate all eight wires Position all eight wires according to its assigned pins in the RJ45
  • 24. Position all wires. Make sure that all are in proper pin assignment Cut the wires Make sure that the cut is even and small enough for the RJ45
  • 25. Put all wires inside the RJ45. Make sure all wires reach the pins
  • 26. HOW TO TEST YOUR NETWORK CABLE? A LAN TESTER is a hand held electronic device. It is used to verify electrical connections in a cable network. Signal strength, particularly in a computer networks, is crucial for data transmission. A LAN TESTER can come in one of many shapes & sizes, and may have multiple functions. A hand held battery-powered tester checks for insulation losses and crossed wiring, and is generally easy to use. Most testers are designed with two parts – the tester itself and a remote. Testers typically have different testing ports to test today’s most popular media including ports for RJ-45, RJ-11, USB and BNC. WHEN TO USE A LAN TESTER: Once you are ready to check if a cable is set up properly to achieve a strong connection between source and destination. That time is, typically, after installation / set up is complete. It is good practice to test the system once all components are connected in order to assure the job has been done properly. If the test shows connectivity troubleshoots, you can address the issue(s) and retest. POSSIBLE ISSUES: Connection between server and computer(s) is weak Outside interference causing data loss or decreased signal strength Faulty cable HOW TO USE A LAN TESTER: 1. Select the cable to be tested and make sure it is not plugged to any electrical power and free of any packaging or tangled with other cables, to prevent false reading. 2. Visually inspect the cable for damage. If cable is broken or torn it should be replaced. 3. Plug the network cable into the appropriate port on the cable tester, and then connect the other end of the cable to the remote. 4. Switch the tester on to test your cable. The tester will show results, and if applicable, will indicate what the potential problem is
  • 27. PC to PC Networking Requirements: 1. Two Computers with compatible O.S. and Ethernet adapter. 2. Cross Over Cable 1.Plug the both End of cross over network cable on two ethernet port of two computers as shown above. 2.Assign the following on both computers: IP Address, Subnet Mask, Gateway, Computer Name and Workgroup Name. To Assign IP address on computer, follow these steps:
  • 28. SELF-CHECK 1.1-2 CREATING A NETWORK CABLE DEVICE ENUMERATION: Write the correct answer in your whole sheet of pad paper 1.What is the color coding of straight through? 2.What is the color coding of cross over? 3. What is the network cable devices? 4. Four Types Of Network Cable? 5. How to test Network Cable?
  • 29. TASK SHEET 1.1-2 CREATING A NETWORK CABLE DEVICE Performance Objective: given necessary tools,equipment and materials, you should be able to creating a network cable device ff. Standard operating procedures within 1 half hour Supplies/Materials and Equipment: Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack Patch panel ,2 computer systems unit,table, etc. Steps / Procedure: 1.Wear your ppe 2.Observe safety and proper sanitation 3.Gather the necessary materrials and equipment 4.Follow the steps / procedures below: .  Unroll the required length of network cable and add a little extra wire, just in case.  Carefully remove the outer jacket of the cable  Inspect the newly revealed wires for any cuts or scrapes that expose the  Untwist the pairs so they will lay flat between your fingers.  Arrange the wires based on the wiring specifications you are following.  You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires are switched.  Press all the wires flat and parallel between your thumb and forefinger  Keep the wires flat and in order as you push them into the RJ-45 plug with the flat surface of the plug on top  Place the wired plug into the crimping tool  Repeat all of the above steps with the other end of the cable  Test the cable to ensure that it will function in the field
  • 30. Assessment Method: Demonstration PERFORMANCE CRITERIA CHECKLIST 1.1-2 CRITERIA YES NO Did you…… Wear your ppe Observe safety and proper sanitation Gather the necessary materrials and equipment Unroll the required length of network cable and add a little extra wire, just in case. Carefully remove the outer jacket of the cable Inspect the newly revealed wires for any cuts or scrapes that expose the Untwist the pairs so they will lay flat between your fingers. Arrange the wires based on the wiring specifications you are following. You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires are switched. Press all the wires flat and parallel between your thumb and forefinger Keep the wires flat and in order as you push them into the RJ-45 plug with the flat surface of the plug on top Place the wired plug into the crimping tool Repeat all of the above steps with the other end of the cable Test the cable to ensure that it will function in the field
  • 31.  LEARNING OUTCOME NO.2  SETTING NETWORK CONFIGURATION CONTENTS: 1. CONFIGURE A WIRELESS ROUTER 2. CONFIGURE NETWORK CONNECTIVITY ASSESSMENT CRITERIA: 1. Network connectivity of each terminal is checked in accordance with network design. 2. Any fault or problem in the network system is diagnosed and remedied in line with the standard operating procedures. 3. Network interface card (NIC) settings are configured in accordance with network design. 4. Communication checking between terminals are carried out in accordance with OS network configuration guides 5.Unplanned events or conditions are responded to in accordance with established procedures RESOURCES: Tools, Materials and Equipment and Facilities METHODOLOGIES: Lecture /discussion Demonstration Self-learning
  • 32. INFORMATION SHEET 2.1-1 CONFIGURE A WIRELESS ROUTER LEARNING OBJECTIVES: After reading of this Information Sheet, you should be able to: 1. Determine the configure a wireless router 2. Identify the configure a wireless router Wireless Configuration (WZC), also known as Wireless Auto Configuration, or WLAN AutoConfig, is a wireless connection management utility included with Microsoft Windows XP and later operating systems as a service that dynamically selects a wireless network to connect to based on a user's preferences and various default settings.[1][2] This can be used instead of, or in the absence of, a wireless network utility from the manufacturer of a computer's wireless networking device. The drivers for the wireless adapter query the NDIS Object IDs and pass the available network names (SSIDs) to the service. The service then lists them in the user interface on the Wireless Networks tab in the connection's Properties or in the Wireless Network Connection dialog box accessible from the notification area. A checked (debug)[3] build version of the WZC service can be used by developers to obtain additional diagnostic and tracing information logged by the service.
  • 33. SET-UP A WIRELES ROUTER As more and more devices are able to connect to wireless networks, setting up a wireless router has become a crucial step for virtually any home network. Setting up a wireless network will allow your devices to connect to the internet from practically anywhere in the house, without the need for messy wires.[1] To get started setting your HOW TO SET UP A WIRELESS ROUTER Purchase a wireless router. Routers come in all shapes and sizes. Compare features to find the router that is right for you. If you have more area that you need to cover, or have lots of walls in your home, you’ll need a router that offers the option of upgrading antenna(s) with high gain types - if not supplied in the box. If more than one wireless device will be connecting at the same time at different speeds, a MiMo type router is recommended, otherwise the speed for all devices will drop the highest supported by all at that time.  All modern routers should support 802.11n, or Wireless-N). This is the most stable, offers the fastest speeds and is backwards compatible with older standards such as 802.11g.
  • 34. 2.Connect your router to your modem.[2] Routers and wireless routers enable you to share your broadband internet connection with multiple devices. To do so, you will need to connect your broadband modem to the router. For best results, place your router near your modem.  Connect the router and the modem with an Ethernet cable. Most routers come packaged with a short Ethernet cable that you can use for this.  Connect the modem to the WAN / Internet Port on your router. It is usually offset, and may be a different color from the LAN Ports. WAN stands for "Wide Area Network" which is what the internet actually is. LAN stands for "Local Area Network". The router will assign a local or "private" IP address to any device connected to its LAN Ports or WiFi signal from a pool of private addresses (listed further below).
  • 35. 3.Connect any devices you want to hard wire with CAT 5 (or better) Ethernet cables. If you have computers that are close, or a video game console or TV, you can connect them to the router via Ethernet.[3] This will result in a more stable and faster connection, and doesn’t require any extra configuration. 4.Connect at least one computer via Ethernet. You will need at least one computer connecting via Ethernet cable in order to adjust your router settings. You can disconnect this computer afterwards if you want to connect wirelessly. You can also connect your laptop wirelessly for the first time, the wifi network name and the default password will be printed on the router's label PART 2 SET-UP :
  • 36. 1.When you power on the router, it will only create its wi-fi network, and the device will be connected to the router's wi-fi connection, not the internet. To connect the router to the internet, with some internet providers (i.e. GTPL in India), it is required to register router's MAC address to the internet service provider's website.  MAC of the router can be found printed on router or in the documents etc. 2.Go to the internet service provider's website. Type ip address Log in with the username and password provided by the internet service provider and go to MAC address update option. one can see their existing laptop / computers MAC address there. Add the router's MAC address there and save it. This process means that the router is authorized to use the internet provide by the broadband company. PART 3 SET-UP: Configuring the Router 1.Find the IP address of the router. If this is a new installation or new router, determine the default IP address that may be printed on a label affixed to the
  • 37. router or in the documentation.[4] If you can’t find the router’s IP address anywhere, you can do a web search for the router model to see what the default address is.  IP addresses are formatted as four groups of up to three digits, separated by periods.  Commonly found "default" Local IP addresses for routers are 192.168.0.1, 192.168.1.1, 192.168.2.1, 10.0.0.1. Note that all the addresses in the follow ranges: 192.168.0.0 - 192.168.255.255, 172.16.0.0 - 172.31.255.255 & 10.0.0.0 - 10.255.255.255 have been set aside for exclusive use in a LAN; and one address in the range of any of them of them would be assigned to the connected router. 2.Enter your username and password. In order to access the configuration page, you will need to be on the router's IP address and enter a valid username and password at the prompt. Most routers have a basic account set up that you will need to use to log on. This varies from model to model, but should be printed on the router or in the documentation.  The most typical username is “admin”.  The most typical passwords are “admin” and “password”.  Many routers will only require a username and a blank password, and some allow you to leave all fields blank.  If you can’t figure out the correct IP address, your username or password, search for your router model online to see what the default login is. If it has been changed, press the Reset button on the back of the router for 10 (to 30+ seconds as dictated in the instructions for the router model) to restore factory defaults and try again.
  • 38. 3.Open the Wireless Settings. When you log in to your router, you will be taken to the router’s main menu or status screen. There will be several options to choose from. The Internet section can usually be left at default settings, unless you received specific instructions from your internet service provider. The Wireless section will allow you to set up your wireless network. 4.Enter a name for your wireless network. In the Wireless section, you should see a field labeled SSID or Name. Enter a unique name for your wireless network. This is what other devices will see when scanning for networks.  Check the box to enable SSID broadcast. This will essentially “turn on” the wireless network so that it may be readily seen by anyone in range of the signal. *See the Tips section below for additional information on the SSID setting. 3. Choose a security method. Choose from the list of available security options. For the best security, choose WPA2-PSK as the encryption method. This is the most difficult security to crack, and will give you the most protection from hackers and intruders.
  • 39. 4.Save your settings. Once you are finished naming and securing your wireless network, click the Apply or Save button. The changes will be applied to your router, which may take a few moments. Once the router has finished resetting, your wireless network will be enabled. PART 4 SET-UP: Connecting Your Devices 1. Connect a computer, tablet, or smartphone to the wireless network. Scan for the wireless network with the SSID you provided above. On any device that supports wireless networks, you should see your new network as long as you are within range of the router. Select it and you will be prompted for the passphrase.
  • 40. 2. Enter your wireless passphrase. Once you enter the passphrase, your device will be automatically connected to the wireless network. The network will be stored in your devices memory and will automatically connect whenever you are within range.  For detailed instructions on selecting and joining a wireless network for your specific computer, tablet, or smartphone, follow this guide. 3.Connect your other devices. Besides other computers and tablets, you can connect other devices as well, such as printers, game consoles, TVs and more. See the following guides for instructions for your specific device. SELF-CHECK 2.1-1 CONFIGURE A WIRELESS ROUTER ENUMERATION: Write your answer in your whole sheet of pad paper 1. What is the wireles configuration? 2. HOW TO SET UP A WIRELESS ROUTER ?
  • 41. TASK SHEET 2.1-1 CONFIGURE A WIRELESS ROUTER Performance Objective: given necessary tools,equipment and materials, you should be able to configure a wireless router ff. Standard operating procedures within 1 half hour Supplies/Materials and Equipment: computer systems unit,table, wireless router tp-link Steps / Procedure: 1.Wear your ppe 2.Observe safety and proper sanitation 3.Gather the necessary materrials and equipment 4.Follow the steps / procedures below: . Mentioned in this article Step 1: Place your wireless router. Step 2: Configure your wireless router gateway. Step 3: Connect your gateway to your new router. Step 4: Change your wireless router's admin password. Step 5: Update the router's firmware. Step 6: Establish a password for your Wi-Fi network. Assessment Method: Demonstration
  • 42. PERFORMANCE CRITERIA CHECKLIST 2.1-1 CRITERIA YES NO Did you…… Wear your ppe Observe safety and proper sanitation Gather the necessary materrials and equipment Place your wireless router Configure your wireless router gateway Connect your gateway to your new router Change your wireless router's admin password Update the router's firmware Establish a password for your Wi-Fi network
  • 43. INFORMATION SHEET 2.1-2 CONFIGURE NETWORK CONNECTIVITY LEARNING OBJECTIVES: After reading of this Information Sheet, you should be able to: 1. Determine the configuration of network connectivity 2. Identify the configuration of network connectivity Network Connectivity Definition - What does Network Connectivity mean? Network connectivity describes the extensive process of connecting various parts of a network to one another, for example, through the use of routers, switches and gateways, and how that process works. What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
  • 44. Two very common types of networks include:  Local Area Network (LAN)  Wide Area Network (WAN) You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN). Local Area Network A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network's resources, and many others. Workstations are called such because they typically do have a human user which interacts with the network through them. Workstations were traditionally considered a desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and iPhone, our definition of workstation is quickly evolving to include those devices, because of their ability to interact with the network and utilize network services. Servers tend to be more powerful than workstations, although configurations are guided by needs. For example, a group of servers might be located in a secure area, away from humans, and only accessed through the network. In such cases, it would be common for the servers to operate without a dedicated display or keyboard. However, the size and speed of the server's processor(s), hard drive, and main memory might add dramatically to the cost of the system. On the other hand, a workstation might not need as much storage or working memory, but might require an expensive display to accommodate the needs of its user. Every computer on a network should be appropriately configured for its use.
  • 45. On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access to a wired network is made possible by wireless access points (WAPs). These WAP devices provide a bridge between computers and networks. A typical WAP might have the theoretical capacity to connect hundreds or even thousands of wireless users to a network, although practical capacity might be far less. Nearly always servers will be connected by cables to the network, because the cable connections remain the fastest. Workstations which are stationary (desktops) are also usually connected by a cable to the network, although the cost of wireless adapters has dropped to the point that, when installing workstations in an existing facility with inadequate wiring, it can be easier and less expensive to use wireless for a desktop. See the Topology, Cabling, and Hardware sections of this tutorial for more information on the configuration of a LAN. Wide Area Network Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network. Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN. DIAGRAM NETWORK CONNECTIVITY
  • 46. HOW TO STEP BY STEP NETWORK CONNECTIVITY FIRST : CONNECT CABLE MODEM TO ROUTER SECOND: CONNECT NETWORK CABLE TO ROUTER
  • 47. THIRD : CONNECT ROUTER TO SWITCH HUB FOURTH: CONNECT SWITCH HUB TO PATCH PANEL
  • 48. FIFTH: CONNECT PATCH PANEL TO 2 SYSTEMS UNIT Configuring Network Connections for Windows 7 & window 2008 r2 After the installation of your network driver, you are ready to configure your network. To configure the network of your PC, Right-click on your network connection. You'll see this in your System Tray. If you are connecting your computers through a switch with no router, you'll need to assign each computer on the network its own individual IP address. This process is handled automatically if you're using a router. Think of an IP address as a mailing address. Each computer on the network needs a unique IP address so that information sent across the network reaches the correct destination.
  • 49. CONNECT TO ASSIGN AN IP ADDRESS TO THE CLIENT: Click Open Network and Sharing Center.
  • 50. Click the Ethernet link at the top of the window. You'll see this next to "Connections." Click Properties. Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it, just highlight it.Click Properties.
  • 51. Click the Use the following IP address radio button. Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.
  • 52. Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field. Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field. This is the ip address of router take note:
  • 53. Click OK. This will save the settings for that computer. This computer is now configured on your network with a unique IP address. Network Connecting to Windows 2008 R2 CONNECT TO ASSIGN AN IP ADDRESS TO THE SERVER: A. Click Start B. Right-click Network and click Properties
  • 54. C. Click Local Area Connection D. Click Details. Make note (on a piece of paper) of the address on the right side of IPv4 Address: (For our example, we are building a small network and we will just use a small range of IP addresses. In the real world or for a large network, you would need to actually know TCP/IP, design a range of IP addresses you plan to use, then assign those IP addresses, or design a way to assign the IP addresses to the computers) E. Click Close F. In the Local Area Connection Status dialog box, click Properties
  • 55. G. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4) Click Properties H. Click Use the Following IP Address I. Type the IP address you want the server to use. For our example, and based on the above dialog box, we type 192.168.001.001 J. Press Tab K. Type the subnet mask (normally, it should be added automatically when you press Tab from the previous IP address text box) and press Tab L. Type the default gateway address (use the first and the second octets of the IP address you had provided (such as 192.168) and use 001.001 for the other two bytes) M.Provide the Preferred DNS server address (we use 127.0.0.1 for our example) and the Alternate DNS Server address (we leave ours empty)
  • 56. N. Click Advanced to check the values that were put in the IP Settings and DNS property pages O. Click OK P. Click OK Q. Click Close R. Click Close
  • 57. INFORMATION SHEET 2.1-2 CONFIGURE NETWORK CONNECTIVITY ESSAY: write the correct definition in your whole sheet of pad paper 1.What is the LAN? 2.What is the WAN? 3. What does Network Connectivity mean? 4. Draw the network connectivity diagram? 5. How to step by step network connectivity? 6. how to configure the connection of window 7 and window 2008 r2 server
  • 58. TASK SHEET 2.1-2 CONFIGURE NETWORK CONNECTIVITY Performance Objective: given necessary tools,equipment and materials, you should be able to configure network connectivity ff. standard operating procedures within 1 half hour Supplies/Materials and Equipment: 2 computer systems unit,table, wireless router tp-link,switch hub,patch panel,network cable,modem internet Steps / Procedure: 1.Wear your ppe 2.Observe safety and proper sanitation 3.Gather the necessary materrials and equipment 4.Follow the steps / procedures below: 1.Click the Ethernet link at the top of the window. You'll see this next to "Connections." Click Properties. 2.Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it, just highlight it.Click Properties. 3.Click the Use the following IP address radio button. 4.Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field. 5.Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field. 6.Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field. o This is the ip address of router take note: 7.Click OK. This will save the settings for that computer. This computer is now configured on your network with a unique IP address.
  • 59. Assessment Method: Demonstration PERFORMANCE CRITERIA CHECKLIST 2.1-2 CRITERIA YES NO Did you…… Wear your ppe Observe safety and proper sanitation Gather the necessary materrials and equipment Click the Ethernet link at the top of the window. You'll see this next to "Connections." Click Properties. Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it, just highlight it.Click Properties. Click the Use the following IP address radio button. Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field. Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field. Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field. his is the ip address of router take note: Click OK. This will save the settings for that computer. This computer is now configured on your network with a unique IP address.
  • 60.  LEARNING OUTCOME NO.3  INSPECT AND TEST THE COMFIGURED COMPUTER NETWORKS CONTENTS: 1. Testing the configured computer networks 2. Secured configured computer networks ASSESSMENT CRITERIA: 1. Final inspections are undertaken to ensure that the configuration done on the computer networks conforms with the manufacturer’s instruction/manual 2. Computer networks are checked to ensure safe operation. 3. Reports are prepared/completed according to company requirements. RESOURCES: Tools, Materials and Equipment and Facilities METHODOLOGIES: Lecture /discussion Demonstration Self-learning INFORMATION SHEET 3.1-1
  • 61. TESTING THE CONFIGURED COMPUTER NETWORKS LEARNING OBJECTIVES: After reading of this Information Sheet, you should be able to: 1. Determine the testing computer networks 2. Identify and test the computer networks Network testing definition What is network testing, really? Since I am not very good at explaining things, I went to the Wikipedia article on software testing and found this: “Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation.” – That sounds pretty good to me. But if we take that passage and replace “software” with “network”, we get: “Network testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Network testing can also provide an objective, independent view of the network to allow the business to appreciate and understand the risks of network implementation.” Couldn’t be further from the truth. Network testing is, in the end, making sure that your network configuration works as designed. Network testing is very similar to software testing, with one exception: in contrast to software testing, network testing often has to happen in a production environment, after the configuration change was made. In fact, it is sometimes very difficult, or almost impossible,
  • 62. to model a complex system like a large enterprise network, or the Internet itself, in a lab environment. Thus, network testing is a MUST-HAVE step in the network implementation process. What is Use Case in Testing? A Use Case in Testing is a brief description of a particular use of the software application by an actor or user. Use cases are made on the basis of user actions and the response of the software application to those user actions. It is widely used in developing test cases at system or acceptance level. Use Case Testing Use Case Testing is a software testing technique that helps to identify test cases that cover entire system on a transaction by transaction basis from start to end. Test cases are the interactions between users and software application. Use case testing helps to identify gaps in software application that might not be found by testing individual software components. HOW TO TEST COMPUTER NETWORKS? 1.Testing Network Connectivity A few tools can help you determine whether the network can send data between computers; these tools test the network protocols as well as low-level network hardware layers. Ping ping is a fundamental tool for testing TCP/IP network connectivity. Because most networks today use the Internet (TCP/IP) protocol for file and printer sharing services, as well as for Internet access, most Windows users can use the ping test to confirm that their network cabling, hardware, and the TCP/IP protocol are all functioning correctly. Ping sends several data packets to a specified computer and waits for the other computer to send the packets back. By default, it sends four packets and prints the results of the four tests.
  • 63. To see whether the network can carry data between a pair of computers, use the ipconfig command (described previously) to find the IP address of the two computers. Then, on one computer, open a command prompt window by choosing Start, All Programs, Accessories, Command Prompt. Next, type the following command: Ping 127.0.0.1 This command tests the networking software of the computer itself by sending packets to the special internal IP address 127.0.0.1. This test has the computer send data to itself. It should print the following: Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 If it doesn't, the TCP/IP protocol itself is incorrectly installed or configured; check the computer's IP address configuration, or, if that seems correct, remove and reinstall the Internet Protocol from Local Area Connection in Network Connections. (I have to say, in more than 10 years of working with PC networks, I've never seen this test fail.) If your computer can send data to itself, try another computer on your LAN. Find its IP address by running ipconfig on that computer and then issue the ping command again on the first computer, as in this example:
  • 64. Ping 192.168.0.23 Of course, you should use the other computer's real IP address in place of 192.168.0.23. You should get four replies as before: Reply from 192.168.0.23: bytes=32 time<10ms TTL=32 Reply from 192.168.0.23: bytes=32 time<10ms TTL=32 Reply from 192.168.0.23: bytes=32 time<10ms TTL=32 Reply from 192.168.0.23: bytes=32 time<10ms TTL=32 These replies indicate that you have successfully sent data to the other machine and received it back. If, on the other hand, the ping command returns Request timed out, the packets either didn't make it to the other computer or they were not returned. In either case, you have a problem with your cabling, network adapter, or the TCP/IP protocol setup. You can use ping to determine which computers can send to which other computers on your LAN or across wide area networks (WANs) or the Internet. ping works when given a computer's IP address or its network name. NOTE If you enter a computer name, and ping can't determine the computer's IP address, the problem isn't necessarily a wiring problem—it could be that the DNS or WINS name lookup systems are not working correctly. Try using an IP address with ping in this case to help determine what the problem really is.
  • 65. How to Use the Ping Command to Test Your Network Connectivity The ping command sends packets of data to a specific IP address on a network, and then lets you know how long it took to transmit that data and get a response. It’s a handy tool that you can use to quickly test various points of your network. Here’s how to use it. How Does Ping Work? Ping comes from a term used in sonar technology that sends out pulses of sound, and then listens for the echo to return. On a computer network, a ping tool is built into most operating systems that works in much the same way. You issue the ping command along with a specific URL or IP address. Your computer sends several packets of information out to that device, and then waits for a response. When it gets the response, the ping tool shows you how long each packet took to make the round trip—or tells you there was no reply. It sounds simple, and it is. But you can use it to good effect. You can test whether your computer can reach another device—like your router—on your local network, or whether it can reach a device on the Internet. This can help you determine if a network problem is somewhere on your local network, or somewhere beyond. The time it takes packets to return to you can help you identify a slow connection, or if you’re experiencing packet loss. And it pretty much doesn’t matter what operating system you’re using. Pull up a terminal or Command Prompt window, and you can use ping on macOS, Linux, or any version of Windows.
  • 66. How to Use Ping We’re going to use the Windows Command Prompt in our example here. But you can also use the ping command in Windows PowerShell, or in the Terminal app on macOS or any Linux distro. Once you get to using the actual command, it works the same everywhere. In Windows, hit Windows+R. In the Run window, type “cmd” into the search box, and then hit Enter. At the prompt, type “ping” along with the URL or IP address you want to ping, and then hit Enter. In the image below, we’re pinging www.howtogeek.com and getting a normal response. That response shows the URL you’re pinging, the IP address associated with that URL, and the size of the packets being sent on the first line. The next four
  • 67. lines show the replies from each individual packet, including the time (in milliseconds) it took for the response and the time-to-live (TTL) of the packet, which is the amount of time that must pass before the packet is discarded. At the bottom, you’ll see a summary that shows how many packets were sent and received, as well as the minimum, maximum, and average response time. And in the next image, we’re pinging the router on our local network using its IP address. We’re also getting a normal response from it. When the ping tool does not get a response from whatever devices you’re pinging, it lets you know that, too. And that’s how to use ping at its most basic. Of course, like most commands, there are some advanced switches you can use to make it behave a bit
  • 68. differently. For example, you can have it keep pinging a destination until you stop the command, specify the number of times you want it to ping, set how often it should ping, and more. But unless you’re doing some very specific types of troubleshooting, you won’t need to worry much about those advanced switches. If you’re curious about them, though, just type “ping /?” at the Command Prompt to see a list. So, What Can You Do With Ping? Now that you know how to use the command, here are some interesting things you can do with it:
  • 69.  Ping a URL (like www.howtogeek.com) or IP address to see if you can reach an internet destination. If you get a successful response, you know that all the networking devices between you and that destination are working, including the network adapter in your computer, your router, and whatever devices exist on the internet between your router and the destination. And if you’re interested in exploring those routes further, you can use another networking tool named tracert to do just that.  Ping a URL to resolve its IP address. If you want know the IP address for a particular URL, you can ping the URL. The ping tool shows you right at the top the IP address it’s working with.  Ping your router to see if you can reach it. If you can’t successfully ping an internet location, you can then try pinging your router. A successful response lets you know that your local network is working okay, and that the problem reaching the internet location is somewhere out of your control.  Ping your loopback address (127.0.0.1). If you can’t successfully ping your router, but your router appears to be turned on and working, you can try pinging what’s known as a loopback address. That address is always 127.0.0.1, and pinging it successfully lets you know that the network adapter on your computer (and the networking software in your OS) is working properly. Note: You may not get a ping response from other computers on your local network because the built-in firewalls on those devices prevent them from responding to ping requests. If you want to be able to ping those devices, you’ll need to turn off that setting to allow pings through the firewall. The list above uses a kind of outside-in approach, where you ping the furthest destination first, and then work your way in to the more local devices. Some people like to work inside-out by pinging the loopback address first, then their router (or another local device), and then an internet address. And of course, what we’re talking about in this article is mostly about using ping to perform troubleshooting on a home or small business network. On larger networks, there’s a lot more complexity to worry about. Plus, if you’re tasked with troubleshooting larger networks, you probably already know how to use ping and many other networking tools. TASK SHEET 3.1-1 TESTING THE CONFIGURED COMPUTER NETWORKS
  • 70. Performance Objective: given necessary tools,equipment and materials, you should be able to testing the configured computer networks ff. standard operating procedures within 1 half hour Supplies/Materials and Equipment: 2 computer systems unit,table, wireless router tp-link,switch hub,patch panel,network cable,modem internet,Lan tester. Steps / Procedure: 1.Wear your ppe 2.Observe safety and proper sanitation 3.Gather the necessary materrials and equipment 4.Follow the steps / procedures below: PERFORMANCE CRITERIA CHECKLIST 3.1-1 CRITERIA YES NO Did you……
  • 71. INFORMATION SHEET 3.1-2 SECURED THE CONFIGURED COMPUTER NETWORKS Wear your ppe Observe safety and proper sanitation Gather the necessary materrials and equipment Check the physical connections. Check that the Link light — the little red or green light next to the RJ-45 port — is lit on every computer 1. Verify that you can log on Check the network configuration 2. This command will spit out numerous lines of information 3. 4. Verify that the computers can ping each other
  • 72. LEARNING OBJECTIVES: After reading of this Information Sheet, you should be able to: 1. Determine and secured the computer networks 2. Identify and secured the computer netwroks Checking Network Configuration If hardware isn't at fault, you may have a fundamental network configuration problem. Often the Event Log or Device Manager gives these problems away, but if they don't, you can use another batch of tools to check the computer's network configuration. ipconfig If your computer can't communicate with others on your LAN, after you check the Event Log and Device Manager, use the ipconfig command-line utility to see whether your computer has a valid IP address. Check other computers on the LAN, too, to ensure that they do as well. At the command prompt (which you open by choosing Start, All Programs, Accessories, Command Prompt), type the following command: ipconfig /all The results should look something like this: Windows IP Configuration
  • 73. Host Name . . . . . . . . . . . . : myvpc-hb Primary Dns Suffix . . . . . . . : mycompany.com Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : Yes WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel 21140-Based PCI Fast Ethernet Adapter Physical Address. . . . . . . . . : 00-03-FF-DD-CA-5F DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::ed10:dff9:693c:803d%8(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.15.108(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Friday, October 20, 2006 5:55:11 PM Lease Expires . . . . . . . . . . : Friday, October 27, 2006 5:55:23 PM
  • 74. Default Gateway . . . . . . . . . : 192.168.15.1 DHCP Server . . . . . . . . . . . : 192.168.15.1 DHCPv6 IAID . . . . . . . . . . . : 201327615 DNS Servers . . . . . . . . . . . : 192.168.15.1 NetBIOS over Tcpip. . . . . . . . : Enabled (Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that mention Tunnel adapters.) The most important items to look for are the following:  Host name—This should be set to the desired name for each computer. If you can correspond with some computers but not others, be sure that the ones that don't work are turned on and correctly named. Make sure that you don't have two computers with the same name, and that none of the computer names is the same as the workgroup name.  IP address—This should be set appropriately for your network. If your LAN uses Internet Connection Sharing, the address will be a number in the range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for automatic configuration, your network manager can tell you whether the IP address is correct. Networks with cable/DSL sharing routers usually use numbers starting with 192.168.x where x is a number from 0 to 15. If you see a number in the range 169.254.0.1 through 169.254.255.254, your computer is set for automatic configuration, but no DHCP server was found, so Windows has chosen an IP address by itself. This is fine if your LAN uses this automatic configuration system. However, if there should have been a DHCP server, or if you use Internet Connection Sharing or a hardware Internet Connection router, this is a problem. Restart the ICS computer or the router, and then restart your computer and try again.
  • 75.  Network mask—This usually looks like 255.255.255.0, but other settings are possible. At the least, all computers on the same LAN should have the same network mask. Each computer on the same LAN should have a similar valid IP address and the same network mask. If they don't, check your network configuration. The built-in Windows "Repair" function may also be used to help fix problems with DHCP-based (automatic) IP address assignment. NOTE To learn more about IP addressing, network masks, and configuration, visit support.microsoft.com and search for article number 164015, which is titled "Understanding TCP/IP Addressing and Subnetting Basics." Computer You can check your computer's identification and workgroup or domain membership setup from the Computer window. To do so, click Start, Computer. Look in the Details pane at the bottom of the screen for the computer name and domain or workgroup name, as shown in On a Windows Workgroup network, the workgroup name should be the same on all computers on your workgroup LAN. All of the computer names must be different from each other. NOTE None of your computers can use the workgroup or domain name as its computer name. For example, if your workgroup is MSHOME, you can't also name a computer MSHOME. If you find this on one of your computers, change that computer's name. On a Windows domain network, you should see your computer's name displayed as part of a Windows domain name (for example, my computer named myvpc-hb would be called myvpc-hb.mycompany.com on a domain network) and the domain name. Your domain name might not include .com. It might say .local instead, or may use a different ending. In any case, be sure that your computer is actually a domain member. If the word "workgroup"
  • 76. appears instead, your computer is not a domain member and will not be able to use domain logins or some domain resources. Network Connections You can manually check all installed network protocols and services and their configuration by viewing Network Connections and viewing the properties for Local Area Connection. To view this screen, click Start, Network. At the top of the Network window, click Network and Sharing Center. In the left pane of that window, click Manage Network Settings. Then, right-click your Local Area Connection icon (or the appropriate wireless connection icon) and select Properties. Confirm that each required protocol is installed and correctly configured. In general, the settings on each computer on your LAN should match, except that the IP address differs (usually only in the last of its four dot-separated numbers). If your LAN uses Automatic IP address configuration, you need to use the ipconfig command, described earlier, to check the settings. HOW TO CHECK THE SERVER AND CLIENT NETWORK? What Is a Client-Server Network? A client-server network is designed for end-users, called clients, to access resources such as files, songs, video collections, or some other service from a central computer called a server. A server's sole purpose is to do what its name implies - serve its clients! You may have been using this configuration and not even have known it. Have you ever played Xbox Live or used the PlayStation Network? Your Xbox One is the client, and when it logs into the network, it contacts the Xbox Live servers to retrieve gaming resources like updates, video, and game demos.
  • 77. How Does It Work? Imagine a customer sitting at a restaurant. He is waiting for the server to come by and take his order. The same rules apply in a client-server network; the client, which can be a laptop, desktop, a smartphone, or pretty much any computerized device, can make a request from the server. The client uses the network as a way to connect with and speak to the server. Just as the customer speaks to his server, the client uses the network to send and receive communications about its order, or request. The server will take the request and make sure that the request is valid. If everything checks out okay, then the server will fetch the request and serve the client. The server can make a request from the client as well. It may want to check up on the status of the client, or ask if it has received any security patches, or if it still needs resources from the server. If not, the server will close the connection in order to free up network traffic. Can you imagine a server standing next to a customer who just stares at the menu without ordering anything? After 15 minutes, it would be a good idea for the server to leave and check on other customers. In both cases, the server moves on to other clients as needed.
  • 78. What Are the Advantages of a Client-Server Network? The biggest advantage to using this setup is central management of the server. Only one server is used to host the resources that all the clients request and use. This is especially good for server administrators, because they only have to be in one place and can solve all the problems in one place, as well. Having to manually update several hundred servers would take much more time. One centrally managed server is the key to ease of management, and it is cost effective, too. Another advantage of using one physical server is that the configuration is simple to set up and takes less time to troubleshoot. For instance, if there were a site with multiple servers providing redundant services, and it was having issues, it could take an extreme amount of work to effectively troubleshoot why services are being hindered. In a single server role, all troubleshooting takes place at one physical server, so it takes much less time. How To Secure & check your Computer System And Network Technology advancements have helped us improve our security and safety – think security cameras. It has helped us increase our productivity – think smartphones. However, at times we technology also presents to us some potential threats that we need to deal with. For instance, in offices as well as households, we have wireless networks connecting all major electronic devices. This can potentially bring about a security concern – as hackers can aim to attack your system or network and steal your confidential information. How Severe Is The Threat? According to a report by Javelin Strategy and Research, the cost of recovering from such security damage for major organizations can be as high as $7 Million. And this is just the economic loss – there is always the damage done to brand image and reputation that is far more disastrous.
  • 79. How Can You Deal With It? So, how do you protect devices from the prying eyes of the hackers? Here are some of the ways in which you can secure your home or office system and network. 1. Securing your system with Passwords It may seem unnecessary for having passwords and encrypted system altogether, but this has been among one of the main reasons why hackers are easily able to attack to the systems because of weak password and accessibility to access points. All the wireless networks and secretive information should be well encrypted with unique username and passwords making it difficult for the hackers to break into the system. Using a WPA2 encryption is more secure way than any other encryption protocol as it is not easily hacked into. 2. Safe and Secure Wireless Router The wireless router allows multiple users to use the internet at the same time, but if that is kept wide open, it can be dangerous. Any Individual with malicious intention can use your internet for free, and can even steal your valuable information or may use for some cyber crime. So it is always advised to change the SSID provided by the service network and use firewall. 3. Active checking of the system This majorly applies for the office users, as there may be some of the malicious insiders, employees from the company who may hack into the systems. It is comparatively easy for the employees to steal and hack the accounts, as they are well aware of the system and networks. Such hackers are dangerous for the organization. So a thorough screening of the employees is advised. Also, the important files should be admin encrypted so nobody can use it whenever required. 4. Encrypt the whole disk
  • 80. This is especially true for Laptop users, as such devices can be stolen easily. One can even lose it, and there may be some of the important files on the laptop which can be accessible by the potential hacker or stealer. So it is a better idea to protect your laptops or systems with whole disk encryption. They are not very costly but gives protection to your valuable information. 5. Updated security software Always make sure to update the operating system, web browser and most importantly security software. They prove good against any of the viruses or malware. Make sure to scan any of the USBs and other external devices with your software security scan to guard against any of the threats. It is important to keep the software updated. 6. Keeping your in-house security out of reach Most offices as well as households have been using CCTV cameras to keep their home or office secure and are attached to the home or office network to view them anytime and anywhere. But this can be dangerous at times. If the CCTV hooked up with the system is not encrypted strongly than hackers can easily view your updates of home or office and steal prime information. Hackers could get all the insights of your office and household and can make a right move at the right time.So it is very important to keep it secure with username and password which may not be guessed. You can have an alarm and security features if any unknown device hacks into it to keep your system safe. 7. Beware of Spoofing and Phishing Hackers know how and when to break into the system. They may attract the home mobile users or office desktop users by asking them to download or install any software to speed up the performance of the system. Upon downloading, all lucrative information can be stolen by them. Do not register on any untrusted websites asking for personal details or installing any such software. Also avoid opening unknown email attachments as they may have a virus, worms or Trojans. These emails can be sent from trusted sources – so think before clicking.
  • 81.  Secure your Computer Network Enable encryption on your access point. Using 128-bit encryption or higher makes your Wireless Network more secure. WEP and WPA are entirely different encryption schemes. WEP has been proven insecure and can be cracked in a few minutes using free utilities that can be downloaded from the Internet. Using at least WPA is recommended, because it is much more secure, but is sometimes a bit harder to set up correctly than WEP is, and isn't completely secure.[1] [2] Some older access points or wireless cards do not support WPA2. If you have one of these, it is recommended that you purchase a newer one that supports WPA2, depending on how important you consider your security. 2. Set the router access password. Anybody who gains access to the router configuration settings can disable the security you have set up. If you forget the password, most routers have a hardware reset that will restore all of the settings to factory defaults. The best option is to use a random sequence of the maximum length of characters - you only have to type that once, so it is not a big thing. When you connect to the router via LAN cable while setting it up, you can copy and paste the password onto the router and onto your local setting, so you never need to type it again. Use a secure password. Don't use easily guessed passwords for your WPA2 or router access passwords, such as "ABC123", "Password", or a string of numbers in order. Use something hard to guess that contains both upper and lowercase letters as well as numbers. Special characters such as !@#$%
  • 82. are not supported by some routers. The longer the key, the better, although the WPA2 key has a minimum and maximum length. Try to make a little mental effort -- good passwords might be hard to remember, but they are harder to crack. If you use a weak key then even WPA and WPA2 can be easily cracked within a day using a combination of special precomputed tables and dictionary attacks. The best way to generate a secure key is to use an offline random number generator or write the entire alphabet in uppercase and lowercase and numbers 0-9 on separate pieces of paper, mix the paper up and randomly pick up pieces and return them, mixing them up again each time; each character you pull out becomes a character in your key. You can also try throwing a pair of dice and using the resulting numbers as your password. 3. Disable MAC Address filtering on your Access Point or router. A MAC (not to be confused with the computer model 'Mac') address is a code unique to every wireless networking card in existence. MAC Address filtering will register the hardware MAC Address of your networked devices, and only allow devices with known MAC Addresses to connect to your network. However, hackers can clone MAC addresses and still enter your network, so MAC address filtering should not be used in place of proper WPA2 encryption. 4. Don't disable the 'SSID Broadcast'. Do not disable the 'SSID Broadcast' feature of your Access Point or router. This seems counter-intuitive, but it is actually a bad idea.[3] Although this would make your network invisible to your neighbors, any determined hacker can still sniff out your SSID; and you are implicitly forcing your computer to shout out your SSID anywhere you are, while it is trying to connect to it. Anyone could then impersonate your router with that SSID, and get your credentials that way.
  • 83. 5. Disable remote login. The first router worm brute forces its way into the router in this manner. Most default usernames are set to Admin. It isn't hard for a virus/worm to crack the password if the username is known. The good thing is that routers normally have this disabled by default. Be sure to confirm that it is disabled when you first set up your router and periodically thereafter. If you need to update your router setting remotely, only set up access for the time you are going to be connected. 6. Disable wireless administrating. Finally, change the setting that allows administrating the router through a wireless connection to 'off' (meaning that you need to connect with a LAN cable for administration). This disables any wireless hacking into the router. 7. Update your software regularly. Regular software updates are one of the most effective steps you can take to improve the overall cybersecurity posture of your home networks and systems. Besides adding new features and functionality, software updates often include critical patches and security fixes for newly discovered threats and vulnerabilities. Most modern software applications will automatically check for newly released updates. If automated updates are not available, consider purchasing a software program that identifies and centrally manages all installed software updates. (See Understanding Patches and Software Updates.) 8. Remove unnecessary services and software. Disable all unnecessary services to reduce the attack surface of your network and devices, including your router. Unused or unwanted services and software can create security holes on a device’s system, which could lead to an increased attack surface of your network environment. This is especially true with new computer systems on which vendors will often pre-install a large number of trial software and applications—referred to as “bloatware”—that users may not find useful. The Cybersecurity and Infrastructure Security Agency (CISA)
  • 84. recommends that you research and remove any software or services that are not being used regularly. 9. Adjust factory-default configurations on software and hardware. Many software and hardware products come “out of the box” with overly permissive factory-default configurations intended to make them user- friendly and reduce the troubleshooting time for customer service. Unfortunately, these default configurations are not geared towards security. Leaving them enabled after the installation may create more avenues for an attacker to exploit. Users should take steps to harden the default configuration parameters to reduce vulnerabilities and protect against intrusions. 10. Change default log-in passwords and usernames. Most network devices are pre-configured with default administrator passwords to simplify setup. These default credentials are not secure—they may be readily available on the internet, or may even be physically labeled on the device itself. Leaving these unchanged creates opportunities for malicious cyber actors to gain unauthorized access to information, install malicious software, and cause other problems. 11. Use strong and unique passwords. Choose strong passwords to help secure your devices. Additionally, do not use the same password with multiple accounts. This way, if one of your accounts is compromised, the attacker will not be able to breach any other of your accounts. (See Choosing and Protecting Passwords for more information.) 12. Run up-to-date antivirus software. A reputable antivirus software application is an important protective measure against known malicious threats. It can automatically detect, quarantine, and remove various types of malware, such as viruses, worms, and ransomware. Many antivirus solutions are extremely easy to install and intuitive to use. CISA recommends that all computers and mobile devices on your home network
  • 85. run antivirus software. Additionally, be sure to enable automatic virus definition updates to ensure maximum protection against the latest threats. Note: because detection relies on signatures—known patterns that can identify code as malware—even the best antivirus will not provide adequate protections against new and advanced threats, such as zero-day exploits and polymorphic viruses. 13. Install a network firewall. Install a firewall at the boundary of your home network to defend against external threats. A firewall can block malicious traffic from entering your home network and alert you to potentially dangerous activity. When properly configured, it can also serve as a barrier for internal threats, preventing unwanted or malicious software from reaching out to the internet. Most wireless routers come with a configurable, built-in network firewall that includes additional features— such as access controls, web-filtering, and denial-of-service (DoS) defense— that you can tailor to fit your networking environment. Keep in mind that some firewall features, including the firewall itself, may be turned off by default. Ensuring that your firewall is on and all the settings are properly configured will strengthen the network security of your network. Note: your internet service provider (ISP) may be able to help you determine whether your firewall has the most appropriate settings for your particular equipment and environment. 14. Install firewalls on network devices. In addition to a network firewall, consider installing a firewall on all computers connected to your network. Often referred to as host- or software-based, these firewalls inspect and filter a computer’s inbound and outbound network traffic based on a predetermined policy or set of rules. Most modern Windows and Linux operating systems come with a built-in, customizable, and feature-rich firewall. Additionally, most vendors bundle their antivirus software with
  • 86. additional security features such as parental controls, email protection, and malicious websites blocking. 15. Regularly back up your data. Make and store—using either external media or a cloud-based service—regular backup copies of all valuable information residing on your device. Consider using a third-party backup application, which can simplify and automate the process. Be sure to encrypt your backup to protect the confidentiality and integrity of your information. Data backups are crucial to minimize the impact if that data is lost, corrupted, infected, or stolen. 16. Increase wireless security. Follow the steps below to increase the security of your wireless router. Note: consult your router’s instruction manual or contact your ISP for specific instructions on how to change a particular setting on your device. 17. Use the strongest encryption protocol available. CISA recommends using the Wi-Fi Protected Access 3 (WPA3) Personal Advanced Encryption Standard (AES) and Temporary Key Integrity Protocol (TKIP), which is currently the most secure router configuration available for home use. It incorporates AES and is capable of using cryptographic keys of 128, 192, and 256 bits. This standard has been approved by the National Institute of Standards and Technology (NIST). 18. Change the default service set identifier (SSID). Sometimes referred to as the “network name,” an SSID is a unique name that identifies a particular wireless local area network (WLAN). All wireless devices on a Wireless Local Area Network (WLAN) must use the same SSID to communicate with each other. Because the device’s default SSID typically identifies the manufacturer or the actual device, an attacker can use this to identify the device and exploit any of its known vulnerabilities. Make your SSID unique and not tied to your identity or location, which would make it easier for the attacker to identify your home network.
  • 87. 19. Disable Wi-Fi Protected Setup (WPS). WPS provides simplified mechanisms for a wireless device to join a Wi-Fi network without the need to enter the wireless network password. However, a design flaw in the WPS specification for PIN authentication significantly reduces the time required for a cyberattacker to brute force an entire PIN, because it informs them when the first half of the eight-digit PIN is correct. Many routers lack a proper lockout policy after a certain number of failed attempts to guess the PIN, making a brute-force attack much more likely to occur. See Brute Force Attacks Conducted by Cyber Actors. 20. Reduce wireless signal strength. Your Wi-Fi signal frequently propagates beyond the perimeters of your home. This extended emission allows eavesdropping by intruders outside your network perimeter. Therefore, carefully consider antenna placement, antenna type, and transmission power levels. By experimenting with your router placement and signal strength levels, you can decrease the transmitting coverage of your Wi-Fi network, thus reducing this risk of compromise. Note: while this reduces your risk, a motivated attacker may still be able to intercept a signal that has limited coverage. 21. Turn the network off when not in use. While it may be impractical to turn the Wi-Fi signal off and on frequently, consider disabling it during travel or extended periods when you will not need to be online. Additionally, many routers offer the option to configure a wireless schedule that will automatically disable the Wi-Fi at specified times. When your Wi-Fi is disabled, you prevent outside attackers from being able to exploit your home network. 22. Disable Universal Plug and Plan (UPnP) when not needed. UPnP is a handy feature that allows networked devices to seamlessly discover and establish communication with each other on the network. However, though the UPnP feature eases initial network configuration, it is also a security
  • 88. risk. Recent large-scale network attacks prove that malware within your network can use UPnP to bypass your router’s firewall, allow attackers to take control of your devices remotely, and spread malware to other devices. You should therefore disable UPnP unless you have a specific need for it. 23. Upgrade firmware. Check your router manufacturer’s website to ensure you are running the latest firmware version. Firmware updates enhance product performance, fix flaws, and address security vulnerabilities. Note: some routers have the option to turn on automatic updates. 24. Disable remote management. Most routers offer the option to view and modify their settings over the internet. Turn this feature off to guard against unauthorized individuals accessing and changing your router’s configuration. 25. Monitor for unknown device connections. Use your router manufacturer’s website to monitor for unauthorized devices joining or attempting to join your network. Also see the manufacturer’s website for tips on how to prevent unauthorized devices from connecting to your network. 26. Mitigate Email Threats. Phishing emails continue to be one of the most common initial attack vectors employed by for malware delivery and credential harvesting. Attacking the human element—considered the weakest component in every network—continues to be extremely effective. To infect a system, the attacker simply has to persuade a user to click on a link or open an attachment. The good news is that there are many indicators that you can use to quickly identify a phishing email. The best defense against these attacks is to become an educated and cautious user and familiarize yourself with the most common elements of a phishing attack. 27. Use a security-focused DNS service provider. By default, your router will be configured to forward Domain Name System (DNS) requests to your
  • 89. ISP, which means you have to trust your ISP to maintain a secure DNS lookup service. Since DNS acts as the internet’s phone book, locating the IP addresses of the websites you want to visit, hackers commonly target it to direct users to malicious websites in a way that’s typically hard to spot. Companies like Google, Cloudflare, OpenDNS (Cisco) and others offer publicly available DNS resolvers that are security-focused and even have encrypted versions. SELF-CHECK 3.1-2 SECURED THE CONFIGURED COMPUTER NETWORKS Fill the blank: write the correct answer --------------------------1. Its is a wireless router allows multiple users to use the internet at the same time, but if that is kept wide open, it can be dangerous. ____________________2. Its is a reputable antivirus software application is an important protective measure against known malicious threats. It can automatically detect, quarantine, and remove various types of malware, such as viruses, worms, and ransomware. Many antivirus solutions are extremely easy to install and intuitive to use. ____________________3. Its is a Anybody who gains access to the router configuration settings can disable the security you have set up. If you forget
  • 90. the password, most routers have a hardware reset that will restore all of the settings to factory defaults. _____________________4.its is a while it may be impractical to turn the Wi-Fi signal off and on frequently, consider disabling it during travel or extended periods when you will not need to be online. ____________________5. Its is a regular software updates are one of the most effective steps you can take to improve the overall cybersecurity posture of your home networks and systems. Enumeration: write the answer in your whole sheet pad paper 1. Gives the secure your computer network? 2. Gives the Secure & check your Computer System And Network? TASK SHEET 3.1-2 SECURED THE CONFIGURED COMPUTER NETWORKS Performance Objective: given necessary tools,equipment and materials, you should be able to secured the configured computer networks ff. Standard operating procedures within 2 half hour Supplies/Materials and Equipment: Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack Patch panel ,2 computer systems unit,table, etc.
  • 91. Steps / Procedure: 1.Wear your ppe 2.Observe safety and proper sanitation 3.Gather the necessary materrials and equipment 4. Follow the steps / procedures below: 1. Put In And Monitor Firewall Performance. A firewall is a piece or set of software or hardware designed to block unauthorized access to computers and networks 2. Update Passwords At Least Every Quarter 3. Maintain Your Anti-Virus Software 4. Create A Virtual Private Network (VPN) 5. Training Your Employees 6. Ask for Help Assessment Method: Demonstration PERFORMANCE CRITERIA CHECKLIST 3.1-2 CRITERIA YES NO Did you…… Wear your ppe Observe safety and proper sanitation Gather the necessary materrials and equipment
  • 92. Put In And Monitor Firewall Performance. A firewall is a piece or set of software or hardware designed to block unauthorized access to computers and networks Update Passwords At Least Every Quarter Maintain Your Anti-Virus Software Create A Virtual Private Network (VPN) Training Your Employees Ask for Help