04 CBLM Template DDD
04 CBLM Template DDD
04 CBLM Template DDD
Sector : Electronics
Welcome!
The unit of competency, “Setting up Computer Networks“, is one of
the competencies of COMPUTER SYSTEMS SERVICING NC II, a course
which comprises knowledge, skills and attitudes required for a TESDA
trainee to possess.
In this module, you are required to go through a series of learning
activities in order to complete each learning outcome. In each learning
outcome are Information Sheets, Self-Checks, Operation Sheets and
Task/Job Sheets. Follow and perform the activities on your own. If you
have questions, do not hesitate to ask for assistance from your facilitator.
Remember to:
• Work through all the information and complete the activities in
each section.
• Read information sheets and complete the self-check. Suggested
references are included to supplement the materials provided in
this module.
• Most problably, your trainer will also be your supervisor or
manager. He is there to support you and show you the correct
way to do things.
• You will be given plenty of opportunities to ask questions and
practice on the job. Make sure you practice your new skills
during regular work shifts. This way, you will improve your
speed, memory and your confidence.
• Use Self-Checks, Operations Sheet or Task or Job Sheets at the
end of each section to test your own progress. Use the
Performance Criteria Checklist or Procedural Checklist located
after the sheet to check your own performance.
• When you feel confident that you have sufficient practice, ask
your trainer to evaluate you. The results of your assessment will
be recorded in your Achievement Chart and Progress Chart.
You need to complete this module before you can perform the next
module.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 2 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
COMPUTER SYSTEMS SERVICING NC II
List of Competencies
Setting Up Computer
Set-Up Computer Servers ELC724333
3. Servers
Maintaining and
Maintain and Repair
Repairing Computer
Computer Systems and ELC724334
4. Systems and
Networks
Networks
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 3 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
MODULE CONTENT
Introduction:
This unit covers the outcomes required in setting-up computers
networks for LANs and small-office home-office (SOHO) systems. It consists
of competencies to install network cables, set network configuration, set
router/Wi-Fi/ wireless access point/repeater configuration as well as to
inspect and test the configured computer networks.
Learning Outcomes:
At the end of this module you will be able to :
1. Install Network cables
2. Set network configuration
3. Set router /WI-FI / wireless access point / repeater
configuration
4. Inspect and test the configured computer networks
ASSESSMENT CRITERIA:
1.1 Cable routes are determined and planned in accordance with
network design and actual installation site.
1.2 Network materials necessary to complete the work are identified
and obtained in accordance with established procedures and
checked against systems requirements
1.3 Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
1.4 Appropriate personal protective equipment is used and OHS
policies and procedures are followed
1.5 Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA)
standards
1.6 Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
1.7 Installation work is performed and is checked to ensure no
unnecessary damage has occurred and complies with
requirements
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 4 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
1.8 OHS standards and 5S principles are followed according to
enterprise requirements
1.9 Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.
2.1 Network connectivity of each terminal is checked in accordance
with network design.
2.2 Any fault or problem in the network system is diagnosed and
remedied in line with the standard operating procedures.
2.3 Network interface card (NIC) settings are configured in accordance
with network design.
2.4 Communication checking between terminals are carried out in
accordance with OS network configuration guides
2.5 Unplanned events or conditions are responded to in accordance
with established procedures
3.1 Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences
3.2 Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
3.3 Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
3.4 Wireless settings are configured in accordance manufacturers’
instructions, network design and end-user preferences
3.5 Security/Firewall/Advance settings are configured in accordance
with manufacturers’ instructions and end-user preferences
4.1 Final inspections are undertaken to ensure that the configuration
done on the computer networks conforms with the manufacturer’s
instruction/manual
4.2 Computer networks are checked to ensure safe operation.
4.3 Reports are prepared/completed according to company
requirements.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 5 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
LEARNING OUTCOME #3 Set router/Wi-Fi/Wireless access
point/repeater configuration
CONTENTS:
1. Client Device Systems
2. LAN Configuration
3. WAN Configuration
4. Wireless Settings Configuration
5. Security/Firewall and Advanced Settings Configuration
ASSESSMENT CRITERIA:
1. Client Device systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences.
2. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design.
3. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design.
4. Wireless settings are configured in accordance with
manufacturers’ instructions and end-user preferences.
5. Security/Firewall/Advance settings are configured in accordance
with manufacturers’ instructions and end-user preferences
CONDITION:
The participants will have access to:
1. Workplace Location
2. Computer Network materials
a. UTP Cable
b. RJ45
c. Router/Hub
d. Modem
3. Personal Computer
4. Training Materials
a. Learning Packages
b. Bond papers
c. Ballpens
d. Whiteboard Marker
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 6 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
e. Manuals
f. Competency Standard
g. Training Regulations
ASSESSMENT METHOD:
1. Practical Demonstration w/ oral questioning
2. Interview
3. Third Party
4. Portfolio
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 7 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
LEARNING ACTIVITIES
Learning Outcome 3
Set Router/Wi-Fi/ Wireless Access Point/Repeater Configuration
Learning Activities Special Instructions
1.Read Information sheet 2.3-1 Read information sheet thoroughly.
on Client Device Systems After reading the learner is
encouraged to answer the self-check.
2.Answer Self Check 2.3-1 Compare answers to Answer Key
2.3-1
3.Read Information sheet 2.3-2 Read information sheet thoroughly.
on LAN Configuration After reading the learner is
encouraged to answer the self-check
4.Answer Self Check 2.3-2 Compare answers to Answer Key 2.3-2
5. Perform Job Sheet 2.3-2 on Compare Performance to checklist
Configure Local Area Network
6. Read Information sheet 2.3-3 Read information sheet thoroughly.
on WAN Configuration After reading the learner is
encouraged to answer the self-check.
7. Answer Self Check 2.3-3 Compare answers to answer key 2.3-3
8. Perform Job Sheet 2.3-3 on Compare Performance to checklist 2.3-
WAN configuration 3
9. Read Information sheet 2.3-4 Read information sheet thoroughly.
on Wireless Settings After reading the learner is
Configuration encouraged to answer the self-check
10. Answer Self Check 2.3-4 Compare answers to answer key 2.3-4
11. Read Information sheet 2.3- Read information sheet thoroughly.
5 on Security/Firewall Settings After reading the learner is encourage
Configuration to answer the self-check
12. Answer Self Check 2.3-5 Compare answers to answer key 2.3-5
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 8 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-1
Client Device Systems
Learning Objectives:
After reading this Information Sheet, you should be able to:
1. Identify What is Client Device Systems
2. Configure Client Device Systems
Introduction
Client Device Settings is a way of configuring your client device by
which you can specify client settings at a collection level, allowing you to
define different settings as necessary. It has the characteristics of being
flexible to create multiple client device or client user settings and apply it to
different collections as per requirement. It is a set of default settings. But
always take note that those Client Device systems settings are configured in
accordance with manufacturers’ instructions and end-user preferences. In
this module, we will show the steps on setting up your client device on
Windows 7 & 10 which are configured manually.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 9 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
b. Right click on the area of time and date then choose “Adjust
date/time”. Then the date/time settings will appear.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 10 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
c. If you wish to set your date/time automatically just click “ON”
at “Set Time Automatically”. If not, you can turn it off and be
the one to set date/time.
d. You could also set “Time Zone” it is located below change date
and time. You could choose Beijing, Kuala Lumpur or Taipei,
Philippines is none on the choices just choose a Time Zone that
much on our Time “UTC+8”.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 11 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
c. After clicking “Change Settings”, System properties setup will
appear. You can now change the “Computer Name” by
clicking the “Change” button. As shown on figure below:
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 12 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Note: Setting up your Computer Name is important. This will serve as the
Identity of your computer. It will be useful when it comes on setting up your
Computer Network. The Server/The Network will identify what PC is being
connected or configured.
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection icon. You'll see this in your System Tray at bottom right corner
of you screen. Think of an IP address as a mailing address. Each computer
on the network needs a unique IP address so that information sent across
the network reaches the correct destination.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 13 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Click on Ethernet tab then on related settings click “Change adapter
options”
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 14 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck
it, just highlight it. Then click the properties button.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 15 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
By default, “Obtain an IP address automatically” radio button is selected
which means that our computer can obtains its IP address from the router
or from a network server. In our case we will provide our own IP address, so
we will select “Use the following IP address” radio button.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 16 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Type 192. 168. 1. 2 into the IP address field and 255.255.255.0 into the
Subnet mask field.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 17 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
For DNS server, you can leave this fields blank if you’re not connected to the
internet. And if in case you are connected to the internet, you can use the
Google’s open DNS which is 8.8.8.8. and 8.8.4.4.
Click OK. This will save the settings for that computer. This computer is
now configured on your network with a unique IP address.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 18 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Open the Internet Protocol Version 4 properties on the next computer.
Follow the steps above on the second computer to open the Internet Protocol
Version 4 (TCP/IPv4) Properties window. Make sure to put only a unique IP
address. So the first computers IP address is “192.168.1.2” then the
succeeding IP address would be “192.168.1.(3 - 255).
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 19 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Download Office 2016
Follow the instructions below to download and install MS Office 2016, and
then follow the installation wizard instructions. Screenshots for these steps
were taken with Windows 7 and Internet Explorer. The steps are generally
the same for Windows 10 and with other web browsers.
NOTE: There are some default options, such as making Bing your default
search engine, that are checked above the Install Now button. Review this
and uncheck as necessary
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 20 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Install Office 2016
5. Follow the steps to install Office.
Installation Steps:
Click Run.
Click Yes to begin installation.
Download my take a while, be patient.
NOTE: The instructions above are for Internet Explorer, if using a different
browser see: Depending on your browser your pop-up will be different...
• Click Run (in Internet Explorer), Setup (in Chrome), or Save File (in
Firefox).
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 21 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Please wait while Office prepares your Office.
7. The Office applications are identified.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 22 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Please be patient, the installation process will take a while.
Click Close.
10. Launch an Office 2016 application
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 23 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
11. Open any Office application to accept the Microsoft License
Agreement.
Click Accept.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 24 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
How to Download and Install ESET Internet Security
Figure 1-1
Figure 1-2
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 25 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
5. In the I have a license window, click Enter a License Key. If you are
updating from a previous version, your license information will be
entered automatically.
Go to the link below if you do not have a License Key or did not receive
an email with license info following your purchase.
https://www.eset.com/us/support/lost-
license/?intcmp=%22KBCJ_3419_license%22
Figure 1-3
6. Type or copy/paste your License Key in the License Key field and
click Continue. Make sure you enter the License Key exactly as it
appears and include the hyphens. If you copy/paste be sure you do
not accidentally select additional space around the text. If you have a
CD, type your Activation Key (printed on the label) in the blank field.
Be sure to include the hyphens.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 26 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Figure 1-4
Figure 1-5
8. Select your preference for ESET Live Grid and Detection of Potentially
Unwanted Applications. Click Install.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 27 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Figure 1-6
Figure 1-7
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 28 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Figure 1-8
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 29 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK 2.3-1
TRUE OR FALSE: Write the word TRUE in the space provider if the
statements are correct and FALSE if it is not.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 30 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
ANSWER KEY to 2.3-1
TRUE OR FALSE
1. False
2. True
3. True
4. True
5. True
6. True
7. False
8. False
9. False
10. True
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 31 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-2
LAN Configuration
Learning Objectives:
After reading this Information Sheet, you should be able to:
1. To identify What is Local Area Network
2. Configure Local Area Network
Introduction
A Local Area Network (LAN) is a group of computers and associated
devices that share a common communications line or wireless link to
a server. Typically, a LAN encompasses computers and peripherals
connected to a server within a distinct geographic area such as an
office or a commercial establishment. Computers and other mobile
devices use a LAN connection to share resources such as a printer or
network storage.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 32 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Ethernet Cable often referred to as
a wired connection to the Internet,
an Ethernet cable can be any of
several common network cables
used to access the web.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 33 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Switch/Hub is short for port-
switching hub, a special type of hub
that forwards packets to the
appropriate port based on the
packet's address
When Equipment’s and Peripherals are all ready, we will now proceed
on Installing and Configuring Local Area Network. Below are steps in
configuring Local Area Network.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 34 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
a. You'll need one Ethernet cable for each computer you want to
connect to the LAN, as well as an Ethernet cable to connect the
router to the switch (if applicable).
4. Plug one end of an Ethernet cable into your computer.
Make sure you're using an Ethernet cable (RJ45), not a telephone
cable.
5. Plug the other end of the cable into an open LAN port.
This can be any open LAN port on either the router or the switch,
depending on your LAN setup.
6. Reset the Router. In resetting your Router just click the small button
on the back of your router using a Pin or Ballpen and wait until all the
icons in front of the Router will Lights on this usually takes 10-15
seconds, depending on the brand of the router. See figure below.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 36 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
10. Click the Network Tab. And change your IP Address. Take note
on the Sequence of your IP Address. Apply and reboot.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 37 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK 2.3-2
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 38 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
ANSWER KEY to 2.3-2
IDENTIFICATION:
1. Personal Computer
2. Modem
3. Ethernet Cable
4. Router
5. LAN
6. 192.168.0.1
7. Admin
8. Network Tab
9. Reset
10. Lights On (Icons in front)
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 39 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
JOB SHEET 2.3-1
Title: Configure Local Area Network
Performance Objective: Given a Network Materials (Router and
Ethernet Cable) together with a Personal Computer you should
Configure Local Area Network with allotted time of 40 minutes.
Supplies/Materials:
• Personal Computer
• Router and Ethernet Cable
• Personal Protective equipment (if necessary)
• Pins/Ballpen (Use f or resetting the Router)
Steps/Procedure:
1. Prepare your Workplace
2. Have the necessary Materials/Peripherals.
3. Connect Router and Personal Computer using your
Ethernet Cable
4. Reset your Router using Pins/Ballpen
5. Go to your Browser (Google Chrome or Iexplorer)
6. Type in the Default IP Address
7. Type in the default username and password
8. Set up Network Tab
9. Set up DHCP Tab
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 40 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Performance Criteria Checklist 2.3-2
Criteria Yes No
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 41 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-3
WAN Configuration
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
Introduction
A wide area network (WAN) is a geographically distributed private
telecommunications network that interconnects multiple local area networks
(LANs). In an enterprise, a WAN may consist of connections to a company's
headquarters, branch offices, colocation facilities, cloud services and other
facilities. Typically, a router or other multifunction device is used to connect
a LAN to a WAN. Enterprise WANs allow users to share access to
applications, services and other centrally located resources. This eliminates
the need to install the same application server, firewall or other resource in
multiple locations, for example.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 42 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
2. Reset the Modem. In resetting your Modem just click the small button
at the back and wait until all the icons in front of the Modem will Lights
on. See figure below
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 43 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
c. On WAN settings, choose the mode of your connection, ask you
ISP about it. But in our case “Dynamic IP” is the proper choice.
d. Click Apply.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 44 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 45 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK. 2.3-3
Rearrange the given steps on how to configure WAN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.
______1. Go to Network Tab. Change your IP address. Click Save then it will
reboot.
______2. Directly connect Modem to your Personal Computer using the
Ethernet Cable. This will just be use for the setting up processes.
______3. And type in the default IP Address of your Modem.
______4. Click Wireless Tab. Click on WPA/WPA2 – PSK mixed then enter
your desired PSK Password.
______5. Prepare your Workplace, clean and Dry.
______6. Go to DHCP tab and click Disable Button.
______7. Reset the Modem. In resetting your Modem just click the small
button at the back and wait until all the icons in front of the Modem
will Lights on.
______8. Go to browser either “Google Chrome” or “I explorer”.
______9. Gather your Modem, Ethernet Cable and Personal Computer.
Connect each peripheral using the Ethernet Cable.
______10. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and
password.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 46 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
ANSWER KEY to 2.3-3
REARRANGE:
1. 8
2. 3
3. 6
4. 10
5. 1
6. 9
7. 4
8. 5
9. 2
10. 7
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 47 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
JOB SHEET 2.3-3
Title: Configure Wide Area Network
Performance Objective: Given a Network Materials (Router and
Ethernet Cable) together with a Personal Computer you should
Configure Local Area Network with allotted time of 40 minutes.
Supplies/Materials:
• Personal Computer
• Access point and Ethernet Cable
• Personal Protective equipment (if necessary)
• Pins/Ballpen (Use for resetting the Access Point)
Steps/Procedure:
1. Prepare your Workplace
2. Have the necessary Materials/Peripherals
3. Connect Modem/Access point and Personal Computer
using your Ethernet Cable
4. Reset your Modem/Access point using Pins/Ballpen
5. Go to your Browser (Google Chrome or Iexplorer)
6. Type in the Default IP Address
7. Type in the default username and password
8. Set up Network Tab
9. Set up DHCP Tab
10. Set up Wireless Tab
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 48 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Performance Criteria Checklist 2.3-3
Criteria Yes No
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 49 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-4
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
Introduction
Wireless networks are computer networks that are not connected by cables
of any kind. The use of a wireless network enables enterprises to avoid the
costly process of introducing cables into buildings or as a connection
between different equipment locations. The basis of wireless systems are
radio waves, an implementation that takes place at the physical level of
network structure.
Wireless networks use radio waves to connect devices such as laptops to the
Internet, the business network and applications. When laptops are
connected to Wi-Fi hot spots in public places, the connection is established
to that business’s wireless network.
1. Wireless Local Area Network (LAN): Links two or more devices using
a wireless distribution method, providing a connection through access
points to the wider Internet.
2. Wireless Metropolitan Area Networks (MAN): Connects several
wireless LANs.
3. Wireless Wide Area Network (WAN): Covers large areas such as
neighboring towns and cities.
4. Wireless Personal Area Network (PAN): Interconnects devices in a
short span, generally within a person’s reach.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 50 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
1. First, we need to check whether you have a wireless adapter.
a. Select the Start button, type Device Manager in the search
box, and then select Device Manager.
b. Expand Network adapters.
c. Look for a network adapter that might have wireless in the name.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 51 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
3. Positioning the wireless router
Put your wireless router somewhere where it will send and receive the
strongest signal with the least amount of interference. For better results,
follow these tips:
a. Place your wireless router in a central location. Place the router
as close to the center of your home as possible to increase the
strength of the wireless signal throughout your home.
b. Position the wireless router off the floor and away from walls
and metal objects, such as metal file cabinets. The fewer physical
obstructions between your PC and the router's signal, the more likely
that you'll be using the router's full signal strength.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports
WPS and its connected to the network, follow these steps to set up a
network security key:
1. Select the Start button, look for Control Panel and click Network and
Internet. Then look for Network and Sharing Center.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 52 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
2. Select Set up a new connection or network.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 53 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
3. Select Set up a new network, and then choose Next.
The wizard will walk you through creating a network name and a security
key. If your router supports it, the wizard will default to Wi-Fi Protected
Access (WPA or WPA2) security. We recommend that you use WPA2,
because it offers better security than WPA or Wired Equivalent Privacy
(WEP) security. With WPA2 or WPA you can also use a passphrase, so you
don’t have to remember a cryptic sequence of letters and numbers. Write
down your security key and keep it in a safe place. You can also save
your security key on a USB flash drive by following the instructions in the
wizard. (Saving your security key to a USB flash drive is available in
Windows 8 and Windows 7, but not in Windows 10.)
2 3
1
2. In the list of networks, choose the network that you want to connect to,
and then select Connect.
3. Type the security key (often called the password).
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 54 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
SELF-CHECK. 2.3-4
__________1. Are computers that are not connected by cables of any kind.
__________2. The basis of wireless systems.
__________3. Links two or more devices using wireless distribution method,
providing a connection through access point to the wider Internet.
__________4. Interconnects devices in a short span, generally within a
person’s reach.
__________5. Covers large areas such as neighboring towns and cities.
__________6. Connects several wireless LANs.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 55 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Answer Key to 2.3-4
REARRANGE:
1. Wireless networks
2. Radio waves
3. Wireless Local Area Network
4. Wireless Personal Area Network
5. Wireless Wide Area Network
6. Wireless Metropolitan Area Network
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 56 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
INFORMATION SHEET 2.3-5
Security/Firewall and Advanced Settings Configuration
Learning Objective:
After reading this INFORMATION SHEET, you should be able to:
1. To identify What is Firewall with Advanced Security
2. To enumerate steps in Configuring Firewall with Advanced Security
Introduction
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 57 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
From here we can graphically view the status of the firewall for the domain,
private, and public profiles. These different profiles are used depending on
your current network connection. For example, if you’re joined to an Active
Directory domain, the rules applied in the domain profile will be used, while
if you’re connected to a public wireless network the settings in the public
profile will be used.
To access the advanced settings, you can select the advanced settings link
from this menu on the left from within Windows Firewall.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 58 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
On this window we can see an overview of the domain, private, and public
profiles, which by default should all be enabled and blocking inbound traffic
and allowing outbound traffic.
From the menu on the left we can select either inbound or outbound rules.
As all outbound is allowed by default, we’ll focus on inbound rules here.
Connection security rules can also be setup to configure IPSec connections,
and monitoring can be used to log various firewall events.
Under inbound and outbound rules we can view the rules that exist and
that are currently enabled. These rules are available by default, rules with a
green tick icon on the left are enabled and will allow traffic in while rules
with no icon are disabled.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 59 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
A rule that is disabled can be enabled by simply right clicking it and
selecting enable. Likewise, we can right click an enabled rule and change it
to disabled. We can also view the properties of the rule by right clicking it
and selecting properties. This will allow you to see what the rule is actually
doing, including the ports that are being allowed through the firewall to
specific programs, we’ll see this in more detail next when we create our own
rule.
Select Inbound Rules from the menu on the left and then select New Rule
from the actions pane on the right. This will open the new inbound rule
wizard. From here we can select if we want to create a rule for a specific
program, to a specific port, or based off of an existing rule. In this case we’ll
select custom as this gives us the most choice.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 60 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
On the next screen we can select the specific program or service that the
firewall should allow traffic in for. In this case we’ll just select all programs,
however note that this can be used to further lock down a rule, rather than
just allowing based on port/IP address we can also only allow traffic to a
specific program.
Next we can select the port and protocol that the rule should apply to. There
are many different protocols to select from in the drop down, in this example
we’re specifying that local TCP port 9000 should be allowed through the
firewall. We use local port here as port 9000 is available locally on this
server and listening for connections.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 61 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Now we can select an IP address or range of addresses that are allowed in
through our firewall rule. In this case I’m allowing the remote address range
192.168.0.0/24 in through the firewall, so only this IP range will be allowed
to connect to the server on TCP port 9000.
At this point we specify if we want to allow or deny the rule that we’re
creating, we’ll leave this on allow as we want to let 192.168.0.0/24 in on
TCP port 9000, however we could optionally explicitly block this instead. We
could also optionally only allow the connection if it’s secure, which relies on
IPSec being configured.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 62 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
We can select which firewall profiles our new rule applies to. By default, all
profiles are selected, however you can change this as per your requirements.
Finally, we can specify a name and optional description to identify our rule.
Once complete click finish, noting that as soon as you do this the rule will
be live as per how you have configured it.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 63 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Our new rule will now show at the top of the inbound rule list above all of
the default rules. We can identify it by its name and see briefly what it’s
doing, it’s allowing the remote address range 192.168.0.0/24 into the local
port 9000 with the protocol TCP on all profiles and is enabled.
TRUE OR FALSE: Write the word TRUE in the space provider if the
statements are correct and FALSE if it is not.
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 65 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
Answer Key to 2.3-5
TRUE OR FALSE:
1. TRUE
2. FALSE
3. TRUE
4. TRUE
5. TRUE
6. TRUE
7. TRUE
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 66 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00
References/Further Reading
INTERNET
1) http://www.tesda.gov.ph
a. CSS NCII TR
b. CSS NCII CBC
c. CSS SAG
https://www.rootusers.com/configure-windows-firewall-advanced-security/
http://www.informit.com/articles/article.aspx?p=131034
https://www.wikihow.com/Set-up-Ethernet
https://www.wikihow.com/Set-Up-a-Wireless-Router
http://www.simulationexams.com/tutorials/netplus/network-devices.htm
https://www.makeuseof.com/tag/7-simple-steps-diagnose-network-
problem/
https://www.brianmadden.com/feature/Types-of-Client-Devices-Terminal-
Services-for-Windows-Server-2003
https://www.webopedia.com/TERM/W/windows-firewall.html
https://www.techopedia.com/definition/26186/wireless-network
https://searchmobilecomputing.techtarget.com/definition/wireless
https://www.webopedia.com/TERM/S/SSID.html
https://searchenterprisewan.techtarget.com/definition/WAN
https://lifehacker.com/5831841/know-your-network-lesson-4-accessing-
your-home-computers-from-anywhere
Document No.
CBLMs on Date Developed:
COMPUTER SYSTEMS August 1, 2018 Issued by:
SERVICING NCII Page 67 of 24
Developed by:
Setting up Computer
Networks JOEL T. BUCAR Revision # 00