CSS6 12 First Quarter
CSS6 12 First Quarter
CSS6 12 First Quarter
Computer Systems
Servicing 6
Quarter 1
Set Up Computer Network (SUCN) Part 2
DO_Q1_CSS6_Lesson1-4
Personal Development
Alternative Delivery Mode
Quarter 1 –Set Up Computer Network (SUCN)
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of
the Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from their
respective copyright owners. The publisher and authors do not represent nor claim ownership
over them.
Office Address: Pio Valenzuela Street Marulas, Valenzuela City, Philippines 1440
Telefax: (02) 292 3247
E-mail Address: sdovalenzuela2015@gmail.com
ii
Grade 12
Computer Systems
Servicing
Quarter 1
Set Up Computer Network (SUCN) Part 2
Introductory Message
The unit of competency Set Up Computer Network contains knowledge, skills and attitudes
required for Computer Systems Servicing course.
As a parent/guardian you are encouraged to guide the learners in using this module.
Please keep track of the learners' progress while allowing them to manage their own learning
and assist them as they do the tasks included in this module.
iii
Table of Contents
References: ……………………………………………………………… 45
iv
Quarter 1 Network Interface Card,
Lesson 1
Static and Dynamic IP/APIPA
This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course
LO2: Set network configuration TLE_IACSS9- 12SUCN-Ia-e-34.
After going through this module, the learners shall be able to:
1. configure Network Interface Card (NIC) in accordance with the network
design;
What I Know
Directions: Select the letter of the correct answer. Write it on your notebook.
1. Which of the following devices is BEST to use when designing a SOHO network
to ensure the least amount of collisions?
A. Access Point C. Hub
B. Bridge D. Switch
2. A technician needs to know why he cannot connect through the internet. What
is the first thing he should do to determine its connectivity?
A. Check network cable C. Check router connectivity
B. Check network driver D. All of the above
3. Which of the following is a public IP address?
A. 10.45.xxx.xxx C. 169.254.xxx.xxx
B. 173.16.xxx.xxx D. 192.168.xxx.xxx
1
4. APIPA usually starts with an IP of
A. 169.254.xxx.xxx C. 192.168.xxx.xxx
B. 172.16.xxx.xxx D. 10.0.xxx.xxx
5. It makes the client’s computer or devices communicate in the other network
or web page.
A. Default Gateway C. Dynamic
B. Domain Name D. Static
What’s In
What’s New
2
What Is It
With its wide application, Network Interface Card (NIC) has various types
emerging in a market like PCI card, PCIe card and server network card, and with this
we can configure the hardware components from its meaning, function and types.
Network Interface Card (NIC) / Network Adapter / Local Area Network Card
(LAN Card)/ Ethernet card is a very important hardware component used to connect
a computer over a network through wireless and wired communication. This provides
a dedicated network connection through a network. This NIC configures depending
on a network design such as Static IP and Dynamic IP used in communication.
NIC functions as a middleman between computers on a computer network. In
TCP/IP layer working as an interface which transmits signal pass through coaxial
cable, fiber cable, UTP cable depending of what types of cable are used, and convert
it into data packets at a network layer which is your networking device and back
again to digital information so computers will have a reliable communication.
Network interface card can be classified into two types based on its
transmission speed and application fields. They are the Internal Network Card and
External Network Card.
1. Internal Network Card – The Internal card has two types. First is the Industry
Standard Architecture (ISA) and the second one is the Peripheral Component
Interface Card. Computers nowadays include network capability (ISA type)
which is already built-in the mother board because of its nearly use of
universal internet. Ethernet is standard for a computer that describes
communication technology, a separate network card is not needed unless you
need to connect it into other type of network. The other type of internal card
is the PCI type inserted in your PCI slot in your mother board, also the PCIe
type needs a UTP cable to connect through a network.
2. External Network Card – Desktop and laptop that do not have internal NIC
use external card. Most of the laptops use wireless network or USB network
that is inserted in your motherboard and do not require a network cable to
connect to the internet. Advantages of this is you can carry your laptop
anywhere you go and you can easily connect through Wi-Fi connectivity.
3
NIC has a Bus Interfaces Based Classification (BIBC), it has the Industry
Standard Architecture (ISA); Peripheral Component Interconnect (PCI); Peripheral
Component Interconnect Extended (PCI-X); Peripheral Component Interconnect
Express (PCIe); and the Universal Serial Bus Network Interface Card (USB-NIC).
Some of these are no longer recognized nowadays and are hard to find in the market.
PCI is standard for a 32 bit-133 MB/s and a 64-bit 266 MB/s transmission of data.
PCI-X is a 64-bit MB/s that is capable of transmission of data up to 1064 MB/s.
PCIe is the latest release of NIC and it is widely used for computers and servers. USB-
NIC is an external bus standard designed for Wi-Fi connection.
NIC also has its transmission speed-based classification, the faster the speed the
more reliable the internet connection is. It ranges from 10/100 MB/s up to 1GB/s
speed to communicate with other computers on a network.
Configuring Network Interface Card affects data transmission whether you are
using static IP address and Dynamic IP address, cable used on a network, networking
device. We can see different types of IP address in configuring NIC depends on how
you configure it on a network or in a server network.
Static IP address
It is an IP address that manually configures for a device instead of one that is
assigned by a DHCP server. It is called static because it does not change compared
to a Dynamic IP address.
Routers, phones, tablets, desktops, laptops, and other devices which use an IP
address can be configured to have a static IP address. This can be done through the
device giving out IP addresses (like the router) or by manually typing the IP address
into the device from the device itself.
Dynamic IP Address
A Dynamic Internet Protocol address (Dynamic IP address) is a temporary IP
address that is assigned to a computing device or node when it’s connected to a
network. A dynamic IP address is an automatically configured IP address assigned
by a DHCP server to every new network node.
Dynamic means "constantly changing". The prefix dyna means power; however,
dynamic IP addresses are not more powerful, but they can change (or be changed).
4
Pros and Cons between Static and Dynamic IP addresses:
Static IP Address:
Pros Cons
1. Running Server 1. Easier to track
2. Stability information 2. Require to disclose them
3. Simplicity 3. Limits the users
4. Better for a dedicated server
Dynamic IP Address:
Pros Cons
1. Security 1. Network traffic
2. Lower cost 2. Network Failure
3. Automatic Network Configuration 3. Less reliable
5
Network Connectivity Settings using Packet Internet Gopher (PING)
PING measures the roundtrip for messages sent from the originating host to a
destination computer that is echoed back to the source.
The command-line options of the ping utility and its output vary between the
numerous implementations. Options may include the size of the payload, count of
tests, limits for the number of network hops Time To Leave(TTL) that probes traverse,
interval between the requests and time to wait for a response.
You can use ping to determine the connection between devices or on a web
site.
Example:
ping www.google.com or ping 192.168.1.10
6
Network Connectivity Settings using IP configuration (ipconfig)
It is a command line tool to determine the network connection. There are three
commands “all”, “release”, and “renew”. Ipconfig displays all current TCP/IP
network configuration values and refreshes Dynamic Host Configuration Protocol
(DHCP) and Domain Name System (DNS) settings. It is used without parameters,
Ipconfig displays the IP address, Subnet Mask, and Default Gateway for all adapters.
A windows command line utility that is used to manage the IP address assigned
to the machine which is running in. It uses without any additional parameters and
displays the computer's currently assigned IP, Subnet Mask and Default Gateway
addresses.
Reporting Displays
no switch IP, subnet mask & default gateway addresses
/all the above + hostname, MAC address, DNS server addresses, etc
.
/displaydns contents of DNS cache
/showclassid all DHCP class IDs for adapter
Management Action
/release release IP address
/renew renew IP address
/flushdns purge DNS cache
/registerdns refresh leases & reregister DNS
/setclassid update DHCP class ID
What’s More
Directions: Define the following terms based on your understanding,
Write your answer on a separate sheet of paper.
1. APIPA
2. MAC ADDRESS
3. STATIC IP
4. DYNAMIC IP
.
7
What I Have Learned
Directions: Read the questions below and answer each on a separate sheet of paper.
1. What are the learnings that you have gained in this lesson?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
2. How important are the types of NIC and cable use in a network?
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
What I Can Do
Directions: Read the statements below and answer each on a separate sheet of
paper.
1. Using your desktop computer and cellphone, determine the speed of your
internet using speed test. Observe the differences between the two devices
and explain why.
Desktop: _________________ Cellphone: _______________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
2. Write the IP address of your device when the DHCP capability of your
router is turned off. Explain what will happen to your network connection
and what IP address will be shown on your computer.
IP Address
before turning off: ____________ after turning off: _______________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
Assessment
Directions: Choose the letter of the correct answer and it on your notebook.
1. Every network adapter has a Media Access Control Address (MAC address)
embedded to its firmware. What is the other term of MAC address?
A. APIPA C. Logical address
B. IP address D. Physical address
8
2. What network management protocol is used on IP networks when it is
automatically assigned to an IP address?
A. APIPA C. DNS
B. DHCP D. PING
3. Command line tool which determines the network connection.
A. Cls C. Pong
B. Ping D. release
4. Which of this device translates data into digital information and sends
them to a networking device through network cable and back to its original
information?
A. Coaxial cable C. Mother board
B. Ethernet card D. None of the above
5. I don’t have Wi-Fi on my laptop, what other remedy should I do to connect
to a network?
A. Buy new NIC C. Change IP address
B. Use USB-NIC D. Format my computer
6. I receive an IP address of 169.254.25.63 on my computer. It indicates that
I have __________?
A. APIPA C. Mac address
B. Dynamic IP D. Static IP
7. I want to determine the IP address of my computer, what command should
I use in the command line?
A. Ipconfig C. Ipconfig /renew
B. Show my IP D. Ipconfig /release
8. After the installation of my NIC in my computer, what other procedure
should I do?
A. Browse internet C. Ping other computers
B. install LAN driver D. Install motherboard driver
9. These are the factors that affect transmission speed of your computer
through internet or a network connectivity.
A. ISP C. Types of network cable used
B. Ethernet Card D. All of the above
10. In a PCI 32-bit ethernet card can transmit up to __________ of data speed.
A. 1064 MB/s c. 266 MB/s
B. 133 MB/s d. 512 MB/s
Additional Activities
Directions: Watch the following videos on YouTube and write you
reflections on a separate sheet of paper.
2. APIPA
https://www.youtube.com/watch?v=wShbO4MfmOs
9
Reflection:
3. I will apply
RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do and
Reflection)
This rubric will monitor, score and give suggestions to improve the performance of
the students.
10
Quarter 1 Router, Access Point and
Lesson 2
Wi-Fi Configuration
This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and Respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.
After going through this module, the learners shall be able to:
1. configure client device systems settings in accordance with
manufacturer’s instructions and end user preference;
2. configure LAN in accordance with manufacturer’s instructions and
network design; and
3. configure wireless settings in accordance with manufacturer’s
instructions, network design, and end-user preferences.
What I Know
Directions: Choose the letter of the correct answer and write it in your
notebook.
1. A technician is noticing extremely slow performance on a computer and
would like to see what application is consuming resources. Which of the
following tools should the technician use to view the system performance?
A. Event Viewer C. Netmon
B. Msconfig D. Task Manager
11
3. A user wants to implement a wireless router that will have the fastest data
speed and operate over the 5GHz frequency. Which of the following standards
should the user select?
C. 802.11a C. 802.11g
D. 802.11ac D. 802.11n
What’s In
12
What’s New
Generally speaking, network devices are the devices that are necessary to
build a network and to keep communication flowing. Network devices include hubs,
routers, switches, repeaters, and wireless access points. These devices must be
configured, and include firmware which must be updated.
In a broader sense, network devices are the end devices that are connected to
each other via the network, i.e. the devices for which the network is used: computers,
printers, media servers, VoIP phones, etc.
What Is It
Step 1: Resetting
■ Connect the power cord.
■ Unplug ALL Ethernet connections.
■ Press the reset button for at least 15
seconds.
13
Step 3: Accessing Router
14
and 32 characters- the longer the better. Make sure it is something you
can remember but hard to guess.
■ Click “Save Settings”.
Step 8: Verification
■ Click Windows + R --type “cmd”
under the Open field, and click “OK”.
■ Type ipconfig on command line interface.
Your IP Address should now begin with 192.168.1.x, same as your
router IP address but different on the fourth octet, if this is NOT the
case, go back to Step 1 and try again.
The “SSID Broadcast” should be set to “Enabled” so that the wireless devices
will be able to detect the wireless
network of your Linksys access point.
Step 4:
Security Mode.
15
WPA2-Personal
Step 1:
Enter “http://192.168.1.1” in your web browser’s Address bar and log
in to your Linksys Smart Wi-Fi router.
Step 2:
Click “Connectivity”.
Step 3:
Click “Internet Settings”.
Step 4:
Click “Edit”.
16
Step 5:
Select “Wireless Repeater”.
Step 6:
Enter the main router or access
point’s “Network name (SSID)”,
“Network band and Security
mode”.
Step 7:
Click “Ok” to save settings. Click “Yes” to continue.
Once your Linksys Smart Wi-Fi router is turned into a Wireless Repeater,
you will need to check on your main router or access point’s DHCP Table for the
new IP Address of your Linksys Smart Wi-Fi router.
If the Linksys Smart Wi-Fi router cannot find the main router or access
point, you will receive the following message. Clicking Ok will take you back to the
Internet Settings tab where you left off.
NOTE: You will not be able to save the settings if the Linksys Smart Wi-Fi
router cannot find the network.
When in Wireless Repeater mode, you will only have access to the
Connectivity, Troubleshooting and Wireless tools that are supported under
Repeater mode.
17
● Wireless – This tool allows you to broadcast both frequency bands and
customize both wireless settings on the router setup as Wireless
Repeater mode.
Configuring WI-FI
Before configuring your wireless Wi-Fi connection make sure that your wireless
network has already been configured and the wireless connection in your computer
is working properly.
Look at your desktop screen at the lower right corner, check if your WI-FI
connection is working properly. If you do not see it there, go to your Device Manager
to check if it is installed properly.
There are multiple ways to connect your Wi-Fi through the internet. In
Windows 10 you can use your Taskbar, Settings, Control Panel or in Command
Prompt.
Use the connect Wi-Fi network manually to save battery, or prevent your
devices from connecting to a network in certain places for security
reasons. Connect it only if you know that the Wi-Fi is a trusted one. You
can choose also depending on your time, you can choose in one hour, in
four hours, or in one day.
18
Using Settings:
19
What’s More
1. SSID
2. WPA
3. AES
4. TKIP
Directions: Read the statements below and answer each on a separate piece of
paper.
1. Identify the learnings that you have gained from the lesson.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
2. Give the differences among Router, Access Point and Repeater in terms of
configuration.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
What I can Do
20
Assessment
Directions: Choose the letter of the correct answer. Write it in your
notebook.
1. In configuring the router, which port should the UTP cable be connected?
A. LAN port C. USB port
B. Switch port D. WAN port
2. In case you forgot the password of your router, what should you do?
A. Buy a new one C. Change Network cable
B. Press reset button D. none of the above
3. What type of security is usually selected on a router?
A. 802.11x WEP C. WPA2-Enterprise AES
B. WEP D. WPA2-PersonalAES
4. After configuration, you will see in your cmd that your IP address shows
169.254.xxx.xxx, what does it mean?
A. Configuration fail C. Configuration successful
B. Router is not working D. None of the above
5. In configuring a router, what is a network home address?
A. Password C. SSID
B. Security D. WPA
6. This tool allows you to broadcast both frequency bands and customize
both wireless settings on the router setup as Wireless Repeater mode.
A. IP Address C. Security
B. Passphrase D. Wireless
7. What are the ways in configuring network connectivity?
A. Use taskbar C. Use of Command line
B. Use settings D. All of the above
8. Which of the following programs will determine if all of your device
drivers are installed properly?
A. Device Manager C. Network Settings
B. Device Properties D. None of the above
9. If you don’t know the IP address of your router, what are you going to do?
A. Search on internet. C. Look at the back portion of your
router.
B. Look at the manual. D. All of the above
10. WPA stands for ___________.
A. Wired Personal Address C. Wi-Fi Protected Access
B. Wi-Fi Personal Address D. Wired Protected Access
Additional Activities
Directions: Watch the following videos and write you reflections on a separate
sheet of paper.
21
II. Reflection:
Directions: Based on the modules that you have read, answer the following
on a separate sheet of paper.
3. I will apply
RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do
and Reflection)
This rubric will monitor, score and give suggestions to improve the
performance of the students.
Content: Substantial,
specific, and illustrative
content which
demonstrated strong and
sophisticated ideas.
Conventions: Evident
control of grammar,
mechanics, spelling, usage
and sentence formation.
22
Network Switch, Firewall,
Quarter 1
Lesson 3
Cloud Computing and LAN
Configuration
This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and Respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.
After going through this module, the learners shall be able to:
1. configure wireless settings in accordance with manufacturer’s instructions,
network design, and end-user preferences;
2. configure security/firewall/advanced settings in accordance with
manufacturer’s instruction and end user preferences.
What I Know
1. Manageable Switch
2. Firewall
23
What’s In
24
What’s New
Introduction:
What Is It
Features
An unmanaged switch is simple, connecting ethernet devices with a fixed
configuration that you cannot make any changes to. It is often used for small
networks or to add temporary groups of systems to a larger network. A managed
switch, on the other hand, also allows you to manage, configure, and monitor the
settings of your LAN, including controls over LAN traffic, prioritizing certain
channels, and creating new virtual LANs to keep smaller groups of devices segregated
and to better manage their traffic. Managed switches also offer redundancy features
that duplicate and recover data in the event of a device or network failure.
Performance
The advantage of unmanaged switches when it comes to performance is that
you can plug and play immediately with your network. There is no need to set
anything up, and it has in-built QoS services to ensure it is working well. With a
managed switch, however, you can prioritize channels at will, ensuring that you get
25
the best performance where you need it. Furthermore, features like prioritized Simple
Network Management Protocol (SNMP), which allows for remote troubleshooting of
the network, also makes it even easier to check for any issues impacting that
performance, thus allowing you to implement fixes if necessary.
Security
An unmanaged switch has basic security features. They are secured by
ensuring you have no vulnerabilities from systems to systems which are accessible
to all devices. while the managed switch has one major security benefit, such as the
ability to monitor and control the network to shut down the entire thread.
Cost
Cost comparison between managed switch is cheaper than the unmanaged
network switch. But this device is also dependent on the number of ports in your
switches.
Firewall
Types of Firewall
A firewall is either a software or hardware device but it is recommended to
protect both your computer and server from the unwanted hackers. A software
firewall is a program installed on a computer; most firewalls are included in the
operating systems installed in your computer. A physical firewall is an equipment
installed between computer and a router.
26
Packet Filtering
Firewalls can be effective; they provide basic protection. It can determine if the
contents of the request that is being sent will adversely affect the application. If a
malicious request is allowed from a trusted source, the result will be the deletion of
a database.
Cloud Computing
27
Benefits of Cloud Computing
28
Infrastructure as a Service (IaaS)
provides renting for IT infrastructure - Server and Virtual Machines (VM’s),
storage, network, operating systems - cloud provider on a pay-as-you-go basis.
Serverless Computing
It focuses on building app functionality without spending time continually
managing the servers and infrastructure required to do so. The cloud provider
handles the setup, capacity planning and server management for you. Serverless
architectures are highly scalable and event-driven, only using resources when a
specific function or trigger occurs.
29
6. Select the adapter and
double click.
8. Click “Properties”.
or
30
What’s More
1. Manageable Switch
2. Unmanage Switch
3. Firewall
4. IaaS
Directions: Read the statements below and answer each on a separate sheet
of paper.
1. Identify the learnings that you have gained from the lesson.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
What I can Do
Directions: Accomplish the following tasks.
31
Assessment
10. It deals with benefits of cloud computing that provide self-service and on
demand so even in vast amounts of computing resources can be
provisioned in minute.
A. Performance C. Reliability
B. Productivity D. Speed
32
Additional Activities
Directions: Watch the following videos and write you reflections on a separate
sheet of paper.
1. Managed switch
https://www.youtube.com/watch?v=JHxU4DCjXV0
2. Firewall
https://www.youtube.com/watch?v=OQyXMYh6qLo
3. Cloud Computing
https://www.youtube.com/watch?v=dH0yz-Osy54
Reflection:
3. I will apply
RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do
and Reflection)
This rubric will monitor, score and give suggestions to improve the
performance of the students.
PERFORMANCE 1 PT. 3 PTS. 5 PTS.
INDICATORS NOT YET APPROACHING COMPETENT
COMPETENT COMPETENT
Content: Substantial,
specific, and illustrative
content which
demonstrated strong and
sophisticated ideas.
Focus: Apparent point to a
single topic with sufficient
awareness of task.
Conventions: Evident
control of grammar,
mechanics, spelling, usage
and sentence formation.
Suggestions and Recommendations:
33
Client Device Configuration/
Quarter 1
Lesson 4
Inspection Checklist/
Designing Network Diagram
This module was designed and written with you in mind. Carry out
communication checks between terminals in accordance with operating systems
network configuration guides and Respond to unplanned events or conditions in
accordance with established procedures. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.
LO 4: Inspect and test the configured computer networks TLE_IACSS9-
12SUCN-IIf-j-36
After going through this module, the learners shall be able to:
1. undertake final inspection of the configuration to conform to the
manufacturer’s instruction/manual;
2. ensure the configuration conforms to the manufacturer’s instruction/manual.
What I Know
Directions: Identify and label each equipment and cable used in this network
design. Write your answer on your notebook.
34
Directions: Encircle the words listed below. They may be written downward ,
upward, diagonally. or forward.
What’s New
35
What Is It
Step 1
Step 2
Look for the IPv4 Default Gateway IP address in the details window. Plug this
IP address into your web browser’s
address bar. You will need to log in with
your username and password
combination. If you do not know these,
your router is probably using its default
combination — check your router’s
manual or perform a web search for its
model number and “default password”. If
you have previously changed the
password and cannot remember it, you
can reset your router’s password to the
default.
36
Step 3
Step 4
Open the Wireless Settings.
When you log in to your router, you will
be taken to the router’s main menu or
status screen. There will be several
options to choose from. The Internet
section can usually be left at default
settings. The Wireless section will allow
you to set up your wireless network. Enter
a name for your wireless network.
37
Step 5
In the Wireless section, you should
see a field labeled SSID or Name. Enter a
unique name for your wireless network.
This is what other devices will see when
scanning for networks.
Step 6
Check the box to enable SSID
broadcast. This will essentially “turn on”
the wireless network so that it may be
readily seen by anyone in range of the
signal.
Step 7
Choose a security method.
Choose from the list of available security
options. For the best security, choose
WPA2-PSK as the encryption method.
This is the most difficult security to
crack, and to give you the most
protection from hackers and intruders.
Step 8
Create a passphrase. Once you
have chosen your security method, enter in a passphrase for the network. This
should be a difficult password, with a combination of letters, numbers, and symbols.
Do not use any passwords that could be easily deduced from your network name or
from knowing you. Then save the setting once naming and security settings are
finished configuring.
Number: P.C. #1
38
3. Are all device drivers installed and configured properly?
Ex.
39
Next is to arrange wire and devices depending on the space provided and make
sure that the wire will not cross each other to avoid confusion when problem occurs
during installation. Name all the devices including wire to be used then assign an IP
address for this network on each node, lastly print the network diagram.
Diagramming and designing a network are very easy, you can use any online
tools available in the internet or just use paper and pen to draw it. Just do not forget
to label every device you use so you will not be confused in designing a network
diagram.
40
Connect a computer to a network
Windows 10
1. Click the network button at the lower right corner of your screen.
5. Click “next”.
8. If the network is successful, the screen will show that you are connected
on the network. If not, it will indicate “no internet connection”.
Now you can try to browse the internet if it is connected through the internet.
Note: do not share your password and SSID with others for your data privacy
protection.
41
What’s More
Directions: Read and complete the statements below. Write you answer on a
separate sheet of paper.
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
_________________________________________________________________________________
What I Can Do
Directions: Accomplish the following tasks.
42
Steps/Procedure:
1. Make sure that your working area is ready.
2. Prepare the computer/laptop/cellphone and other equipment.
3. Configure the wireless router.
4. Change the SSID.
5. Change the wireless router password.
6. Connect the computer to a network.
Assessment Method:
1. Procedural Demonstration
Assessment
Directions: Draw and design a network diagram using the following devices.
a. Router
b. Switch
c. 2 laptop computers
d. 4 Desktop
e. 2 Modular boxes
f. 1 Patch panel
Additional Activities
Directions: Watch the following videos and write you reflections on
separate sheet of paper.
Reflection:
1. I have learned that
3. I will apply
43
1. Assessment Actual Demonstration using this rubric
RUBRIC
PERFORMANCE INDICATOR 1 PT. 3 PTS. 5 PTS.
NOTYET APPROACHING COMPETENT
COMPETENT COMPETENT
Identifying and obtaining
necessary materials needed
before the start of the
activity.
RUBRIC (What’s In, What’s More, What I Have Learned, What I Can Do
and Reflection)
This rubric will monitor, score and give suggestions to improve the
performance of the students.
PERFORMANCE 1 PT. 3 PTS. 5 PTS.
INDICATORS NOTYET APPROACHING COMPETENT
COMPETENT COMPETENT
Content: Substantial,
specific, and illustrative
content which
demonstrated strong and
sophisticated ideas.
44
Focus: Apparent point to a
single topic with sufficient
awareness of task.
Conventions: Evident
control of grammar,
mechanics, spelling, usage
and sentence formation.
Suggestions and Recommendations:
References
https://community.fs.com/blog/nic-card-guide-for-beginners-functions-types-and-
selection-tips.html
https://www.lifewire.com/what-is-a-static-ip-address-2626012
https://www.techopedia.com/definition/28504/dynamic-internet-protocol-
address-dynamic-ip-
address#:~:text=A%20dynamic%20Internet%20Protocol%20address,to%20every%2
0new%20network%20node.
https://www.webopedia.com/TERM/A/APIPA.html
https://www.paessler.com/network-device-
management#:~:text=Generally%20speaking%2C%20network%20devices%20are,fir
mware%20which%20must%20be%20updated.
https://www.linksys.com/nz/support-article?articleNum=136548
https://www.linksys.com/us/support-article?articleNum=142912
https://www.linksys.com/my/support-article?articleNum=136155
https://www.windowscentral.com/how-connect-wi-fi-network-windows-10
https://www.fieldengineer.com/blogs/network-switch-managed-vs-
unmanaged#:~:text=The%20Differences%20Between%20Managed%20and,for%20gr
eater%20control%20over%20it.https://www.fieldengineer.com/blogs/network-
switch-managed-vs-
unmanaged#:~:text=The%20Differences%20Between%20Managed%20and,for%20gr
eater%20control%20over%20it.
http://www.ybet.be/en-hardware-2-16/
https://www.forcepoint.com/cyber-edu/firewall
https://www.lifewire.com/what-is-a-public-ip-address-2625974
https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-
server-2012-r2-and-2012/jj129382(v=ws.11)
45
For inquiries or feedback, please write or call:
Department of Education – National Capital Region
46