COC2 - Hand Outs
COC2 - Hand Outs
COC2 - Hand Outs
COMPUTER SYSTEMS
Qualification : SERVICING NCII
Unit of
Competency : SET-UP COMPUTER NETWORKS
SETTING-UP COMPUTER
Module Title : NETWORKS
HOW TO USE THIS COMPETENCY –BASED LEARNING MATERIAL
Welcome!
Remember to:
Work through all the information and complete the activities in each
section.
When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.
LEARNING OUTCOMES:
At the end of this module you MUST be able to:
ASSESSMENT CRITERIA:
MODULE DESCRIPTOR:
This module covers the outcomes required in
Setting-up computers networks for LANs and
Small-office home-office (SOHO) systems. It
Consists of competencies to install Ethernet
Cables, set network configuration, set router/Wi-
Fi/ wireless access point/repeater configuration
As well as to inspect and test the configured
Computer networks.
CONTENTS:
ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and obtained
in accordance with established procedures and checked against systems
requirements
3. Tools, equipment and testing devices needed to carry out the installation work
are obtained in accordance with established procedures and checked for correct
operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage
has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
Excess components and materials are disposed of based on WEEE directives and 3Rs waste
management program
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 1.1-1
NETWORK MATERIALS,TOOLS AND EQUIPMENT
LEARNING OBJECTIVES:
An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
Cables and connectors. These link together the computers, printers, servers and
other equipment on your network.
A router. This manages network traffic, ensuring devices can communicate with
each other via both wired and wireless connections, and provides internet
connectivity.
A wireless access point (optional). This will extend your wireless network if the
router is incapable of offering coverage in certain parts of the building.
An internet connection. This could be a faster fibre connection or dedicated
leased line.
A hardware firewall. This creates a secure barrier between your network and the
internet, blocking security threats. Networks sometimes include an on-site network
server which runs central applications, acts as an email server and provides file
storage.
Network hardware building blocks
Some businesses still build their network with cables because they're very reliable
and fast. The most common type is Ethernet cable, which is rated for speed. Cat 6
cables can carry data fast enough for any business purpose.
When building their network most businesses install network sockets at convenient
locations in their premises, so computers and other devices can be plugged into the
network. The sockets cost about £3 each.
Going wireless
Routers also include Wi-Fi capability, enabling people to connect
laptops, smartphones, tablets and other devices to the network wirelessly.
Wi-Fi is ideal for providing network access to staff with mobile devices and in meeting
rooms or common areas. It's also useful for offering internet access to visitors, with
many routers including a separate 'guest' network for the purpose. Wireless routers
start at around £70.
RJ45
RJ means Registered jack. This is a
standard physical Network Interface
used for connecting telecommunications
equipment commonly, a computer networking equipment
UTP CABLE
The cheapest cable use in computer in
networking is the UTP
(Unshielded Twisted Pair) cable.
Other use the STP (Shielded Twisted Pair)
cable which is cost much than UTP but more reliable.
CRIMPER
Crimping tool is used to join the
RJ-45 and RJ-11 connectors to
the both ends of either phone
or CAT5 cable.
WIRE STRIPPER
LAN TESTER
A cable tester is a device that
is used to test the strength and
connectivity of a particular
type of cable or other wired assemblies.
ROUTER
SWITCH HUB
A network switch (also called switching hub,
bridging hub, and by the IEEE MAC bridge)
is networking hardware that connects devices
on a computer network by using packet
switching to receive and forward data
to the destination device.
BAY RACK
PATCH PANEL
RACEWAY or SLOTTED
COMPUTER TABLE
a flat surface, usually supported by
four legs, used for putting things on
LEARNING OBJECTIVES:
STRAIGHT THROUGH
TYPE A TYPE B
Materials Needed:
2 RJ45
1 meter Network Cable – UTP cable
Tools Needed:
Crimping Tool
Wire Stripper
LAN Tester
Equipment Needed:
2 Working computers with Network Adapter (LAN port)
Position all eight wires according to its assigned pins in the RJ45
Position all wires. Make sure that all are in proper pin assignment
Make sure that the cut is even and small enough for the RJ45
Put all wires inside the RJ45.
POSSIBLE ISSUES:
Connection between server and computer(s) is weak
Outside interference causing data loss or decreased signal strength
Faulty cable
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
Wireless Configuration (WZC),
also known as Wireless Auto
Configuration, or WLAN
AutoConfig, is a wireless connection
management utility included
with Microsoft Windows XP and
later operating systems as
a service that dynamically selects
a wireless network to connect to
based on a user's preferences and
various default settings.[1][2] This can
be used instead of, or in the
absence of, a wireless network
utility from the manufacturer of a
computer's wireless networking
device. The drivers for the wireless
adapter query the NDIS Object IDs and pass the available network names (SSIDs)
to the service. The service then lists them in the user interface on the Wireless
Networks tab in the connection's Properties or in the Wireless Network
Connection dialog box accessible from the notification area. A checked (debug)
[3]
build version of the WZC service can be used by developers to obtain additional
diagnostic and tracing information logged by the service.
SET-UP A WIRELES ROUTER
As more and more devices are able to connect to wireless networks, setting up a
wireless router has become a crucial step for virtually any home network. Setting
up a wireless network will allow your devices to connect to the internet from
practically anywhere in the house, without the need for messy wires.[1] To get
started setting your
4.Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings. You
can disconnect this computer afterwards if you want to connect wirelessly. You can
also connect your laptop wirelessly for the first time, the wifi network name and the
default password will be printed on the router's label
PART 2 SET-UP :
1.When you power on the router, it will only create its wi-fi network, and the
device will be connected to the router's wi-fi connection, not the internet. To
connect the router to the internet, with some internet providers (i.e. GTPL in India),
it is required to register router's MAC address to the internet service provider's
website.
MAC of the router can be found printed on router or in the documents etc.
2.Go to the internet service provider's website. Type ip address Log in with the
username and password provided by the internet service provider and go to MAC
address update option. one can see their existing laptop / computers MAC address
there. Add the router's MAC address there and save it. This process means that the
router is authorized to use the internet provide by the broadband company.
2.Enter your username and password. In order to access the configuration page,
you will need to be on the router's IP address and enter a valid username and
password at the prompt. Most routers have a basic account set up that you will
need to use to log on. This varies from model to model, but should be printed on
the router or in the documentation.
The most typical username is “admin”.
The most typical passwords are “admin” and “password”.
Many routers will only require a username and a blank password, and some
allow you to leave all fields blank.
If you can’t figure out the correct IP address, your username or password,
search for your router model online to see what the default login is. If it has
been changed, press the Reset button on the back of the router for 10 (to
30+ seconds as dictated in the instructions for the router model) to restore
factory defaults and try again.
3.Open the Wireless Settings. When you log in to your router, you will be taken to
the router’s main menu or status screen. There will be several options to choose
from. The Internet section can usually be left at default settings, unless you
received specific instructions from your internet service provider. The Wireless
section will allow you to set up your wireless network.
4.Enter a name for your wireless network. In the Wireless section, you should
see a field labeled SSID or Name. Enter a unique name for your wireless network.
This is what other devices will see when scanning for networks.
Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the
signal. *See the Tips section below for additional information on the SSID
setting.
For detailed instructions on selecting and joining a wireless network for your
specific computer, tablet, or smartphone, follow this guide.
3.Connect your other devices. Besides other computers and tablets, you can
connect other devices as well, such as printers, game consoles, TVs and more. See
the following guides for instructions for your specific device.
Network Connectivity
What is a Network?
Computers connected to a
network are broadly
categorized as servers or
workstations. Servers are
generally not used by humans directly, but rather run continuously to provide
"services" to the other computers (and their human users) on the network. Services
provided can include printing and faxing, software hosting, file storage and
sharing, messaging, data storage and retrieval, complete access control (security)
for the network's resources, and many others.
Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally
considered a desktop, consisting of a computer, keyboard, display, and mouse, or a
laptop, with with integrated keyboard, display, and touchpad. With the advent of
the tablet computer, and the touch screen devices such as iPad and iPhone, our
definition of workstation is quickly evolving to include those devices, because of
their ability to interact with the network and utilize network services.
Wide Area Networks (WANs) connect networks in larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a
matter of seconds, without paying enormous phone bills. Two users a half-world
apart with workstations equipped with microphones and a webcams might
teleconference in real time. A WAN is complicated. It uses multiplexers, bridges,
and routers to connect local and metropolitan networks to global communications
networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.
ROUTER
SWICTH HUB
PATCH PANEL
SWICTH HUB
FIFTH: CONNECT PATCH PANEL TO 2 SYSTEMS UNIT
PATCH PANEL
After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each
computer on the network its own individual IP address. This process is handled
automatically if you're using a router. Think of an IP address as a mailing
address. Each computer on the network needs a unique IP address so that
information sent across the network reaches the correct destination.
Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.
Click the Use the following IP address radio button.
A. Click Start
B. Right-click Network and click Properties
C. Click Local Area Connection
D. Click Details. Make note (on a piece of paper) of the address on the
right side of IPv4 Address:
(For our example, we are building a small network and we will just use a small
range of IP addresses. In the real world or for a large network, you would need to
actually know TCP/IP, design a range of IP addresses you plan to use, then assign
those IP addresses, or design a way to assign the IP addresses to the computers)
E. Click Close
F. In the Local Area Connection Status dialog box, click Properties
G. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
Click Properties
H. Click Use the Following IP Address
I. Type the IP address you want the server to use. For our example,
and based on the above dialog box, we type 192.168.001.001
J. Press Tab
K. Type the subnet mask (normally, it should be added automatically
when you press Tab from the previous IP address text box) and
press Tab
L. Type the default gateway address (use the first and the second octets
of the IP address you had provided (such as 192.168) and use
001.001 for the other two bytes)
M.Provide the Preferred DNS server address (we use 127.0.0.1 for our
example) and the Alternate DNS Server address (we leave ours
empty)
N. Click Advanced to check the values that were put in the IP Settings
and DNS property pages
O. Click OK
P. Click OK
Q. Click Close
R. Click Close
INFORMATION SHEET 2.1-2
CONFIGURE NETWORK CONNECTIVITY
CONTENTS:
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 3.1-1
TESTING THE CONFIGURED COMPUTER NETWORKS
LEARNING OBJECTIVES:
That sounds pretty good to me. But if we take that passage and replace
“software” with “network”, we get:
“Network testing is an
investigation conducted to provide
stakeholders with information about
the quality of the product or service
under test. Network testing can also
provide an objective, independent
view of the network to allow the
business to appreciate and
understand the risks of network
implementation.”
Couldn’t be further from the truth.
Network testing is, in the end,
making sure that your network
configuration works as designed. Network testing is very similar to software
testing, with one exception: in contrast to software testing, network testing
often has to happen in a production environment, after the configuration
change was made. In fact, it is sometimes very difficult, or almost impossible,
to model a complex system like a large enterprise network, or the Internet
itself, in a lab environment. Thus, network testing is a MUST-HAVE step in the
network implementation process.
Use Case Testing is a software testing technique that helps to identify test
cases that cover entire system on a transaction by transaction basis from start
to end. Test cases are the interactions between users and software application.
Use case testing helps to identify gaps in software application that might not be
found by testing individual software components.
Ping
ping is a fundamental tool for testing TCP/IP network connectivity. Because
most networks today use the Internet (TCP/IP) protocol for file and printer
sharing services, as well as for Internet access, most Windows users can use
the ping test to confirm that their network cabling, hardware, and the TCP/IP
protocol are all functioning correctly. Ping sends several data packets to a
specified computer and waits for the other computer to send the packets back.
By default, it sends four packets and prints the results of the four tests.
To see whether the network can carry data between a pair of computers, use
the ipconfig command (described previously) to find the IP address of the two
computers. Then, on one computer, open a command prompt window by
choosing Start, All Programs, Accessories, Command Prompt.
Next, type the following command:
Ping 127.0.0.1
This command tests the networking software of the computer itself by sending
packets to the special internal IP address 127.0.0.1. This test has the computer
send data to itself. It should print the following:
If your computer can send data to itself, try another computer on your LAN.
Find its IP address by running ipconfig on that computer and then issue
the ping command again on the first computer, as in this example:
Ping 192.168.0.23
Of course, you should use the other computer's real IP address in place of
192.168.0.23. You should get four replies as before:
These replies indicate that you have successfully sent data to the other
machine and received it back.
Ping comes from a term used in sonar technology that sends out pulses of
sound, and then listens for the echo to return. On a computer network, a ping
tool is built into most operating systems that works in much the same way.
You issue the ping command along with a specific URL or IP address. Your
computer sends several packets of information out to that device, and then
waits for a response. When it gets the response, the ping tool shows you how
long each packet took to make the round trip—or tells you there was no reply.
It sounds simple, and it is. But you can use it to good effect. You can test
whether your computer can reach another device—like your router—on your
local network, or whether it can reach a device on the Internet. This can help
you determine if a network problem is somewhere on your local network, or
somewhere beyond. The time it takes packets to return to you can help you
identify a slow connection, or if you’re experiencing packet loss.
And it pretty much doesn’t matter what operating system you’re using. Pull up
a terminal or Command Prompt window, and you can use ping on macOS,
Linux, or any version of Windows.
How to Use Ping
We’re going to use the Windows Command Prompt in our example here. But
you can also use the ping command in Windows PowerShell, or in the Terminal
app on macOS or any Linux distro. Once you get to using the actual command,
it works the same everywhere.
In Windows, hit Windows+R. In the Run window, type “cmd” into the search
box, and then hit Enter.
At the prompt, type “ping” along with the URL or IP address you want to ping,
and then hit Enter. In the image below, we’re pinging www.howtogeek.com and
getting a normal response.
That response shows the URL you’re pinging, the IP address associated with
that URL, and the size of the packets being sent on the first line. The next four
lines show the replies from each individual packet, including the time (in
milliseconds) it took for the response and the time-to-live (TTL) of the packet,
which is the amount of time that must pass before the packet is discarded.
At the bottom, you’ll see a summary that shows how many packets were sent
and received, as well as the minimum, maximum, and average response time.
And in the next image, we’re pinging the router on our local network using its
IP address. We’re also getting a normal response from it.
When the ping tool does not get a response from whatever devices you’re
If you’re curious about them, though, just type “ping /?” at the Command
Prompt to see a list.
So, What Can You Do With Ping?
Now that you know how to use the command, here are some interesting things
you can do with it:
Note: You may not get a ping response from other computers on your local
network because the built-in firewalls on those devices prevent them from
responding to ping requests. If you want to be able to ping those devices, you’ll
need to turn off that setting to allow pings through the firewall.
The list above uses a kind of outside-in approach, where you ping the furthest
destination first, and then work your way in to the more local devices. Some
people like to work inside-out by pinging the loopback address first, then their
router (or another local device), and then an internet address.
And of course, what we’re talking about in this article is mostly about using
ping to perform troubleshooting on a home or small business network. On
larger networks, there’s a lot more complexity to worry about. Plus, if you’re
tasked with troubleshooting larger networks, you probably already know how
to use ping and many other networking tools.
INFORMATION SHEET 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS
LEARNING OBJECTIVES:
ipconfig
If your computer can't communicate with others on your LAN, after you check
the Event Log and Device Manager, use the ipconfig command-line utility to
see whether your computer has a valid IP address. Check other computers on
the LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs,
Accessories, Command Prompt), type the following command:
ipconfig /all
Windows IP Configuration
(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that
mention Tunnel adapters.)
Host name—This should be set to the desired name for each computer. If
you can correspond with some computers but not others, be sure that the
ones that don't work are turned on and correctly named. Make sure that
you don't have two computers with the same name, and that none of the
computer names is the same as the workgroup name.
IP address—This should be set appropriately for your network. If your LAN
uses Internet Connection Sharing, the address will be a number in the
range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for
automatic configuration, your network manager can tell you whether the IP
address is correct. Networks with cable/DSL sharing routers usually use
numbers starting with 192.168.x where x is a number from 0 to 15.
Each computer on the same LAN should have a similar valid IP address and
the same network mask. If they don't, check your network configuration. The
built-in Windows "Repair" function may also be used to help fix problems with
DHCP-based (automatic) IP address assignment.
NOTE
Computer
You can check your computer's identification and workgroup or domain
membership setup from the Computer window. To do so, click Start,
Computer. Look in the Details pane at the bottom of the screen for the
computer name and domain or workgroup name, as shown in
NOTE
None of your computers can use the workgroup or domain name as its
computer name. For example, if your workgroup is MSHOME, you can't also
name a computer MSHOME. If you find this on one of your computers, change
that computer's name.
Network Connections
You can manually check all installed network protocols and services and their
configuration by viewing Network Connections and viewing the properties for
Local Area Connection. To view this screen, click Start, Network. At the top of
the Network window, click Network and Sharing Center. In the left pane of that
window, click Manage Network Settings. Then, right-click your Local Area
Connection icon (or the appropriate wireless connection icon) and select
Properties.
So, how do you protect devices from the prying eyes of the hackers?
All the wireless networks and secretive information should be well encrypted
with unique username and passwords making it difficult for the hackers to
break into the system. Using a WPA2 encryption is more secure way than any
other encryption protocol as it is not easily hacked into.
If the CCTV hooked up with the system is not encrypted strongly than hackers
can easily view your updates of home or office and steal prime information.
Hackers could get all the insights of your office and household and can make a
right move at the right time.So it is very important to keep it secure with
username and password which may not be guessed. You can have an alarm
and security features if any unknown device hacks into it to keep your system
safe.