CSS3 M4
CSS3 M4
This module is specifically crafted to focus on Process and Delivery enriched with modular and online activities that will
assess your level in terms of skills and knowledge. Learning procedures are divided into different sections such as: What you are
supposed to learn, What I know, what’s in, what’s more, What I can do, Assessment, What I can show. You will be introduced
to different learning activities preparing you to be skillful before you take the plunge into the world of work as a hardware
service provider and to feel more confident while providing support where needed. Indeed, as learners of hardware servicing,
you are a crucial link in the emergency response process. Ideally, everyone should know what to do in an emergency situation,
but proper training can help an individual provide basic care.
By the end of the lesson, you are expected to;
1. Identify wireless settings and computer networks;
2. Compare network connectivity and system settings configuration; and
3. Appreciate the importance of setting up a computer network.
WHAT I KNOW
DIRECTION: Read the following statement and choose the letter of the correct answer.
1. Every computer looking to access the internet would be known as this.
a. Client c. hub
b. Desktop d. Server
2. Identifies company or commercial sites
a. .org c. .gov
b. .com d. .edu
3. What is indicated when the domain name has only two letters like .us, .uk, .au, .mx, or .ca
a. Invalid domain c. secure domain
b. Private domain d. Country domain
4. Used for educational sites (most commonly four-year universities)
a. .edu c. .org
b. .com d. .net
5. Process of encoding messages or information in such way that only authorized parties can read it.
a. Layering c. encryption
b. Securing d. phishing
6. Network that allows information to be shared between devices over LAN
a. Wifi c. ethernet
b. Hotspots d. server
7. Name for the thin tubes of glass used by much of the internet to send data quickly over long distances underground
a. ethernet c. hub
b. Wifi d. fiber optic
8. The acronym for file transfer protocol
a. http c. ftp
b. https d. pdf
9. Used for government sites
a. .edu c. .com
b. .gov d. .net
10. The acronym for hypertext markup language that is widely considered the language of the internet
a. https c. ftp
b. http d. html
WHAT’S IN
Computer network, two or more computers that are connected with one another for the purpose of communicating data
electronically. Besides physically connecting computer and communication devices, a network system serves the important
1|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT
function of establishing a cohesive architecture that allows a variety of equipment types to transfer information in a near-seamless
fashion. Two popular architectures are ISO Open Systems Interconnection (OSI) and IBM’s Systems Network Architecture
(SNA).
Two basic network types are local-area networks (LANs) and wide-area networks (WANs). LANs connect computers
and peripheral devices in a limited physical area, such as a business office, laboratory, or college campus, by means of links
(wires, Ethernet cables, fibre optics, Wi-Fi) that transmit data rapidly. A typical LAN consists of two or more personal computers,
printers, and high-capacity disk-storage devices called file servers, which enable each computer on the network to access a
common set of files. LAN operating system software, which interprets input and instructs networked devices, allows users to
communicate with each other; share the printers and storage equipment; and simultaneously access centrally located processors,
data, or programs (instruction sets). LAN users may also access other LANs or tap into WANs. LANs with similar architectures
are linked by “bridges,” which act as transfer points. LANs with different architectures are linked by “gateways,” which convert
data as it passes between systems.
WANs connect computers and smaller networks to larger networks over greater geographic areas, including different continents.
They may link the computers by means of cables, optical fibres, or satellites, but their users commonly access the networks via
a modem (a device that allows computers to communicate over telephone lines). The largest WAN is the Internet, a collection of
networks and gateways linking billions of computer users on every continent.
URL, in full Uniform Resource Locator, address of a resource on the Internet, or of a file stored locally. The resource can be any
type of file stored on a server, such as a Web page, a text file, a graphics file, or an application program. The address contains
three elements: the type of protocol used to access the file (e.g., HTTP for a Web page, ftp for an FTP site); the domain
name or IP address of the server where the file resides; and, optionally, the pathname to the file (i.e., description of the file’s
location). For example, the URL http://www.britannica.com/heritage instructs the browser to use the HTTP protocol, go to the
www.britannica.com Web server, and access the file named heritage.
thin client, also called dumb terminal, computer terminal or software application providing access over a network to a
dedicated server. Unlike a personal computer (PC), which hosts applications, performs processing tasks, and stores files locally, a
thin client does little more than transmit keyboard and mouse input to the server and display the resulting output on the local
screen.
Thin clients typically consist of a monitor, a keyboard, and a mouse, with no hard disk and a minimal amount of memory. A thin
client may also be a software application running on a standard PC, providing access to remotely hosted applications.
Applications may be shared among all users on the network, or a server may be partitioned to provide each user with a
personalized “virtual desktop.”
Thin clients are often used by businesses and schools as an efficiency measure. Because terminal hardware is minimal, thin clients
are less costly and consume less energy than PCs, and, because almost all of the computer programs are on a dedicated server,
only a single copy of each software application is needed (though a license for multiple users is generally required). In addition,
thin clients do not process or store data, so malfunctioning units can be seamlessly replaced. The centralized control makes the
system relatively secure and the data easy to back up.
Networked dumb terminals have been in use since the 1970s. The name thin client was introduced in the 1990s by manufacturers
to emphasize the efficiency and cost savings of the technology. (Thick [or fat] clients is the term for computers that rely on their
own resources.) The use of Web browsers to remotely access e-mail and other applications brought a form of thin-client
computing into wide use in the late 1990s; the following decade saw movement toward cloud computing, which allowed scaled-
back PCs, such as netbooks, with some independent storage and processing capacity to access applications over the Internet.
DNS, in full domain name system, network service that converts between World Wide Web “name” addresses and
numeric Internet addresses.
The concept of a name server came about as a result of the first computer networks in the mid-1970s. Each computer on a
network was identified by a unique number, but, as the size of computer networks grew, users had a hard time keeping track of
which machine corresponded to each number. To keep track, researchers developed a database that translated each computer’s
numeric address into a domain name, which is a string of letters and numbers that is generally easier for users to remember than
numeric addresses.
Modern DNS servers work in a similar fashion, with a set of databases running on servers scattered around the Internet. DNS
servers use a hierarchical structure to organize domain names. There are two basic types of DNS servers: primary, which contain
the databases, and secondary, which retrieve information from primary databases. The basic form of this structure is the name of
a machine, followed by a top level domain (TLD), separated by dots (periods). For example, britannica.com has the domain
name “britannica” and the TLD “com.” The most common type of TLD is a generic one such as “com,” “gov,” or “edu,” though
there are also country code TLDs, such as “uk,” “ca,” or “au,” and sponsored TLDs, such as travel or jobs. Domain and TLD
names are registered and controlled by the Internet Corporation for Assigned Numbers and Names (ICANN).
Early development
The origin of the expression cloud computing is obscure, but it appears to derive from the practice of using drawings of stylized
clouds to denote networks in diagrams of computing and communications systems. The term came into popular use in 2008,
though the practice of providing remote access to computing functions through networks dates back to the mainframe time-
sharing systems of the 1960s and 1970s. In his 1966 book The Challenge of the Computer Utility, the Canadian electrical
engineer Douglas F. Parkhill predicted that the computer industry would come to resemble a public utility “in which many
remotely located users are connected via communication links to a central computing facility.”
For decades, efforts to create large-scale computer utilities were frustrated by constraints on the capacity of telecommunications
networks such as the telephone system. It was cheaper and easier for companies and other organizations to store data and run
applications on private computing systems maintained within their own facilities.
The constraints on network capacity began to be removed in the 1990s when telecommunications companies invested in high-
capacity fiber-optic networks in response to the rapidly growing use of the Internet as a shared network for exchanging
information. In the late 1990s, a number of companies, called application service providers (ASPs), were founded to supply
computer applications to companies over the Internet. Most of the early ASPs failed, but their model of supplying applications
remotely became popular a decade later, when it was renamed cloud computing.
o Body Area Network: Body Area Network is a network that moves with a person. For example, a mobile network moves
with a person. Suppose a person establishes a network connection and then creates a connection with another device to share
the information.
o Offline Network: An offline network can be created inside the home, so it is also known as a home network. A home
network is designed to integrate the devices such as printers, computer, television but they are not connected to the internet.
o Small Home Office: It is used to connect a variety of devices to the internet and to a corporate network using a VPN
Internetwork
o An internetwork is defined as two or more computer network LANs or WAN or computer network segments are connected
using devices, and they are configured by a local addressing scheme. This process is known as internetworking.
o An interconnection between public, private, commercial, industrial, or government computer networks can also be defined
as internetworking.
4|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT
o An internetworking uses the internet protocol.
o The reference model used for internetworking is Open System Interconnection(OSI).
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet protocol such as Transmission Control
protocol and internet protocol. It is used for information sharing. The access to the extranet is restricted to only those users
who have login credentials. An extranet is the lowest level of internetworking. It can be categorized as MAN, WAN or other
computer networks. An extranet cannot have a single LAN, atleast it must have one connection to the external network.
2. Intranet: An intranet is a private network based on the internet protocol such as Transmission Control
protocol and internet protocol. An intranet belongs to an organization which is only accessible by the organization's
employee or members. The main aim of the intranet is to share the information and resources among the organization
employees. An intranet provides the facility to work in groups and for teleconferences.
Intranet advantages:
o Communication: It provides a cheap and easy communication. An employee of the organization can communicate with
another employee through email, chat.
o Time-saving: Information on the intranet is shared in real time, so it is time-saving.
o Collaboration: Collaboration is one of the most important advantage of the intranet. The information is distributed among
the employees of the organization and can only be accessed by the authorized user.
o Platform independency: It is a neutral architecture as the computer can be connected to another device with different
architecture.
o Cost effective: People can see the data and documents by using the browser and distributes the duplicate copies over the
intranet. This leads to a reduction in the cost.
A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a VPN
host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means your
Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send and receive
online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their hands on your
data, it would be useless.
A VPN connection disguises your data traffic online and protects it from external access. Unencrypted data can be viewed by
anyone who has network access and wants to see it. With a VPN, hackers and cyber criminals can’t decipher this data.
Secure encryption: To read the data, you need an encryption key . Without one, it would take millions of years for a computer
to decipher the code in the event of a brute force attack . With the help of a VPN, your online activities are hidden even on
public networks.
Disguising your whereabouts : VPN servers essentially act as your proxies on the internet. Because the demographic location
data comes from a server in another country, your actual location cannot be determined. In addition, most VPN services do not
store logs of your activities. Some providers, on the other hand, record your behavior, but do not pass this information on to
third parties. This means that any potential record of your user behavior remains permanently hidden.
Access to regional content: Regional web content is not always accessible from everywhere. Services and websites often
contain content that can only be accessed from certain parts of the world. Standard connections use local servers in the country
to determine your location. This means that you cannot access content at home while traveling, and you cannot access
international content from home. With VPN location spoofing, you can switch to a server to another country and effectively
“change” your location.
Secure data transfer: If you work remotely, you may need to access important files on your company’s network. For security
reasons, this kind of information requires a secure connection. To gain access to the network, a VPN connection is often
required. VPN services connect to private servers and use encryption methods to reduce the risk of data leakage.
Your ISP usually sets up your connection when you connect to the internet. It tracks you via an IP address. Your network
traffic is routed through your ISP's servers, which can log and display everything you do online.
This is especially important if you regularly connect to public Wi-Fi networks. You never know who might be monitoring
your internet traffic and what they might steal from you, including passwords, personal data, payment information, or even
your entire identity.
You should rely on your VPN to perform one or more tasks. The VPN itself should also be protected against compromise.
These are the features you should expect from a comprehensive VPN solution:
Encryption of your IP address: The primary job of a VPN is to hide your IP address from your ISP and other third parties. This
allows you to send and receive information online without the risk of anyone but you and the VPN provider seeing it.
Encryption of protocols: A VPN should also prevent you from leaving traces, for example, in the form of your internet history,
search history and cookies. The encryption of cookies is especially important because it prevents third parties from gaining
access to confidential information such as personal data, financial information and other content on websites.
Kill switch: If your VPN connection is suddenly interrupted, your secure connection will also be interrupted. A good VPN can
detect this sudden downtime and terminate preselected programs, reducing the likelihood that data is compromised.
Two-factor authentication: By using a variety of authentication methods, a strong VPN checks everyone who tries to log in.
For example, you might be prompted to enter a password, after which a code is sent to your mobile device. This makes it
difficult for uninvited third parties to access your secure connection.
WHAT’S MORE
DIRECTION: After reading all of the information about the Computer Network for the past two weeks, answer the following
statements.
WHAT I CAN DO
ASSESSMENT
DIRECTION: Analyze the following images below and determine what type of computer network is being shown.
1. ________________________
3. _________________________
4. __________________________
5. _________________________
Which category in 21st Century skills do you think the core of our topic falls in? (Communication, collaboration, creativity, critical
thinking, productivity, leadership and technology literacy). Explain why.
LINKS:
https://www.britannica.com/technology/cloud-computing
https://www.geeksforgeeks.org/types-of-computer-networks/
https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-
area-network.html
https://www.javatpoint.com/types-of-computer-network