Module 1 Css g12 1st Sem Week 1 3
Module 1 Css g12 1st Sem Week 1 3
Computer Systems
Servicing NC-II
Module 1:
Set Up A Peer to Peer
Network
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.
CSS
Module 1:
Introductory Message
For the facilitator:
This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.
In addition to the material in the main text, you will also see this box in the body of
the module:
As a facilitator you are expected to orient the learners on how to use this module.
You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.
1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.
We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!
This module was designed and written with you in mind. It is here to help you
master the nature of Computer Systems Servicing NC-II. The scope of this module
may be used in many different learning situations. The language used recognizes
the diverse vocabulary level of students. The lessons are arranged to follow the
standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.
What I Know
Multiple Choice. Select the letter of the best answer and write it on a separate
sheet of paper. If you get 100% in this pre- test you can skip this module and
proceed to module 11.
1. Network in which every computer is capable of playing the role of client, server,
or both at the same time is called ___________.
a. Local Area Network
b. Wide Area Network
c. Dedicated Server Network
d. Peer to Peer Network
2. Which of the following statement regarding computer servers is false?
a. A single computer server is sufficient for all types of network
b. A computer server is a computer system that provides services over a
network
c. Regular desktop computers can be configured to operate as a server, but
many servers consist of specialized hardware.
d. Computer servers can consume a lot of energy and are therefore often
stored in a dedicated, cooled room,
3. What does the acronym P2P stand for in the context of computer network
architecture?
a. Point to Point
b. Peer to Peer
c. Pier to Pier
d. Pear to Pear
4. Which of the following is the collection of computers and related equipment that
are connected so that data can move between them?
a. Computer System
b. Router
c. Network
d. Software
5. In a peer-to-peer network, you can have a server.
a. True
b. False
c. Maybe
d. I don’t know
6. How many server does a typical client/server network has?
a. At least one
b. As many as there are clients
c. One for every three clients
d. 6
7. An operating system oriented to computer networking allow _______ and
_________ among multiple computers in a network, to enable the sharing of data,
users, groups, security, applications, and other networking functions.
a. keyboard and mouse accessibility
b. device manager and hardware
c. remote desktop and printer
d. shared file and printer access
Lesson
Set Up a Peer to Peer Network
1
A
network is simply a group
of two or more personal
computers linked together.
Many types of networks exist, but
the most common types of
networks are Local-Area Networks
(LANs), and Wide-Area Networks
(WANs).In a LAN, computers are
connected together within a "local"
area (for example, an office or
home). In a WAN, computers are
further apart and are connected
via telephone/communication
lines, radio waves or other means
of connection.
You will be able to learn network architecture in this module and how to do
a peer to peer network using computer server and a client to share files, computers
and printers.1
1
Margaret Rouse, "What Is An Operating System (OS)?", Whatis.Com, 2020,
https://whatis.techtarget.com/definition/operating-system-OS.
10
What’s In
Let us see if you still remember the previous module you have completed. In this
Venn Diagram, kindly compare and contrast the two main types of IP addresses.
Write your answer on another sheet of paper. You will be graded one point each,
make at least two (2) comparisons, contrasts, and similarities with a total of six (6)
items.
I. Venn Diagram
Comparison: Similarities:
1. 1.
2. 2.
Contrast:
1.
2.
Great job! Proceed to the next exercise on the next page about IP classes.
11
III. Enumeration
1. What are the simple tests that you can conduct to make sure your network
is functional?
1.
2.
3.
4.
After refreshing your knowledge about the setting up computer networks in setting
network configuration by knowing and understanding the differences and
similarities of IP Address in a network whether you will use Static or Dynamic IP
Address in the previous module. Also, you will consider the importance of the
different classes of IP Address for you to be able to distinguish what IP address you
are going to use. It seems that you really fully understand the Setting Up Computer
Networks, it will be now easier for you to understand the new module about Setting
Up Computer Servers because you already have a knowledge on this part so you
can apply and explore new topics by means of this.
Now, you are ready to a new lesson, let’s turn to the next page to explore the new
world of networking! Let’s go!
12
What’s New
This activity will help you to understand more about the idea on how the network
operating system processes by creating user access and by sharing files and
printer. Answer the different given scenarios to analyze how this works. You will be
graded using the rubrics below. You can have a highest possible score of 30 for this
assessment. Try your best to get 80% in this activity, this will be the passing rate.
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
13
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
3. Accounts, passwords, and permissions are saved in a local database and are
used to determine what someone can do when connecting to your computer. What
do you think will be the main issue of a peer to peer networking in a company or in
a certain working station?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
14
15
What is It
The term network operating system is used to refer to two rather different
concepts:
1. A specialized operating
system for a network
device such as a router,
switch or firewall.
2. An operating system
oriented to computer
networking, to allow
shared file and printer
access among multiple
computers in a
network, to enable the sharing of data, users, groups, security,
applications, and other networking functions typically over a local
area network (LAN), or private network. This sense is now largely
historical, as common operating systems generally now have such
features included.2
B. Peer-to-Peer Network
In a Peer-to-Peer network operating system
users are allowed to share resources and files
located on their computers and access shared
resources from others. This system is not
based with having a file server or centralized
management source. A Peer-to-Peer network
sets all connected computers equal; they all
share the same abilities to use resources available
on the network.
The advantages include:
a. Ease of setup
b. Less hardware needed, no server need be acquired
The disadvantages include:
a. No central location for storage
2
MArgaret Rouse, "What Is A Network Operating System? - Definition From Whatis.Com",
Searchnetworking, 2020, https://searchnetworking.techtarget.com/definition/network-operating-
system.
16
C. Client/Server Network
Network operating systems can be based on a Client–Server
model (architecture) in which a server enables multiple clients to share
resources. Client-server network operating systems allow networks to
centralize functions and applications in one or more dedicated file servers.
The server is the center of the system, allowing access to resources and
instituting security.
17
Computer Name=YOURNAME-PC1
Workgroup Name=CSSLAB
18
3. Turn network discovery, file and printer sharing… Scroll down and
Turn off password protected sharing.
19
1 3
4
2
5
20
1
3
2
4
2. Click on Network.
ERIC-PC1 ERIC-PC2
4. Just open the other computer and you should be able to see
open the shared folder.
21
Sequence: Router > Hub > Patch Panel > Modular box > PC
22
FOR PC1-SERVER
7
Computer Name=YOURNAME-SERVER
Workgroup Name=CSSLAB
Workgroup Name=CSSLAB
7. Do the same for Laptop
a. FOR LAPTOP
Computer Name=YOURNAME-LAPTOP
Workgroup Name=CSSLAB
23
1. Right click on LAN icon (PC) at the notification bar and select Open
Network and Sharing Center.
1 2
24
5. Select Use the following IP address and enter the IP addresses from the
command prompt (IPCONFIG). Click on Ok twice to save settings.
What’s More
Now that you have learned the two different Networking Operating Systems. You
are now to create a folder sharing option for your computer. Follow the instructions
below, or you may refer to the above discussion on how to share a folder, and
create user’s permission. You also need to complete the table below upon doing
each step in the activity, and answer each process question for each step.
25
Comments: ________________________________________________________________
Modified True or False: After having done the above activity, now you have to test
your knowledge encrypted in doing this activity. This is a modified true or false
assessment. If the statement is TRUE, write T. If the statement is FALSE, answer F
and make it correct by changing the underlined words and writing the correct
words. Use another sheet of paper to answer this. You will get two (20 points for
each correct item.
_______1. In choosing Home and Work Public, there are many settings that need to
be changed in both of the options.
______2. Peer-to-Peer (P2P) file sharing is the distribution of digital media such as
software, videos, music, and images through an informal network in order to
upload and download files.
______3. If you could see all computers in Local Area Connection, you have
successfully configured a workgroup.
_______4.Having the same file stored on many of the peers in a P2P network means
that when someone needs to download it, the file is downloaded from single
locations simultaneously.
______6. The primary goal of peer-to-peer networks is to share resources and help
computers and devices work collaboratively, provide specific services, or execute
specific tasks.
26
______8. Type <Public> and click add. Once you're done with that, click share and
then go to the advanced sharing.
______10. When it comes to file-sharing, the smaller a peer-to-peer network is, the
faster it is.
Direction: All you have to do is to sketch / draw a simple layout of how you are
going to differentiate the network of a Peer to Peer and a Client/Server to establish
a network user access policy. Write your answer on a separate sheet of paper.
Below the table, indicate your simple explanation based on the drawing that you
have done. You will be graded using the rubrics below, and you are to have a
highest possible score of 45 points for this activity.
27
TOTAL ____ / 45
Process Questions:
a. What differences have you made between the two types of your
network?
b. How are they different from each other?
c. Which is more complex? Explain
After having shown the differences in establishing network policies in the above
activity, it’s now time to do another assessment. This will help you understand, and
make a deeper meaning about the competency. Arrange the following steps in Peer
to Peer network in Windows 7 in chronological order (1-10) to which the events
occurred.
28
Wow! You’re doing great, and as you made this part, you’re on the right track! Now
this activity will build your knowledge in building a simple client – server network
layout. Illustrate the basic network configuration in setting up client/server
network, by completing the figure below with label name. You will be graded using
the following rubrics, and can get a highest possible score of 45 pts.
*** Note: The sequence is Router – Hub – Patch Panel – Modular Box – PC
29
TOTAL ____ / 45
This reflection will be a part of your grade as mentioned in the rubrics above. You
are to reflect on the network design you have created using the following guide
questions:
1. What considerations have you thought of in doing this layout?
2. Will your network work? Why and why not?
3. How will you be able to consume materials efficiently?
2. Peer-to-Peer Networks are ideal for ________ because they allow the computers
connected to them to receive files and send files simultaneously.
3. If a single workstation goes down on a peer to peer network, the others are
___________.
4. In Peer-to-Peer Networks, workstations connect to one another _________.
5. ll devices on a P2P Network have an _____ status.
30
7. You need to enter the assigned _________ and then click OK to make a successful
P2P Network.
8. You can open command prompt by clicking on the windows button at the bottom
left and tying ________.
9. For a P2P (peer-to-peer) network to stop working, you have to _______ down all
its peers.
10. File and folders can be configured to allow network users to copy them, but not
________ them in their original location, which is a common safety precaution.
11. Peer-to-Peer Networks are incredibly scalable. Adding new peers is easy as you
don't need to do any central configuration on a _________.
12. Once you click on the device, you will find all the files that were shared from it.
You can tell that the folder is shared over the network, because it has the ______
crossroads looking thing under its name.
13. Files and folders can also be assigned a __________ status that allows either
selected users or all users on the network to change them.
14. Peer-to-Peer Networks are ideal for file sharing, because they allow the
computers connected to them to receive files and send files __________.
15. Peer-to-Peer (P2P) file sharing is the ___________ of digital media such as
software, videos, music, and images through an informal network, in order to
upload and download files.
Well done! You have finished all the activities and assessments now is the
time to review what you have learned, please turn the page to see the next, in store
for you!
1.
2.
31
- A Peer-to-Peer Network sets all __________ computers equal; they all share
the _________ abilities to use resources available on the network.
2. Client/Server Network
functions and applications in one or more dedicated file servers. The server is the
center of the system, allowing access to resources and instituting __________.
In setting up Peer to Peer Network in basic file sharing before you start make sure
to:
1.
2.
3.
What I Can Do
Just Do It!
Direction: Follow and perform procedures in setting up a Client/Server Network.
This activity will be done in computer laboratory. You will be rated based on the
performance indicators below. The highest score that you should get will depend on
the criteria in the rubrics, 80% and above will be the passing grade. You will be
needing the following materials and equipment which your teacher will provide
except for the consumables like UTP and RJ45. Ask your teacher for systematized
schedule for the laboratory activity.
32
For PC2 – Client – Computer Name – Last Name, Workgroup Name – MNHS2020
33
the Procedures Followed the verbal Failed to follow the Was able to follow
and written some of the verbal the procedures
instructions to and written with the help of a
successfully instructions to peer/teacher.
complete successfully
requirements of the complete all
competency. requirements of the
competency.
Demonstration 15 10 5
of Concepts Demonstrated a Demonstrated an Demonstrated an
clear understanding of understanding of
understanding of some of the the networking
all the networking networking concepts needed in
concepts needed in concepts needed in completing the
completing the completing the competency but
competency. competency. with difficulties
Quality of 40 28 16
Service Configured the Configured enough Configured the
network settings network settings network settings
according to that partially with the help of a
standard with a functioned on the peer /teacher.
fully functioning network
network
TOTAL
Assessment
Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.
2. Machine that places the request to access the data is generally called as
_________.
a. Request Machine c. Client Machine
b. Server Machine d. None of the Above
34
9. There are strategies given to improve network security that you can choose from.
Listed below are strategies, can you help your friend select which one is not?
a. Keeping cables organized c. Running anti-virus software
b. Installing a firewall d. Creating automatic backup
10. After the installation verifies the NetBIOS name on the Set Forest Functional
Level page. How will you do this?
a. select Windows Server 2008 R2 in the Forest function level list
b. select Ubuntu in the Forest function level list
c. select Windows Ultimate 7 R2 in the Forest function level list
d. select Linux in the Forest function level list
35
13. Peer to Peer network has its advantages and disadvantages, in which of the
following can you see it as an advantage?
a. Central management is more difficult
b. No central management, can be slow
c. Peer to Peer networks are expensive
d. Peer to Peer networks are difficult to maintain
14. Client/Server security includes a variety of settings in the system, you are to
secure a server which was tasked by your teacher, what are network security used
for?
a. Physical Security c. Change Control Security
b. Measures taken to secure all systems d. All of the above
15. You want to turn network discovery as well as file and printer sharing, how are
you going to do these?
a. Go to password c. Change time and date
b. Select local area connection d. Use administrator as your user
Additional Activities
Now, your task is to perform security check to any facilities that filled with
computers such as computer shops, offices, and faculty room with a number of
interconnected computers. Don’t forget to tell the administrator or the owner that
you will do this activity as a requirement in the course. If this is not possible, you
can go to your teacher’s laboratory and ask permission. Attach two pictures in this
form as you are inspecting the units, you can ask another person to take a photo of
you. You will be rated based on the performance indicators below. The highest
score that you should get will depend on the criteria in the rubrics and should get
at least 80% to pass the activity. Good luck!!!
36
Sharing options
Wireless / Wired?
Folder Permissions
Virus protection
Firewall
Type of networking
used
Reflection:
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________.
Grading Rubrics
37
Answer Key
38
Independent Assessment 3
Independent Assessment 2 Independent Assessment 1
1. File Sharing
a. 4 1. T
2. Unknown Host
3. Network Testing b. 10 2. T
4. Workgroup c. 2 3. F / My Network
5. Request Timed Out d. 8 Place
6. No Route e. 6 4. F / multiple
7. Removable storage 5. T
f. 1
devices 6. T
g. 5 7. T
8. Centralized file h. 9
hosting server 8. F / Everyone
i. 3 9. F/ indirectly
installations on
j. 7 10. F / larger
networks
39
40
41