0% found this document useful (0 votes)
272 views42 pages

Module 1 Css g12 1st Sem Week 1 3

Uploaded by

Jsmjc ID
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
272 views42 pages

Module 1 Css g12 1st Sem Week 1 3

Uploaded by

Jsmjc ID
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

lOMoARcPSD|27880390

Module 1 CSS G12 1st sem week 1-3

IT Applications in Business (Polytechnic University of the Philippines)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Jsmjc ID ([email protected])
lOMoARcPSD|27880390

Computer Systems
Servicing NC-II
Module 1:
Set Up A Peer to Peer
Network

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Computer Systems Servicing NC-II- Grade Twelve


Alternative Delivery Mode
Module 1: Set Up a Peer to Peer Network
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Authors: Clark Lester A. Domingo
Editor: Raymar C. Francia
Reviewers: Miel M. Pineda and Susan J. Maaño
Proofreader: Marites C. Semaning
Illustrator: Name
Layout Artist: Name
Management Team: Name of Regional Director
Name of CLMD Chief
Name of Regional EPS In Charge of LRMS
Name of Regional ADM Coordinator
Name of CID Chief
Name of Division EPS In Charge of LRMS

Printed in the Philippines by ________________________

Department of Education – Region IVA CALABARZON

Office Address: Gate 2, Karangalan Village,


Cainta, Rizal, Philippines
Telefax: 647-7487, 684-4914, 682-5773
E-mail Address: [email protected]

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

CSS
Module 1:

Set Up a Peer to Peer


Network

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Introductory Message
For the facilitator:

Welcome to the Computer Systems Servicing NC-II - Grade 12 Alternative


Delivery Mode (ADM) Module on Set Up a Peer to Peer Network! This module was
collaboratively designed, developed and reviewed by educators both from public
and private institutions to assist you, the teacher or facilitator in helping the
learners meet the standards set by the K to 12 Curriculum while overcoming their
personal, social, and economic constraints in schooling.

This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration
their needs and circumstances.

In addition to the material in the main text, you will also see this box in the body of
the module:

Notes to the Teacher


This contains helpful tips or strategies
that will help you in guiding the learners.

As a facilitator you are expected to orient the learners on how to use this module.
You also need to keep track of the learners' progress while allowing them to
manage their own learning. Furthermore, you are expected to encourage and assist
the learners as they do the tasks included in the module.

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

For the learner:

Welcome to the Computer Systems Servicing NC-II- Grade 12 Alternative


Delivery Mode (ADM) Module on Set Up a Peer to Peer Network! The hand is one
of the most symbolized part of the human body. It is often used to depict skill,
action and purpose. Through our hands we may learn, create and accomplish.
Hence, the hand in this learning resource signifies that you as a learner is capable
and empowered to successfully achieve the relevant competencies and skills at
your own pace and time. Your academic success lies in your own hands!

This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning resource while being an active
learner.

This module has the following parts and corresponding icons:

What I Need to Know This will give you an idea of the skills or
competencies you are expected to learn in
the module.

What I Know This part includes an activity that aims to


check what you already know about the
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.

What’s In This is a brief drill or review to help you link


the current lesson with the previous one.

What’s New In this portion, the new lesson will be


introduced to you in various ways such as a
story, a song, a poem, a problem opener, an
activity or a situation.

What is It This section provides a brief discussion of


the lesson. This aims to help you discover
and understand new concepts and skills.

What’s More This comprises activities for independent


practice to solidify your understanding and
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.

What I Have Learned This includes questions or blank


sentence/paragraph to be filled in to process
what you learned from the lesson.

What I Can Do This section provides an activity which will


help you transfer your new knowledge or

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

skill into real life situations or concerns.

Assessment This is a task which aims to evaluate your


level of mastery in achieving the learning
competency.

Additional Activities In this portion, another activity will be given


to you to enrich your knowledge or skill of
the lesson learned. This also tends retention
of learned concepts.

Answer Key This contains answers to all activities in the


module.

At the end of this module you will also find:

References This is a list of all sources used in


developing this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.

We hope that through this material, you will experience meaningful learning
and gain deep understanding of the relevant competencies. You can do it!

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

What I Need to Know

This module was designed and written with you in mind. It is here to help you
master the nature of Computer Systems Servicing NC-II. The scope of this module
may be used in many different learning situations. The language used recognizes
the diverse vocabulary level of students. The lessons are arranged to follow the
standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.

The module is composed of one lesson with the following contents:

1. Network Operating Systems (NOS) features


2. User access level configurations
3. Network policies and services
4. Set up Peer-to-Peer (P2P) network access

After going through this module, you are expected to:

1. set up user access (TLE_IACSS9-12SUCS-IIIa-e37);


1.1. create user folder in accordance with Network operating system
features;
1.2. configure user access level based on NOS features;
1.3. establish network access policies/end user requirements; and
1.4. perform security check in accordance with established network access
policies/end user requirements.

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

What I Know

Multiple Choice. Select the letter of the best answer and write it on a separate
sheet of paper. If you get 100% in this pre- test you can skip this module and
proceed to module 11.

1. Network in which every computer is capable of playing the role of client, server,
or both at the same time is called ___________.
a. Local Area Network
b. Wide Area Network
c. Dedicated Server Network
d. Peer to Peer Network
2. Which of the following statement regarding computer servers is false?
a. A single computer server is sufficient for all types of network
b. A computer server is a computer system that provides services over a
network
c. Regular desktop computers can be configured to operate as a server, but
many servers consist of specialized hardware.
d. Computer servers can consume a lot of energy and are therefore often
stored in a dedicated, cooled room,
3. What does the acronym P2P stand for in the context of computer network
architecture?
a. Point to Point
b. Peer to Peer
c. Pier to Pier
d. Pear to Pear
4. Which of the following is the collection of computers and related equipment that
are connected so that data can move between them?
a. Computer System
b. Router
c. Network
d. Software
5. In a peer-to-peer network, you can have a server.
a. True
b. False
c. Maybe
d. I don’t know
6. How many server does a typical client/server network has?
a. At least one
b. As many as there are clients
c. One for every three clients
d. 6
7. An operating system oriented to computer networking allow _______ and
_________ among multiple computers in a network, to enable the sharing of data,
users, groups, security, applications, and other networking functions.
a. keyboard and mouse accessibility
b. device manager and hardware
c. remote desktop and printer
d. shared file and printer access

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

8. What does a server store for?


a. Client Data
b. Software and Client Data
c. Back Up Files
d. Software
9. How will you save files on a server in case of power failure?
a. Use a UPS to save files before it runs out of battery
b. Use a backup data server
c. Use a client to save files
d. Use a server backup process
10. If you wanted to replace all of the servers at a customer’s site, which question
(helps size? -Is this your jargon?) helps find correct size?
a. What is the total HD space being used by all of your servers?
b. How many servers do the customer have?
c. Is there any server based applications that is processor intensive?
d. Is everyone a user in your network?
11. In a client/server architecture, the server acts as the central brain of all the
computers connected in a system, how does this work?
a. Hardware devices which provide end users with access to data and
services on the server.
b. All devices are connected to a network.
c. Desktop computers with a wired connection and laptop computers with a
wireless connection.
d. Computers connected to a network used for downloading data from a
server
12. How would you improve network security if your boss wants it to be secured?
a. Installing a firewall
b. Keeping cables organized
c. Running more application programs
d. Constantly doing cleaning maintenance
13. Why is asking “What is the total HD space being used by all of your servers?”
important?
a. To determine how much RAM to put in the servers.
b. To determine the maximum size of the SAN.
c. To determine the minimum size of the SAN.
d. To determine the opposite size of the SAN.
14. You want to make sure that your server and client are connected, what are you
going to consider just to make sure it will work properly?
a. Be sure that the PC is always clean
b. Both PC should have the same workgroup name
c. Run the cmd and then type dcpromo
d. Click the properties of My Computer
15. You are the new IT admin, and you need to find the network configuration, how
will you do this?
a. Type in IPCONFIG and enter
b. Type in netchange
c. Type in CMD and select server
d. Type in newnet and begin uploading files

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Lesson
Set Up a Peer to Peer Network
1
A
network is simply a group
of two or more personal
computers linked together.
Many types of networks exist, but
the most common types of
networks are Local-Area Networks
(LANs), and Wide-Area Networks
(WANs).In a LAN, computers are
connected together within a "local"
area (for example, an office or
home). In a WAN, computers are
further apart and are connected
via telephone/communication
lines, radio waves or other means
of connection.

You will be able to learn network architecture in this module and how to do
a peer to peer network using computer server and a client to share files, computers
and printers.1

1
Margaret Rouse, "What Is An Operating System (OS)?", Whatis.Com, 2020,
https://whatis.techtarget.com/definition/operating-system-OS.

10

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

What’s In

Let us see if you still remember the previous module you have completed. In this
Venn Diagram, kindly compare and contrast the two main types of IP addresses.
Write your answer on another sheet of paper. You will be graded one point each,
make at least two (2) comparisons, contrasts, and similarities with a total of six (6)
items.

I. Venn Diagram

STATIC IP ADDRESS DYNAMIC IP ADDRESS

Comparison: Similarities:
1. 1.
2. 2.

Contrast:
1.
2.

Great job! Proceed to the next exercise on the next page about IP classes.

11

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

II. Classes of IP Address

Direction: Give at least one example if IP address in each classes of IP Address.


Write your answer on the space provided.

CLASSES OF IP ADDRESS EXAMPLE


1. Class A
2. Class B
3. Class C
4. Class D
5. Class E

III. Enumeration

1. What are the simple tests that you can conduct to make sure your network
is functional?
1.
2.
3.
4.

After refreshing your knowledge about the setting up computer networks in setting
network configuration by knowing and understanding the differences and
similarities of IP Address in a network whether you will use Static or Dynamic IP
Address in the previous module. Also, you will consider the importance of the
different classes of IP Address for you to be able to distinguish what IP address you
are going to use. It seems that you really fully understand the Setting Up Computer
Networks, it will be now easier for you to understand the new module about Setting
Up Computer Servers because you already have a knowledge on this part so you
can apply and explore new topics by means of this.

Now, you are ready to a new lesson, let’s turn to the next page to explore the new
world of networking! Let’s go!

12

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

What’s New

Network Operating System / P2P Networking / Folder Sharing

This activity will help you to understand more about the idea on how the network
operating system processes by creating user access and by sharing files and
printer. Answer the different given scenarios to analyze how this works. You will be
graded using the rubrics below. You can have a highest possible score of 30 for this
assessment. Try your best to get 80% in this activity, this will be the passing rate.

1. The most common use case for peer-to-


peer networks is the sharing of files on the
internet. Peer-to-peer networks are ideal for
file sharing because they allow the
computers connected to them to receive files
and send files simultaneously. Imagine this
situation: you open your web browser and
visit a website where you download a file. In
this case, which will act as a server and as a
client? Where can you compare this
situation in real life?

Image from https://www.digitalcitizen.life/what-is-p2p-peer-to-peer

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

2. The image shows multiple peers


sharing data between themselves. When you
download the same file from a peer-to-peer
network, how does the downloaded file will be
in a networked computers and what will
happen to the file?

Image from https://www.digitalcitizen.life/what-is-p2p-peer-to-peer

13

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

3. Accounts, passwords, and permissions are saved in a local database and are
used to determine what someone can do when connecting to your computer. What
do you think will be the main issue of a peer to peer networking in a company or in
a certain working station?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

4. Unfortunately, peer-to-peer networks


are also commonly used for illicit
activities. As an example shown in this
image, you can share with other home
group members such as pictures, videos,
music, documents, and printers &
devices. (What do you think will be the
charge of this or )What kind of illicit
activities will this be?

Image from https://www.digitalcitizen.life/what-is-p2p-peer-to-peer

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

14

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Rubrics for grading


Indicators Excellent Good Fair Score
10 8 6
Ideas and Ideas are clear Ideas are clear You put
Content and well- and well- thought into
expressed, expressed, this, but there
including including is no real
specific specific evidence of
examples to examples to learning. More
demonstrate demonstrate specific
what you what you information is
learned. Well learned. Well needed or you
done! done! need to follow
the directions
more closely.
Sentence Sentences are Sentences are Some
Fluency complete and complete and sentences are
they connect able to be complete and
to one another understood. easy to
easily when understand.
they are read Others require
out loud. Your some work.
idea flows.
Conventions No Use of Mistakes
punctuation punctuation using end
or structural marks and marks or
mistakes. No capitals, as capitals as
spelling well as well as
errors. Your spelling, is spelling
writing shows mostly mistakes
full awareness correct. Few make the
of the rules of errors exist in writing hard
English use. your answer. to read.
TOTAL

15

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

What is It

NETWORK OPERATING SYSTEM FEATURES

A. Network Operating System

The term network operating system is used to refer to two rather different
concepts:
1. A specialized operating
system for a network
device such as a router,
switch or firewall.
2. An operating system
oriented to computer
networking, to allow
shared file and printer
access among multiple
computers in a
network, to enable the sharing of data, users, groups, security,
applications, and other networking functions typically over a local
area network (LAN), or private network. This sense is now largely
historical, as common operating systems generally now have such
features included.2

B. Peer-to-Peer Network
In a Peer-to-Peer network operating system
users are allowed to share resources and files
located on their computers and access shared
resources from others. This system is not
based with having a file server or centralized
management source. A Peer-to-Peer network
sets all connected computers equal; they all
share the same abilities to use resources available
on the network.
The advantages include:
a. Ease of setup
b. Less hardware needed, no server need be acquired
The disadvantages include:
a. No central location for storage

2
MArgaret Rouse, "What Is A Network Operating System? - Definition From Whatis.Com",
Searchnetworking, 2020, https://searchnetworking.techtarget.com/definition/network-operating-
system.

16

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

b. Less security than the client–server model

C. Client/Server Network
Network operating systems can be based on a Client–Server
model (architecture) in which a server enables multiple clients to share
resources. Client-server network operating systems allow networks to
centralize functions and applications in one or more dedicated file servers.
The server is the center of the system, allowing access to resources and
instituting security.

The advantages include:

a. Centralized servers are more stable.


b. Security is provided through the server.
c. New technology and hardware can be easily integrated into the
system.
d. Hardware and the operating system can be specialized, focusing
on performance.
e. Servers are able to be accessed remotely from different locations
and types of systems.
The disadvantages include:

a. Buying and running a server raises costs.


b. Dependence on a central location for operation.
c. Requires regular maintenance and updates.

D. Client/Server Network VS Peer to Peer Network

17

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

E. Set-Up Peer to Peer Network


1. Basic File Sharing
Before you start:
a. Ensure that at least two computers are connected to the
network.
b. Connect router to switch, and switch to PCs (No patch panel
yet).
c. All the computers should have unique IP address either
Static/Dynamic.

Step 1 : Configure computer name and workgroup name


1. Click on Start, Right click Computer and select Properties.

2. Select Change Settings and click on Change

3. Type in the Computer Name and


Workgroup Name.

Computer Name=YOURNAME-PC1
Workgroup Name=CSSLAB

4. Click on Ok and select Yes to restart.

5. Do the same for other PC just change the


name to YOURNAME-PC2, but use the
same Workgroup Name – CSSLAB

18

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Step 2 – Change advance sharing settings

1. Right click on LAN icon (PC) or Wifi icon (Laptop) at the


notification bar and select Open Network and Sharing Center

2. Select Change advanced sharing settings.

3. Turn network discovery, file and printer sharing… Scroll down and
Turn off password protected sharing.

4. Do the same for Home or Work.

5. Finally select Save changes.

***Do the same for the next PC.

Step 3 – Create and share folder


1. Create a folder on the desktop, name it to YOURNAME-My Shared
Files
2. Right click on folder and select Properties

19

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

3. Click on Share, select Everyone, click on Add, check Permission


Level to Read/Write and select Share.

1 3

4
2
5

4. Click on Advance Sharing.

5. Check Share this folder, click on


Permission and check Allow-Full
Control.
6. Click on Apply and Ok. Then Click on
Apply and Ok once again.

20

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

1
3

2
4

Step 4 – Access shared folder through the network

1. Click on Start, right click Computer and select Open.

2. Click on Network.

3. You should see two computers just like below:

ERIC-PC1 ERIC-PC2

4. Just open the other computer and you should be able to see
open the shared folder.

21

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

G. Set-Up Client/Server Network


a. Install windows server standard on PC1-server.
b. Install windows 7 ultimate on PC2-client.
c. Create Network Cable (5pcs straight through cable).
d. Set-up Basic Network Configuration.

Sequence: Router > Hub > Patch Panel > Modular box > PC

e. Install LAN Driver for both PC (PC1-Server & PC2-Client)


f. Set-up computer server

1. Change PC Settings (PC1, PC2 & Laptop)

2. Click on Start, Right click Computer and select Properties.

22

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

3. Scroll down and select Change Settings and click on Change


5
6

4. Type in the Computer Name and


Workgroup Name.

FOR PC1-SERVER
7
Computer Name=YOURNAME-SERVER
Workgroup Name=CSSLAB

5. Click on Ok and select Yes to Restart.


8
6. Do the same for PC2
a. FOR PC2-CLIENT
Computer Name=YOURNAME-CLIENT 9

Workgroup Name=CSSLAB
7. Do the same for Laptop
a. FOR LAPTOP
Computer Name=YOURNAME-LAPTOP
Workgroup Name=CSSLAB

A. Set Static IP Address for PC1-Server

Normally, your computer’s IP Address has a dynamic IP Address. To find out


your computer’s Dynamic IP, simply click the Start button, type cmd and press
Enter. Then, enter the command IPCONFIG and press Enter.

23

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

B. To permanently set it as your Static IP

1. Right click on LAN icon (PC) at the notification bar and select Open
Network and Sharing Center.

1 2

2. Select Change adapter settings.


3. Right click Local Area Connection and select Properties.
4

4. Select Internet Protocol Version 4 and click on Properties

24

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

5. Select Use the following IP address and enter the IP addresses from the
command prompt (IPCONFIG). Click on Ok twice to save settings.

What’s More

Independent Activity 1. Create Folder

Now that you have learned the two different Networking Operating Systems. You
are now to create a folder sharing option for your computer. Follow the instructions
below, or you may refer to the above discussion on how to share a folder, and
create user’s permission. You also need to complete the table below upon doing
each step in the activity, and answer each process question for each step.

1. Create a folder in documents folder, name it with your last name.


Process Question: Where is the folder located?
2. Open the folder and create a new text file leave the filename as is
Process Question: How does the new file look like?
3. Share the folder to the network
Process Question: How were you able to do this?
4. Check all folder permissions to allow every user to access, create or
delete a file.
Process Question: What happened to the icon?

25

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

5. Go to network settings and remove password to enter network.


Process Question: Where did you find the setting for this?

Here is the table that you need to complete.

Time started: ______________Time Finished: ___________ Tries: ___________


STEP Successfully Problems Remarks
done? encountered
YES NO
One
Two
Three
Four
Five

Comments: ________________________________________________________________

Independent Assessment 1. YAH OR NAH

Modified True or False: After having done the above activity, now you have to test
your knowledge encrypted in doing this activity. This is a modified true or false
assessment. If the statement is TRUE, write T. If the statement is FALSE, answer F
and make it correct by changing the underlined words and writing the correct
words. Use another sheet of paper to answer this. You will get two (20 points for
each correct item.

_______1. In choosing Home and Work Public, there are many settings that need to
be changed in both of the options.

______2. Peer-to-Peer (P2P) file sharing is the distribution of digital media such as
software, videos, music, and images through an informal network in order to
upload and download files.

______3. If you could see all computers in Local Area Connection, you have
successfully configured a workgroup.

_______4.Having the same file stored on many of the peers in a P2P network means
that when someone needs to download it, the file is downloaded from single
locations simultaneously.

______5. A reboot is required to save the changes of a name of computer and


workgroup’s name.

______6. The primary goal of peer-to-peer networks is to share resources and help
computers and devices work collaboratively, provide specific services, or execute
specific tasks.

______7. On Desktop ===> Select My Computer ===>Right Click ===> Select


Properties

26

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

______8. Type <Public> and click add. Once you're done with that, click share and
then go to the advanced sharing.

______9. In a peer-to-peer network, devices are connected indirectly to each other


without any additional networking devices between them.

______10. When it comes to file-sharing, the smaller a peer-to-peer network is, the
faster it is.

This assessment helped you in understanding the common terminologies


and processing in a peer to peer network sharing and folder permissions. Now you
are ready for the next level, turn the page and happy networking!

Independent Activity 2. SKETCH IT OUT!

Direction: All you have to do is to sketch / draw a simple layout of how you are
going to differentiate the network of a Peer to Peer and a Client/Server to establish
a network user access policy. Write your answer on a separate sheet of paper.
Below the table, indicate your simple explanation based on the drawing that you
have done. You will be graded using the rubrics below, and you are to have a
highest possible score of 45 points for this activity.

PEER TO PEER NETWORK CLIENT/SERVER NETWORK

Indicator Excellent Good Fair Score


20 15 10
Composition & Shows strong Shows internal Shows obvious
Design internal integrity of the weaknesses in the
integrity of the visual elements. integrity of the
visual elements. A visual element visual elements.
Nothing needs needs to be Many visual
to be added or added or elements need to be
removed - removed. added, moved or
finished piece is removed.
superb.
Design 15 10 5
The design The design The design project
project project is
is exceptionally is attractive in acceptably
attractive in terms attractive
terms of design, though it may be a
of design, layout, bit disorganized and
layout, neatness and does not

27

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

neatness, demonstrate an demonstrate


dominance, understanding a clear
rhythm, size, of understanding
etc. the use of of layout:
design dominance, size,
tools. rhythm, balance,
etc.
Effort 10 8 6
Demonstrates Demonstrates a Demonstrates some
above board good effort in effort in
effort in accomplishing accomplishing the
accomplishing the activity and activity.
the activity time spent to
going the extra get it carried
distance and out.
time spent to
get it done.

TOTAL ____ / 45

Process Questions:
a. What differences have you made between the two types of your
network?
b. How are they different from each other?
c. Which is more complex? Explain

Independent Assessment 2. ORDER IN THE COURT!

After having shown the differences in establishing network policies in the above
activity, it’s now time to do another assessment. This will help you understand, and
make a deeper meaning about the competency. Arrange the following steps in Peer
to Peer network in Windows 7 in chronological order (1-10) to which the events
occurred.

________ a. Create a folder on the desktop, name it to YOURNAME-My Shared Files


________ b. Just open the other computer and you should be able to see “Open the
shared folder”.
________ c. Right click on LAN icon (PC) or Wifi icon (Laptop) at the notification bar
and select Open Network and Sharing Center.
________ d. In Access shared folder through the network, click Start, right click
Computer and select Open
________ e. Click on Advance Sharing
________ f. Type in the Computer Name and Workgroup Name.
________ g. Click on Share, Select Everyone, click on Add,
Check Permission Level to Read/Write and select Share.
________ h. Click on Network
________ i. Turn Network discovery, File and Printer sharing…
Scroll down and turn off password protected sharing.
________ j. Check Share this folder, click on Permission and check Allow-Full
Control.
Click on Apply and Ok. Then click on Apply and Ok once again.

Independent Activity 3. DRAW, DRAW YOUR BOAT

28

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Wow! You’re doing great, and as you made this part, you’re on the right track! Now
this activity will build your knowledge in building a simple client – server network
layout. Illustrate the basic network configuration in setting up client/server
network, by completing the figure below with label name. You will be graded using
the following rubrics, and can get a highest possible score of 45 pts.

*** Note: The sequence is Router – Hub – Patch Panel – Modular Box – PC

Indicator Excellent Good Fair Score


20 15 10
Design Design is Design is mostly Basic design, at
complex, complete, at least two
includes icons, least 3 requirements are
and requirements present.
connections. are present
Goals and
written
description of
project are
present.
Schematics
exist and are
readable.

29

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Design has been


updated to
represent the
output
Project 15 10 5
Management Tasks were Most tasks were Project had some
identified. Each identified. Most tasks identified,
task was tasks were Some tasks were
completed completed as completed. Some
appropriately designed. goals were met.
according to
design.
Personal 10 8 6
Reflection Personal Personal Short paragraph
reflection was reflection was only addressed one
well written well written but or two required
with all required did not components.
components. complete all
Individual work assigned tasks.
was completed.

TOTAL ____ / 45

This reflection will be a part of your grade as mentioned in the rubrics above. You
are to reflect on the network design you have created using the following guide
questions:
1. What considerations have you thought of in doing this layout?
2. Will your network work? Why and why not?
3. How will you be able to consume materials efficiently?

Independent Assessment 3. WORD HUNT


Here is another assessment for you about network use set up, which is related to
the above activity in peer to peer networking. Select your answer inside the leaf and
write it on a different sheet of paper.

File Sharing Central Server Close Equal

Cmd Everyone Green Unaffected

IP Address Directly Alter P2P Network

1. In peer to peerDistribution Simultaneously


networking sharing, Read/Write
to choose who you want to share with, you
need to type __________and click Add. Once you're done with that, click Share and
then go to the Advanced Sharing.

2. Peer-to-Peer Networks are ideal for ________ because they allow the computers
connected to them to receive files and send files simultaneously.
3. If a single workstation goes down on a peer to peer network, the others are
___________.
4. In Peer-to-Peer Networks, workstations connect to one another _________.
5. ll devices on a P2P Network have an _____ status.

30

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

6. Two or more devices are connected together without a server.

7. You need to enter the assigned _________ and then click OK to make a successful
P2P Network.

8. You can open command prompt by clicking on the windows button at the bottom
left and tying ________.

9. For a P2P (peer-to-peer) network to stop working, you have to _______ down all
its peers.

10. File and folders can be configured to allow network users to copy them, but not
________ them in their original location, which is a common safety precaution.
11. Peer-to-Peer Networks are incredibly scalable. Adding new peers is easy as you
don't need to do any central configuration on a _________.
12. Once you click on the device, you will find all the files that were shared from it.
You can tell that the folder is shared over the network, because it has the ______
crossroads looking thing under its name.
13. Files and folders can also be assigned a __________ status that allows either
selected users or all users on the network to change them.

14. Peer-to-Peer Networks are ideal for file sharing, because they allow the
computers connected to them to receive files and send files __________.

15. Peer-to-Peer (P2P) file sharing is the ___________ of digital media such as
software, videos, music, and images through an informal network, in order to
upload and download files.

Well done! You have finished all the activities and assessments now is the
time to review what you have learned, please turn the page to see the next, in store
for you!

What I Have Learned

I have learned things about setting up user access, network operating


system and folder sharing in network services that I can fill out the words as a
generalization of my learning.

Network operating system is used to refer to two rather different concepts:

1.

2.

31

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

There are two types of networking operating system:

1. Peer to Peer Network

- A Peer-to-Peer Network sets all __________ computers equal; they all share
the _________ abilities to use resources available on the network.

2. Client/Server Network

- Client-Server Network operating systems allow networks to __________

functions and applications in one or more dedicated file servers. The server is the
center of the system, allowing access to resources and instituting __________.

In setting up Peer to Peer Network in basic file sharing before you start make sure
to:

1.

2.

3.

Step 1: Configure computer name and _______ name

Step 2 – Change _______sharing settings

Step 3 – Create and share ______

Step 4 – ______shared folder through the network

What I Can Do

Just Do It!
Direction: Follow and perform procedures in setting up a Client/Server Network.
This activity will be done in computer laboratory. You will be rated based on the
performance indicators below. The highest score that you should get will depend on
the criteria in the rubrics, 80% and above will be the passing grade. You will be
needing the following materials and equipment which your teacher will provide
except for the consumables like UTP and RJ45. Ask your teacher for systematized
schedule for the laboratory activity.

Equipment/Facilities Supplies & Materials

32

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Server Connectors, RJ45


Desktop computers (Win7) Adaptors
Laptop Network Cables
Patch Panel Appropriate software
Hub Computer storage media
Router
Modular Box

Here are the steps that you need to accomplish:

A. Change PC Settings (PC1, PC2 & Laptop)

For PC1 – Server – Computer Name – First Name, Workgroup Name –


MNHS2020

For PC2 – Client – Computer Name – Last Name, Workgroup Name – MNHS2020

For Laptop – Computer Name – Middle Name, Workgroup Name – MNHS2020

B. Set Static IP Address for PC1-Server

IP ADDRESS – 192.168.0.100 DNS SERVER – 127.0.0.1

C. Share a folder and share the printer installed in windows server,


create the necessary file permission and remove password .

Indicators/ Excellent Good Fair Score


Competencies
Safety 15 10 5
Procedures Applied/manifested Applied/manifested Applied/manifested
all safety 4 of the 6 less than 4
precautions while indicators of safety indicators of safety
working (cable precautions while precautions while
management, file working working
management,
planned actions,
clean workplace,
and effectively use
tools and
equipment)
Adherence to 30 20 10

33

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

the Procedures Followed the verbal Failed to follow the Was able to follow
and written some of the verbal the procedures
instructions to and written with the help of a
successfully instructions to peer/teacher.
complete successfully
requirements of the complete all
competency. requirements of the
competency.
Demonstration 15 10 5
of Concepts Demonstrated a Demonstrated an Demonstrated an
clear understanding of understanding of
understanding of some of the the networking
all the networking networking concepts needed in
concepts needed in concepts needed in completing the
completing the completing the competency but
competency. competency. with difficulties
Quality of 40 28 16
Service Configured the Configured enough Configured the
network settings network settings network settings
according to that partially with the help of a
standard with a functioned on the peer /teacher.
fully functioning network
network
TOTAL

Assessment

Multiple Choice. Choose the letter of the best answer. Write the chosen letter on a
separate sheet of paper.

1. Which of the following is NOT a network operating system?


a. Windows 7 c. Windows Server
b. Linux d. Novell

2. Machine that places the request to access the data is generally called as
_________.
a. Request Machine c. Client Machine
b. Server Machine d. None of the Above

34

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

3. The applications of the Client and Server Model are _______________.


a. World Wide Web c. Network Printing
b. E-mail d. All of the above

4. File transfer protocol (FTP) is built on ____________ architecture.


a. Peer to Peer c. Both a and b
b. Client Server d. None of the above

5. DHCP Server provides __________ to the client.


a. TCPMAN c. TCIP
b. DHCP d. UDP

6. Why is it important to have a SAME workgroup name in Server PC and Client PC


when doing networking?
a. Easy detection of name in the computer
b. To have a same path of configuration in network
c. Sharing of files and services
d. Lock file

7. All are disadvantages of Client/Server Network EXCEPT:

a. Hardware and the operating system can be specialized, with a focus on


performance.
b. Buying and running a server raises costs.
c. Dependence on a central location for operation.
d. Requires regular maintenance and updates.

8. Your computer’s IP Address has a dynamic IP Address. To find out your


computer’s Dynamic IP simply click the Start button, type cmd and press
Enter. Then, enter the command _________ and press Enter.
a. REGEDIT c. CMD
b. PING d. IPCONFIG

9. There are strategies given to improve network security that you can choose from.
Listed below are strategies, can you help your friend select which one is not?
a. Keeping cables organized c. Running anti-virus software
b. Installing a firewall d. Creating automatic backup

10. After the installation verifies the NetBIOS name on the Set Forest Functional
Level page. How will you do this?
a. select Windows Server 2008 R2 in the Forest function level list
b. select Ubuntu in the Forest function level list
c. select Windows Ultimate 7 R2 in the Forest function level list
d. select Linux in the Forest function level list

11. How would you know if two devices are in network?


a. A process on one device is able to exchange information with a process in
another device
b. A process is running on both devices
c. PIDs of the processes running to different devices are same
d. None of the mentioned

35

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

12. Why is a client rely on a server?


a. The client might get abducted without the server
b. The server prevents the client from breaking down
c. Client retrieves saved data and software from the server
d. The clients do not power on without the server

13. Peer to Peer network has its advantages and disadvantages, in which of the
following can you see it as an advantage?
a. Central management is more difficult
b. No central management, can be slow
c. Peer to Peer networks are expensive
d. Peer to Peer networks are difficult to maintain

14. Client/Server security includes a variety of settings in the system, you are to
secure a server which was tasked by your teacher, what are network security used
for?
a. Physical Security c. Change Control Security
b. Measures taken to secure all systems d. All of the above

15. You want to turn network discovery as well as file and printer sharing, how are
you going to do these?
a. Go to password c. Change time and date
b. Select local area connection d. Use administrator as your user

Additional Activities

Now, your task is to perform security check to any facilities that filled with
computers such as computer shops, offices, and faculty room with a number of
interconnected computers. Don’t forget to tell the administrator or the owner that
you will do this activity as a requirement in the course. If this is not possible, you
can go to your teacher’s laboratory and ask permission. Attach two pictures in this
form as you are inspecting the units, you can ask another person to take a photo of
you. You will be rated based on the performance indicators below. The highest
score that you should get will depend on the criteria in the rubrics and should get
at least 80% to pass the activity. Good luck!!! 

36

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Use the table below as a guide for performing security checks:

What to check Observation(s) Recommendation(s)


Computer Password

Sharing options

IP address class/ used

Wireless / Wired?

Folder Permissions

Virus protection

Firewall

How many computers


are connected?

Type of networking
used

Other comments / suggestions: _________________________________________________

Reflection:
__________________________________________________________________________________
__________________________________________________________________________________
________________________________________.

Grading Rubrics

Indicators/ Excellent Good Fair Score


Competencies
quality of the 10 8 6
experience Substantial time is Sufficient time is Minimal time seen
see in documented seen in in documented
hours of documented hours hours of
observation, of observation, observation,
interview. interview. interview.
critical 20 15 10

37

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

thinking skills Clear Sufficient Minimal


understanding of understanding of understanding of
problems in problems in problems in
networking and networking fail to networking fail to
providing feasible provide feasible provide feasible
recommendations. recommendations. solutions.
content 20 15 10
Abundant detail in Sufficient Minimal
documentation documentation documentation
from observations, that includes many and reflection on
interviews, and details of the experience,
experiences, observations, with few
meaningful interviews, and references.
reflections as well experiences, and
as a “big picture” reflections.
reflection on the
meaning of the
experience.
writing skills 10 8 6
& format Documentation Documentation Documentation
and reflection is and reflection and reflection is
well organized, shows sufficient piecemeal and
easy to organization and difficult to
understand, clear clarity, with less understand
in purpose, and than 7 errors of because of lack of
has less than 3 grammar and overall
errors of minor spelling. organization,
technical form. grammar, and
spelling.
TOTAL

Answer Key

38

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Independent Assessment 3
Independent Assessment 2 Independent Assessment 1
1. File Sharing
a. 4 1. T
2. Unknown Host
3. Network Testing b. 10 2. T
4. Workgroup c. 2 3. F / My Network
5. Request Timed Out d. 8 Place
6. No Route e. 6 4. F / multiple
7. Removable storage 5. T
f. 1
devices 6. T
g. 5 7. T
8. Centralized file h. 9
hosting server 8. F / Everyone
i. 3 9. F/ indirectly
installations on
j. 7 10. F / larger
networks

9. World Wide Web-


oriented hyperlinked
documents

10. Distributed peer-to- Assessment (Posttest)


peer networks
1. D
2. C
What I Know 3. D
1. D 4. C
2. A 5. A
3. B 6. B
4. C 7. A
8. D
5. B
9. A
6. A
10. A
7. D 11. A
8. B 12. C
9. A 13. B
10. A 14. D
11. D 15. A
12. A
13. B
14. B
15. A

References ( not checked)

Department of Education. Computer Systems Servicing NC-II Curriculum Guide.


DepEd Complex Meralco Ave, 2016.
Elsavier B.V. “Peer to Peer Network”, Science Direct, accessed May 28,2020,

39

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

Lujero, R.P., Ramilo, R.V., Gatchalian M.A.C. , Computer Hardware Servicing –


Grade 10 Learner’s Material ( Meralco Avenue, Pasig City 1600), 2010.

Rouse, MArgaret. "What Is A Network Operating System? - Definition From


Whatis.Com". Searchnetworking, 2020.
https://searchnetworking.techtarget.com/definition/network-operating-
system.

Rouse, Margaret. "What Is A Network Protocol? - Definition From Whatis.Com".


Searchnetworking, 2020.
https://searchnetworking.techtarget.com/definition/protocol.

Technical Education and Skills Development Authority-Qualification Standards


Office. Training Regulations for Computer Systems Servicing NC II. Taguig
City, Philippines: TESDA, 2013.

40

Downloaded by Jsmjc ID ([email protected])


lOMoARcPSD|27880390

For inquiries or feedback, please write or call:

Department of Education - Bureau of Learning Resources (DepEd-BLR)

Ground Floor, Bonifacio Bldg., DepEd Complex


Meralco Avenue, Pasig City, Philippines 1600

Telefax: (632) 8634-1072; 8634-1054; 8631-4985

Email Address: [email protected] * [email protected]

41

Downloaded by Jsmjc ID ([email protected])

You might also like