0% found this document useful (0 votes)
25 views

Coc2 Edited Css Computer System Servicing

Uploaded by

Edison Casumpang
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Coc2 Edited Css Computer System Servicing

Uploaded by

Edison Casumpang
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 95

lOMoARcPSD|29684099

COC2 edited - css computer system servicing

Auditing Theory (Chiang Kai Shek College)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099

COMPETENCY-BASED LEARNING MATERIAL

COMPUTER SYSTEMS SERVICING NCII

MARIA CRISTINA NATIONAL HIGH SCHOOL


Sector : ELECTRONIC SECTOR
INFORMATION COMMUNICATION
COMPUTER SYSTEMS
Qualification : SERVICING NCII

Unit of SET-UP COMPUTER


Competency : NETWORKS

SETTING-UP COMPUTER
Module Title : NETWORKS

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

HOW TO USE THIS COMPETENCY –BASED LEARNING MATERIAL

Welcome!

The unit of competency, Setting up Computer Networks“”,


is one of competencies of Computer Systems Servicing NCII, a course which comprises

the knowledge, skills and attitudes in logging/recording business transactions


in an and Configuring Firewall with Advance Settings.

In this module, you are required to go through a series of learning activities


in order to complete each learning outcome. In each learning outcome are
Information Sheets, Self-Checks, Operation Sheets and Task/Job
Sheets. Follow and perform the activities on your own. If you have
questions, do not hesitate to ask for assistance from you facilitator.

Remember to:

Work through all the information and complete the activities in


each section.

Read information sheets and complete the self-check. Suggested


references are included to supplement the materials provided in
this module.

Most probably, your trainer will also be your supervisor or manager.


He is there to support you and show you the correct way of doing
things.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

You will be given plenty of opportunities to ask questions and


practice on the job. Make sure you practice your new skills during
regular work shifts. This way you will improve you speed, memory
and your confidence.

Use the Self-Checks, Operation Sheets or Task or Job Sheets at the


end of each section to test your own progress. Use the Performance
Criteria Checklist located after the sheet to check your own
performance.

When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.

You need to complete this module before you can perform the next
module, Inspect and test the configured computer networks.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No Unit of
. Competency Module Title Code

Installing and
Install and configure configuring
ELC724331
1.
computer systems computer systems

Set-up Computer Setting up Computer


ELC724332
2.
Networks Networks

Set-up Computer Setting up Computer


ELC724333
3.
Servers Servers

Maintain and Repair Maintaining and


Computer Systems ELC724334
4. and Repairing Computer
Networks Systems and Networks

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

MODULE CONTENT

UNIT OF COMPETENCY SET UP COMPUTER NETWORK

MODULE TITLE Setting up Computer Network

MODULE DESCRIPTOR:

This module covers the outcomes required in

Setting-up computers networks for LANs and

Small-office home-office (SOHO) systems. It

Consists of competencies to install Ethernet

Cables, set network configuration, set router/Wi-

Fi/ wireless access point/repeater configuration

As well as to inspect and test the configured

Computer networks.

NOMINAL DURATION: 40 HOURS

LEARNING OUTCOMES:

At the end of this module you MUST be able to:

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

1. Install Ethernet cables

2. Set network configuration

3.Inspect and test the configured computer networks

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with


network design and actual installation site.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

2. Network materials necessary to complete the work are identified and


obtained in accordance with established procedures and checked
against systems requirements

3. Tools, equipment and testing devices needed to carry out the


installation work are obtained in accordance with established
procedures and checked for correct operation and safety

4. Appropriate personal protective equipment is used and OHS policies


and procedures are followed

5. Copper cable splicing is performed based on Electronic Industries


Alliance/Telecommunications Industry Association (EIA/TIA) standards

6. Ethernet cables and cable raceway are installed in accordance


with established procedures and installation requirements

7. Installation work is performed and is checked to ensure no


unnecessary damage has occurred and complies with requirements

8. OHS standards and 5S principles are followed according to


enterprise requirements

9. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

10. Network connectivity of each terminal is checked in accordance


with network design.

11. Any fault or problem in the network system is diagnosed and remedied
in line with the standard operating procedures.

12. Network interface card (NIC) settings are configured in accordance


with network design.

13. Communication checking between terminals are carried out in


accordance with OS network configuration guides

14. Unplanned events or conditions are responded to in accordance with


established procedures

15. Client Device systems settings are configured in accordance with


manufacturers’ instructions-user preferences and end

16. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network des

17. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network des

18. Wireless settings are configured in accordance manufacturers’ instructions, network

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

design and end-user preferences

19. Security/Firewall/Advance settings are configured in accordance with


manufacturers’ instructions-user preferences and end

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

20. Final inspections are undertaken to ensure that the configuration done on

The computer networks conforms with the man instruction/manual

21. Computer networks are checked to ensure safe operation.

22. Reports are prepared/completed according to company requirements.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

UNIT OF COMPETENCY SET UP COMPUTER NETWORK

MODULE TITLE Setting up Computer Network

MODULE DESCRIPTOR:

This module covers the outcomes required in

Setting-up computers networks for LANs and

Small-office home-office (SOHO) systems. It

Consists of competencies to install Ethernet

Cables, set network configuration, set router/Wi-

Fi/ wireless access point/repeater configuration

As well as to inspect and test the configured

Computer networks.

⮚ LEARNING OUTCOME NO.1

⮚ INSTALLING ETHERNET CABLES

CONTENTS:

1. NETWORK MATERIALS,TOOLS AND EQUIPMENT

2. CREATING A NETWORK CABLE DEVICE

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked for
correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies
and procedures are followed
Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099

5. Copper cable splicing is performed based on Electronic Industries


Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
Excess components and materials are disposed of based on WEEE directives and 3Rs
waste management program

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

INFORMATION SHEET 1.1-1


NETWORK MATERIALS,TOOLS AND EQUIPMENT

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the network materials,tools and equipments

2. Identify the network materials,tools and equipments

Network equipment and cables

An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
● Cables and connectors. These link together the computers, printers, servers
and other equipment on your network.
● A router. This manages network traffic, ensuring devices can communicate with
each other via both wired and wireless connections, and provides internet
connectivity.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

● A wireless access point (optional). This will extend your wireless network if
the router is incapable of offering coverage in certain parts of the building.
● An internet connection. This could be a faster fibre connection or dedicated
leased line.
● A hardware firewall. This creates a secure barrier between your network and
the internet, blocking security threats. Networks sometimes include an on-
site network server which runs central applications, acts as an email server and
provides file storage.

Network hardware building blocks


Some businesses still build their network with cables because they're very reliable
and fast. The most common type is Ethernet cable, which is rated for speed. Cat 6
cables can carry data fast enough for any business purpose.
When building their network most businesses install network sockets at convenient
locations in their premises, so computers and other devices can be plugged into
the network. The sockets cost about £3 each.

The router: a vital network component


The router acts as a signpost, indicating where data on your network should go and
enables devices to communicate with one another.
Routers also connect directly to the internet and share the connection via cable or
Wi-Fi with devices on the network.
A basic router with four wired connections will cost from £70. A more advanced
model, with 24 connections, could cost £150 or more.

Going wireless
Routers also include Wi-Fi capability, enabling people to connect
laptops, smartphones, tablets and other devices to the network wirelessly.
Wi-Fi is ideal for providing network access to staff with mobile devices and in
meeting rooms or common areas. It's also useful for offering internet access to
visitors, with many routers including a separate 'guest' network for the purpose.
Wireless routers start at around £70.

Network equipment speeds


Most network equipment complies with common standards, so you can combine
routers, cables and firewalls from different manufacturers. However, the speed of
your network might be governed by the slowest element. For example, if all your
cables and computers are rated to Cat 6, make sure your router is rated to Cat 6
too.
There are a number of wireless networking standards to take into account,
although the majority of modern devices will include support for the latest
versions. Try to get a wireless router or access point rated to 'Wireless n' or
'802.11n'; it's the fastest type available, but will still work with older wireless
equipment, too.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

What are the Equipment, tools and materials needed in


Connecting two computers using wired connection ?

RJ45
RJ means Registered jack. This is a
standard physical Network Interface
used for connecting telecommunications
equipment commonly, a computer
networking equipment

UTP CABLE
The cheapest cable use in computer in
networking is the UTP
(Unshielded Twisted Pair) cable.
Other use the STP (Shielded Twisted Pair)
cable which is cost much than UTP but more reliable.

CRIMPER
Crimping tool is used to join the
RJ-45 and RJ-11 connectors to
the both ends of either phone
or CAT5 cable.

WIRE STRIPPER

A tool designed to remove the protective


covering (jacket) off of a cable to expose
the inner wires. Because different wires
come in different shapes, there are dozens
of different wire strippers available.
Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099

LAN TESTER

A cable tester is a device that


is used to test the strength and
connectivity of a particular
type of cable or other wired assemblies.

NETWORK INTERFACE CARD

Short for Network Interface Card,


the NIC is also referred to as an
Ethernet card and network adapter.
It is an expansion card that enables
a computer to connect to a network;

ROUTER

A router is a networking device that forwards data


packets between computer networks.
A packet is typically forwarded from one router to
another router through the networks that
constitute an internetwork (e.g. the Internet)
until it reaches its destination node.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

SWITCH HUB

A network switch (also called switching hub,


bridging hub, and by the IEEE MAC bridge)
is networking hardware that connects devices
on a computer network by using packet
switching to receive and forward data
to the destination device.

BAY RACK

A rack, in an IT (information technology)


context, is a supporting framework that
holds hardware modules. In this context,
racks typically contain servers, hard disk
drives and other computing equipment.
Racks make it possible to contain a lot of
equipment in a small physical footprint
without requiring shelving.

PATCH PANEL

a board in a switchboard,
computer,
or other device with a number of
electric sockets that may be
connected
in various combinations.
Modular box
A modular PC is a computer that has
individually-housed components,
which are interconnected but separately
removable for service or upgrading. .
While Piston is upgradable, modules
are not actually individually housed,
Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099

making them more similar to the way


typical desktops are modular, with bare
PCB-based parts.

2 COMPUTER DESKTOP

an electronic device for storing and processing data,


typically in binary form, according to instructions
given to it in a variable program.

RACEWAY or SLOTTED

Slotted PVC cable raceways are very


convenient for cable laying of
on-wall installations in offices,
laboratories, workshops etc.
Raceways are made of very hard,
self-extinguishing PVC,
with temperature resistance to 70 Co.

COMPUTER TABLE

a flat surface, usually supported by


four legs, used for putting things on

UNINTERRUPTIBLE POWER SUPPLY

An uninterruptible power supply (UPS)


is a device that allows a computer to
keep running for at least a short time.
Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099

SELF-CHECK 1.1-1

NETWORK MATERIALS,TOOLS AND EQUIPMENT

Fill the blank : Write the correct answer in the blank

_______________1. Its is a network switch (also called switching hub,


bridging hub, and by the IEEE MAC bridge) is networking hardware that
connects deviceson a computer network by using packet
switching to receive and forward datato the destination device.

_______________2. Its is a board in a switchboard, computer,


or other device with a number of electric sockets that may be
connectedin various combinations.

_______________3. is a networking device that forwards data


packets between computer networks. A packet is typically forwarded
from one router toanother router through the networks thatconstitute
an internetwork (e.g. the Internet) until it reaches its destination node.

_______________4. A cable tester is a device that


is used to test the strength andconnectivity of a particular type of
cable or other wired assemblies.

________________5. is a standard physical Network Interface


used for connecting telecommunications equipment commonly, a
computer networking equipment.

Enumeration: write in your whole sheet of pad paper

1.what are the Equipment, tools and materials needed in Connecting


two computers using wired connection?

2. what is to build a network you will need a range of equipment?

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

TASK SHEET 1.1-1

NETWORK MATERIALS,TOOLS AND EQUIPMENT

Performance Objective: given necessary tools,equipment and materials,


you should be able to networking material,tools, and equipment ff.
Standard operating procedures within 1 hour

Supplies/Materials and Equipment:


Rj45 , crimper ,utp cable, lan tester ,router ,switch hub,bay rack
2 computer systems unit,table, etc.

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


Memories and familiar of the networking material,tools, and equipment
.

Assessment Method:
Demonstration

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

INFORMATION SHEET 1.1-2


CREATING A NETWORK CABLE DEVICE

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the netwok cable device

2. Identify to creating a network cable device

What is a network cable device?

Networking cables are networking hardware used to connect one network


device to other network devices or to connect two or more computers to share
printers, scanners etc.Electrical connections using twisted pair or coaxial cable are
used within a building.

Different Types Of Network Cabling

Four Types Of Network Cabling


Network cable acts like a medium
through which information travels
from one network device to the
other. The type of cable selected for a
network depends on the network’s
size, topology, and procedure. The
various types of network cables act as
the backbone of the network
infrastructure.
Selecting the correct type of network
cabling can effect various business functions because enterprise network admins
employ new technologies. The type of network cable used in any network
infrastructure is one of the most vital aspect of networking in various industries.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Coaxial Cable
It has a single copper conductor in the middle. A
plastic layer provides insulation between the
braided metal shield and center conductor. The
metal shield blocks outer interference from
motors, fluorescent lights, and other computers.
Coaxial cabling is extremely resistant to signal
obstruction though it is complex to install. It can
handle great cable lengths between network
devices than the twisted pair cable. The two
types of coaxial cables are thin coaxial and thick
coaxial.

Shielded Twisted Pair (STP) Cable

It is a special kind of copper telephone wiring used


in business installations. An external shield which
functions as a ground is added to the normal
twisted pair telephone wires. Shielded twisted pair
may be the answer if you want to place the cable
in an area with potential interference and risk to the
electrical current in the UTP. Shielded cables can also
help in expanding the distance between the
cables.

Fiber Optic Cable


Fiber optic cabling consists of a center
glass core surrounded by many layers of
protective materials. It removes the
problem of electrical obstruction by
transmitting light rather than electronic
signals. This makes them perfect for
certain atmospheres which contain huge
amount of electrical interference. It has
become the standard for connecting
networks between buildings because of its
resistance to lighting and moisture.
Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099

Ensure your system establishment is 100% consistent and converse with


Dimtech today.

Unshielded Twisted Pair

It is the most admired type of network


cable in the world. UTP cable is used for
both conventional telephone and
computer networking.
The various wiring schemes for UTP are:
● CAT1 which is used for telephone wire. CAT2 supports speeds up to 4 Mbps and
used frequently for token ring networks.
● CAT3 and CAT4 are both used for Token Ring networks for higher network speeds.
● CAT5 wire is now replaced by the CAT5e designs providing an enhanced crosstalk
specification allowing it to support speeds up to 1 Gbps. It is the most used
network cabling specification in the world.
● CAT6 support speeds of 1 Gbps for length up to 100 meters and 10 Gbps up to 55
meters. Organizations using CAT6 cabling should use a specialized cable analyzer
to request a complete test report, to ensure that the the CAT6 guidelines and
standards have been followed during the installation.
● The CAT7 is a fresh copper cable pattern which can support speeds of 10Gbps and
length up to 100 meters.
For the development of a successful network in an organization, understanding the
different types of cable and how they affect other aspects of a network is vital.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Network Cabling in Perth

RJ45 and CAT 6 are the most widely recognized innovations out there with regards
to organize cabling. As system cabling masters, Dimtech comprehends the
significance of utilising the right cabling.
Our network cabling work consents to all statutes, directions, and models. This is
vital on the grounds that numerous suppliers will utilise shabby, substandard
cabling which does not follow national norms. Ensure your system establishment is
100% consistent and converse with Dimtech today.

STEPS IN CREATING A NETWORK CABLE

STRAIGHT THROUGH

TYPE A TYPE B

CROSS OVER COLOR CODE

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

NOTED:

Memorize the color code combination before doing this activity.


Above, you could see the color

assigned for each pin.

Creating of a STRAIGHT THROUGH network cable

Materials Needed:

2 RJ45
1 meter Network Cable – UTP cable

Tools Needed:

Crimping Tool
Wire Stripper
LAN Tester
Equipment Needed:
2 Working computers with Network Adapter (LAN port)

STEP BY STEP TO STRAIGHT THROUGH CABLE

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Cut the cable insulator to show all the eight wires

Strip off the insulator

Separate all eight wires

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Position all eight wires according to its assigned pins in the RJ45

Position all wires. Make sure that all are in proper pin assignment

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Cut the wires

Make sure that the cut is even and small enough for the RJ45

Put all wires inside the RJ45.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Make sure all wires reach the pins

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

HOW TO TEST YOUR NETWORK CABLE?

A LAN TESTER is a hand held electronic device. It is used to verify electrical


connections in a cable network. Signal strength, particularly in a computer
networks, is crucial for data transmission.

A LAN TESTER can come in one of many shapes &


sizes, and may have multiple functions. A hand held
battery-powered tester checks for insulation losses
and crossed wiring, and is generally easy to use. Most
testers are designed with two parts – the tester itself
and a remote. Testers typically have different testing
ports to test today’s most popular media including
ports for RJ-45, RJ-11, USB and BNC.

WHEN TO USE A LAN TESTER:


Once you are ready to check if a cable is set up properly to achieve a strong
connection between source and destination. That time is, typically, after
installation / set up is complete. It is good practice to test the system once all
components are connected in order to assure the job has been done properly. If the
test shows connectivity troubleshoots, you can address the issue(s) and retest.

POSSIBLE ISSUES:
Connection between server and computer(s) is weak
Outside interference causing data loss or decreased signal strength
Faulty cable

HOW TO USE A LAN TESTER:

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

1. Select the cable to be tested and make sure it is not plugged to any electrical
power and free of any packaging or tangled with other cables, to prevent false
reading.
2. Visually inspect the cable for damage. If cable is broken or torn it should be
replaced.
3. Plug the network cable into the appropriate port on the cable tester, and then
connect the other end of the cable to the remote.
4. Switch the tester on to test your cable. The tester will show results, and if
applicable, will indicate what the potential problem is

PC to PC
Networking
Requirements:
1. Two Computers
with compatible O.S.
and Ethernet adapter.
2. Cross Over Cable

1.Plug the both End of cross over network cable on


two ethernet port of
two computers as
shown above.

2.Assign the following on both


computers: IP Address,
Subnet Mask, Gateway,
Computer Name and
Workgroup Name.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

To Assign IP address on computer, follow these steps:

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

SELF-CHECK 1.1-2

CREATING A NETWORK CABLE DEVICE

ENUMERATION: Write the correct answer in your whole sheet of pad


paper

1.What is the color coding of straight through?

2.What is the color coding of cross over?

3. What is the network cable devices?

4. Four Types Of Network Cable?

5. How to test Network Cable?

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

TASK SHEET 1.1-2

CREATING A NETWORK CABLE DEVICE

Performance Objective: given necessary tools,equipment and materials,


you should be able to creating a network cable device ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, etc.

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


.
⮚ Unroll the required length of network cable and add a little extra wire, just
in case.
⮚ Carefully remove the outer jacket of the cable
⮚ Inspect the newly revealed wires for any cuts or scrapes that expose the
⮚ Untwist the pairs so they will lay flat between your fingers.
⮚ Arrange the wires based on the wiring specifications you are following.
⮚ You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember which wires
are switched.
⮚ Press all the wires flat and parallel between your thumb and forefinger
⮚ Keep the wires flat and in order as you push them into the RJ-45 plug with
the flat surface of the plug on top
⮚ Place the wired plug into the crimping tool
⮚ Repeat all of the above steps with the other end of the cable
⮚ Test the cable to ensure that it will function in the field

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 1.1-2

YE N
CRITERIA S O
Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Unroll the required length of network cable and add a little extra
wire, just in case.
Carefully remove the outer jacket of the cable

Inspect the newly revealed wires for any cuts or scrapes that
expose the
Untwist the pairs so they will lay flat between your fingers.

Arrange the wires based on the wiring specifications you are


following.
You can also use the mnemonic 1-2-3-6/3-6-1-2 to remember
which wires are switched.
Press all the wires flat and parallel between your thumb and
forefinger
Keep the wires flat and in order as you push them into the RJ-45
plug with the flat surface of the plug on top
Place the wired plug into the crimping tool

Repeat all of the above steps with the other end of the cable

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Test the cable to ensure that it will function in the field

⮚ LEARNING OUTCOME NO.2

⮚ SETTING NETWORK CONFIGURATION

CONTENTS:

1. CONFIGURE A WIRELESS ROUTER

2. CONFIGURE NETWORK CONNECTIVITY

ASSESSMENT CRITERIA:

1. Network connectivity of each terminal is checked in accordance with network


design.
2. Any fault or problem in the network system is diagnosed and remedied in line
with the standard operating procedures.
3. Network interface card (NIC) settings are configured in accordance with
network design.
4. Communication checking between terminals are carried out in accordance
with OS network configuration guides
5.Unplanned events or conditions are responded to in accordance with
established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

INFORMATION SHEET 2.1-1


CONFIGURE A WIRELESS ROUTER

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the configure a wireless router

2. Identify the configure a wireless router

Wireless
Configuration (WZC), also
known as Wireless Auto
Configuration, or WLAN
AutoConfig, is a wireless
connection management
utility included with Microsoft
Windows XP and later operating
systems as a service that
dynamically selects a wireless
network to connect to based on a
user's preferences and various
default settings.[1][2] This can be
used instead of, or in the absence
of, a wireless network utility from
the manufacturer of a computer's
wireless networking device. The drivers for the wireless adapter query
the NDIS Object IDs and pass the available network names (SSIDs) to the service.
The service then lists them in the user interface on the Wireless Networks tab in
the connection's Properties or in the Wireless Network Connection dialog box
accessible from the notification area. A checked (debug)[3] build version of the
WZC service can be used by developers to obtain additional diagnostic and
tracing information logged by the service.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

SET-UP A WIRELES ROUTER


As more and more devices are able to connect to wireless networks, setting up a
wireless router has become a crucial step for virtually any home network. Setting
up a wireless network will allow your devices to connect to the internet from
practically anywhere in the house, without the need for messy wires.[1] To get
started setting your

HOW TO SET UP A WIRELESS ROUTER

Purchase a wireless router. Routers come in all shapes and sizes. Compare
features to find the router that is right for you. If you have more area that you
need to cover, or have lots of walls in your home, you’ll need a router that offers
the option of upgrading antenna(s) with high gain types - if not supplied in the
box. If more than one wireless device will be connecting at the same time at
different speeds, a MiMo type router is recommended, otherwise the speed for all
devices will drop the highest supported by all at that time.
● All modern routers should support 802.11n, or Wireless-N). This is the
most stable, offers the fastest speeds and is backwards compatible with
older standards such as 802.11g.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

2.Connect your router to your modem.[2] Routers and wireless


routers enable you to share your broadband internet connection with
multiple devices. To do so, you will need to connect your broadband
modem to the router. For best results, place your router near your modem.
● Connect the router and the modem with an Ethernet cable. Most routers
come packaged with a short Ethernet cable that you can use for this.
● Connect the modem to the WAN / Internet Port on your router. It is usually
offset, and may be a different color from the LAN Ports. WAN stands for
"Wide Area Network" which is what the internet actually is. LAN stands for
"Local Area Network". The router will assign a local or "private" IP address
to any device connected to its LAN Ports or WiFi signal from a pool of
private addresses (listed further below).

3.Connect any devices you want to hard wire with CAT 5 (or better)
Ethernet cables. If you have computers that are close, or a video game console

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

or TV, you can connect them to the router via Ethernet.[3] This will result in a
more stable and faster connection, and doesn’t require any extra configuration.

4.Connect at least one computer via Ethernet. You will need at least one
computer connecting via Ethernet cable in order to adjust your router settings.
You can disconnect this computer afterwards if you want to connect wirelessly.
You can also connect your laptop wirelessly for the first time, the wifi network
name and the default password will be printed on the router's label

PART 2 SET-UP :

1.When you power on the router, it will only create its wi-fi network,
and the device will be connected to the router's wi-fi connection, not
the internet. To connect the router to the internet, with some internet providers

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

(i.e. GTPL in India), it is required to register router's MAC address to the internet
service provider's website.
● MAC of the router can be found printed on router or in the documents etc.

2.Go to the internet service provider's website. Type ip address Log in with
the username and password provided by the internet service provider and go to
MAC address update option. one can see their existing laptop / computers MAC
address there. Add the router's MAC address there and save it. This process
means that the router is authorized to use the internet provide by the broadband
company.

PART 3 SET-UP: Configuring the Router

1.Find the IP address of the router. If this is a new installation or new router,
determine the default IP address that may be printed on a label affixed to the
router or in the documentation.[4] If you can’t find the router’s IP address
anywhere, you can do a web search for the router model to see what the default
address is.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

● IP addresses are formatted as four groups of up to three digits, separated


by periods.
● Commonly found "default" Local IP addresses for routers are
192.168.0.1, 192.168.1.1, 192.168.2.1, 10.0.0.1. Note that all the
addresses in the follow ranges: 192.168.0.0 - 192.168.255.255,
172.16.0.0 - 172.31.255.255 & 10.0.0.0 - 10.255.255.255 have been set
aside for exclusive use in a LAN; and one address in the range of any of
them of them would be assigned to the connected router.

2.Enter your username and password. In order to access the configuration


page, you will need to be on the router's IP address and enter a valid username
and password at the prompt. Most routers have a basic account set up that you
will need to use to log on. This varies from model to model, but should be printed
on the router or in the documentation.
● The most typical username is “admin”.
● The most typical passwords are “admin” and “password”.
● Many routers will only require a username and a blank password, and
some allow you to leave all fields blank.
● If you can’t figure out the correct IP address, your username or password,
search for your router model online to see what the default login is. If it
has been changed, press the Reset button on the back of the router for 10
(to 30+ seconds as dictated in the instructions for the router model) to
restore factory defaults and try again.

3.Open the Wireless Settings. When you log in to your router, you will be
taken to the router’s main menu or status screen. There will be several options to
choose from. The Internet section can usually be left at default settings, unless
you received specific instructions from your internet service provider. The
Wireless section will allow you to set up your wireless network.

4.Enter a name for your wireless network. In the Wireless section, you
should see a field labeled SSID or Name. Enter a unique name for your wireless
network. This is what other devices will see when scanning for networks.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

● Check the box to enable SSID broadcast. This will essentially “turn on” the
wireless network so that it may be readily seen by anyone in range of the
signal. *See the Tips section below for additional information on the SSID
setting.

3. Choose
a security method. Choose from the list of available security options. For
the best security, choose WPA2-PSK as the encryption method. This is the
most difficult security to crack, and will give you the most protection from
hackers and intruders.

4. Save
your

settings. Once you are finished naming and securing your wireless
network, click the Apply or Save button. The changes will be applied to
your router, which may take a few moments. Once the router has finished
resetting, your wireless network will be enabled.

PART 4 SET-UP: Connecting Your Devices

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

1. Connect a computer, tablet, or smartphone to the wireless


network. Scan for the wireless network with the SSID you provided above. On
any device that supports wireless networks, you should see your new network as
long as you are within range of the router. Select it and you will be prompted for
the passphrase.

2. Enter your wireless passphrase. Once you enter the passphrase, your
device will be automatically connected to the wireless network. The network will
be stored in your devices memory and will automatically connect whenever you
are within range.
● For detailed instructions on selecting and joining a wireless network for
your specific computer, tablet, or smartphone, follow this guide.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

3.Connect your other devices. Besides other computers and tablets, you can
connect other devices as well, such as printers, game consoles, TVs and more.
See the following guides for instructions for your specific device.

SELF-CHECK 2.1-1

CONFIGURE A WIRELESS ROUTER

ENUMERATION: Write your answer in your whole sheet of pad paper

1. What is the wireles configuration?

2. HOW TO SET UP A WIRELESS ROUTER ?

TASK SHEET 2.1-1

CONFIGURE A WIRELESS ROUTER

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure a wireless router ff.
Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


computer systems unit,table, wireless router tp-link

Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


. Mentioned in this article
Step 1: Place your wireless router.
Step 2: Configure your wireless router gateway.
Step 3: Connect your gateway to your new router.
Step 4: Change your wireless router's admin password.
Step 5: Update the router's firmware.
Step 6: Establish a password for your Wi-Fi network.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-1

YE N
CRITERIA S O
Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Place your wireless router

Configure your wireless router gateway

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Connect your gateway to your new router

Change your wireless router's admin password

Update the router's firmware

Establish a password for your Wi-Fi network

INFORMATION SHEET 2.1-2


CONFIGURE NETWORK CONNECTIVITY

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the configuration of network connectivity

2. Identify the configuration of network connectivity

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Network Connectivity

Definition - What does Network Connectivity mean?


Network connectivity describes the extensive process of connecting various parts
of a network to one another, for example, through the use of routers, switches
and gateways, and how that process works.

What is a Network?
A network consists of two or more
computers that are linked in order
to share resources (such as
printers and CDs), exchange files,
or allow electronic
communications. The computers
on a network may be linked
through cables, telephone lines,
radio waves, satellites, or infrared
light beams.

Two very common types of networks include:

● Local Area Network (LAN)


● Wide Area Network (WAN)

You may also see references to a Metropolitan Area Networks (MAN), a Wireless
LAN (WLAN), or a Wireless WAN (WWAN).

Local Area Network


A Local Area Network
(LAN) is a network that is
confined to a relatively small
area. It is generally limited to
a geographic area such as a
writing lab, school, or
building.
Computers connected to a
network are broadly
categorized as servers or
workstations. Servers are

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

generally not used by humans directly, but rather run continuously to provide
"services" to the other computers (and their human users) on the network.
Services provided can include printing and faxing, software hosting, file storage
and sharing, messaging, data storage and retrieval, complete access control
(security) for the network's resources, and many others.
Workstations are called such because they typically do have a human user which
interacts with the network through them. Workstations were traditionally
considered a desktop, consisting of a computer, keyboard, display, and mouse,
or a laptop, with with integrated keyboard, display, and touchpad. With the
advent of the tablet computer, and the touch screen devices such as iPad and
iPhone, our definition of workstation is quickly evolving to include those devices,
because of their ability to interact with the network and utilize network services.
Servers tend to be more powerful than workstations, although configurations are
guided by needs. For example, a group of servers might be located in a secure
area, away from humans, and only accessed through the network. In such cases,
it would be common for the servers to operate without a dedicated display or
keyboard. However, the size and speed of the server's processor(s), hard drive,
and main memory might add dramatically to the cost of the system. On the
other hand, a workstation might not need as much storage or working memory,
but might require an expensive display to accommodate the needs of its user.
Every computer on a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or
wirelessly. Wireless access to a wired network is made possible by wireless
access points (WAPs). These WAP devices provide a bridge between computers
and networks. A typical WAP might have the theoretical capacity to connect
hundreds or even thousands of wireless users to a network, although practical
capacity might be far less.
Nearly always servers will be connected by cables to the network, because the
cable connections remain the fastest. Workstations which are stationary
(desktops) are also usually connected by a cable to the network, although the
cost of wireless adapters has dropped to the point that, when installing
workstations in an existing facility with inadequate wiring, it can be easier and
less expensive to use wireless for a desktop.
See the Topology, Cabling, and Hardware sections of this tutorial for more
information on the configuration of a LAN.

Wide Area Network


Wide Area Networks (WANs) connect networks in larger geographic areas,
such as Florida, the United States, or the world. Dedicated transoceanic cabling
or satellite uplinks may be used to connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a
matter of seconds, without paying enormous phone bills. Two users a half-world
apart with workstations equipped with microphones and a webcams might
teleconference in real time. A WAN is complicated. It uses multiplexers, bridges,
and routers to connect local and metropolitan networks to global

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

communications networks like the Internet. To users, however, a WAN will not
appear to be much different than a LAN.
DIAGRAM NETWORK CONNECTIVITY

HOW TO STEP BY STEP NETWORK CONNECTIVITY

FIRST : CONNECT CABLE MODEM TO ROUTER

SECOND: CONNECT NETWORK CABLE TO ROUTER

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

ROUTER

THIRD : CONNECT ROUTER TO SWITCH HUB

ROUTER

SWICTH HUB

FOURTH:
CONNECT
SWITCH HUB TO
PATCH PANEL

PATCH PANEL

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

SWICTH HUB

FIFTH: CONNECT PATCH PANEL TO 2 SYSTEMS UNIT

PATCH PANEL

CLIENT SERVER WR2

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Configuring Network Connections for


Windows 7 & window 2008 r2

After the installation of your network driver, you are ready to configure your
network. To configure the network of your PC, Right-click on your network
connection. You'll see this in your System Tray. If you are connecting your
computers through a switch with no router, you'll need to assign each
computer on the network its own individual IP address. This process is
handled automatically if you're using a router. Think of an IP address as a
mailing address. Each computer on the network needs a unique IP address so
that information sent across the network reaches the correct destination.

CONNECT TO ASSIGN AN IP ADDRESS TO THE CLIENT:

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Click Open Network and Sharing Center.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.

Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Click the Use the following IP address radio button.

Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.


This is the ip address of router take note:

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Click OK. This will save the settings for that computer. This computer is
now configured on your network with a unique IP address.

Network Connecting to Windows 2008 R2

CONNECT TO ASSIGN AN IP ADDRESS TO THE SERVER:

A. Click Start
B. Right-click
Network
and click
Properties

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

C. Click Local Area Connection


D. Click Details. Make note (on a piece of paper) of the address on
the right side of IPv4 Address:

(For our example, we are building a small network and we will just use a small
range of IP addresses. In the real world or for a large network, you would need to
actually know TCP/IP, design a range of IP addresses you plan to use, then assign
those IP addresses, or design a way to assign the IP addresses to the computers)
E. Click Close
F. In the Local Area Connection Status dialog box, click Properties

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

G. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)

Click Properties
H. Click Use the Following IP Address
I. Type the IP address you want the server to use. For our example,
and based on the above dialog box, we type 192.168.001.001
J. Press Tab
K. Type the subnet mask (normally, it should be added automatically
when you press Tab from the previous IP address text box) and
press Tab
L. Type the default gateway address (use the first and the second
octets of the IP address you had provided (such as 192.168) and
use 001.001 for the other two bytes)
M. Provide the Preferred DNS server address (we use 127.0.0.1 for
our example) and the Alternate DNS Server address (we leave ours
empty)

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

N. Click Advanced to check the values that were put in the IP Settings
and DNS property pages
O. Click OK
P. Click OK
Q. Click Close
R. Click Close

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

INFORMATION SHEET 2.1-2


CONFIGURE NETWORK CONNECTIVITY

ESSAY: write the correct definition in your whole sheet of pad paper

1.What is the LAN?

2.What is the WAN?

3. What does Network Connectivity mean?

4. Draw the network connectivity diagram?

5. How to step by step network connectivity?

6. how to configure the connection of window 7 and window 2008 r2 server

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

TASK SHEET 2.1-2

CONFIGURE NETWORK CONNECTIVITY

Performance Objective: given necessary tools,equipment and materials,


you should be able to configure network connectivity ff.
standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


2 computer systems unit,table, wireless router tp-link,switch hub,patch
panel,network cable,modem internet

Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:


1.Click the Ethernet link at the top of the window. You'll see this next to
"Connections." Click Properties.

2.Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't uncheck it,
just highlight it.Click Properties.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

3.Click the Use the following IP address radio button.

4.Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.

5.Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.

6.Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.


o This is the ip address of router take note:

7.Click OK. This will save the settings for that computer. This computer is
now configured on your network with a unique IP address.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-2


YE N
CRITERIA S O
Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Click the Ethernet link at the top of the window. You'll see this
next to
"Connections." Click Properties.

Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't


uncheck it, just highlight it.Click Properties.

Click the Use the following IP address radio button.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Type 1 9 2 . 1 6 8 . 1. 50 into the IP address field.

Type 2 5 5. 2 5 5. 0. 0 into the Subnet mask field.

Type 1 9 2. 1 6 8. 0. 0 into the Default gateway field.


his is the ip address of router take note:

Click OK. This will save the settings for that computer. This
computer is now configured on your network with a unique IP
address.

⮚ LEARNING OUTCOME NO.3

⮚ INSPECT AND TEST THE COMFIGURED COMPUTER NETWORKS

CONTENTS:

1. Testing the configured computer networks

2. Secured configured computer networks

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the configuration done


on the computer networks conforms with the manufacturer’s
instruction/manual

2. Computer networks are checked to ensure safe operation.

3. Reports are prepared/completed according to company requirements.

RESOURCES:

Tools, Materials and Equipment and Facilities

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 3.1-1


TESTING THE CONFIGURED COMPUTER NETWORKS

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine the testing computer networks

2. Identify and test the computer networks

Network testing definition

What is network testing, really? Since I am not very good at explaining


things, I went to the Wikipedia article on software testing and found this:
“Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test. Software
testing can also provide an objective, independent view of the software to
allow the business to appreciate and understand the risks of software
implementation.” –

That sounds pretty good to me. But if we take that passage and replace
“software” with “network”, we get:

“Network testing is an investigation conducted to provide stakeholders


with information about the quality of the product or service under test.
Network testing can also provide an objective, independent view of the

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

network to allow the business to


appreciate and understand the
risks of network implementation.”
Couldn’t be further from the truth.
Network testing is, in the end,
making sure that your network
configuration works as designed.
Network testing is very similar to
software testing, with one
exception: in contrast to software
testing, network testing often has
to happen in a production
environment, after the
configuration change was made. In fact, it is sometimes very difficult, or
almost impossible, to model a complex system like a large enterprise
network, or the Internet itself, in a lab environment. Thus, network testing is
a MUST-HAVE step in the network implementation process.

What is Use Case in Testing?


A Use Case in Testing is a brief
description of a particular use of the
software application by an actor or
user. Use cases are made on the
basis of user actions and the
response of the software application
to those user actions. It is widely
used in developing test cases at
system or acceptance level.
Use Case Testing
Use Case Testing is a software testing technique that helps to identify test
cases that cover entire system on a transaction by transaction basis from
start to end. Test cases are the interactions between users and software
application. Use case testing helps to identify gaps in software application
that might not be found by testing individual software components.
HOW TO TEST COMPUTER NETWORKS?
1.Testing Network Connectivity
A few tools can help you determine whether the network can send data
between computers; these tools test the network protocols as well as low-
level network hardware layers.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Ping
ping is a fundamental tool for testing TCP/IP network connectivity. Because
most networks today use the Internet (TCP/IP) protocol for file and printer
sharing services, as well as for Internet access, most Windows users can use
the ping test to confirm that their network cabling, hardware, and the TCP/IP
protocol are all functioning correctly. Ping sends several data packets to a
specified computer and waits for the other computer to send the packets
back. By default, it sends four packets and prints the results of the four tests.
To see whether the network can carry data between a pair of computers, use
the ipconfig command (described previously) to find the IP address of the
two computers. Then, on one computer, open a command prompt window by
choosing Start, All Programs, Accessories, Command Prompt.
Next, type the following command:

Ping 127.0.0.1

This command tests the networking software of the computer itself by


sending packets to the special internal IP address 127.0.0.1. This test has the
computer send data to itself. It should print the following:

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

If it doesn't, the TCP/IP protocol itself is incorrectly installed or configured;


check the computer's IP address configuration, or, if that seems correct,
remove and reinstall the Internet Protocol from Local Area Connection in
Network Connections. (I have to say, in more than 10 years of working with
PC networks, I've never seen this test fail.)

If your computer can send data to itself, try another computer on your LAN.
Find its IP address by running ipconfig on that computer and then issue
the ping command again on the first computer, as in this example:

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Ping 192.168.0.23

Of course, you should use the other computer's real IP address in place of
192.168.0.23. You should get four replies as before:

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

Reply from 192.168.0.23: bytes=32 time<10ms TTL=32

These replies indicate that you have successfully sent data to the other
machine and received it back.

If, on the other hand, the ping command returns Request timed out, the
packets either didn't make it to the other computer or they were not
returned. In either case, you have a problem with your cabling, network
adapter, or the TCP/IP protocol setup.
You can use ping to determine which computers can send to which other
computers on your LAN or across wide area networks (WANs) or the
Internet. ping works when given a computer's IP address or its network
name.
NOTE

If you enter a computer name, and ping can't determine the computer's IP
address, the problem isn't necessarily a wiring problem—it could be that the
DNS or WINS name lookup systems are not working correctly. Try using an IP
address with ping in this case to help determine what the problem really is.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

How to Use the Ping Command to Test Your Network


Connectivity

The ping command sends packets of data to a specific IP address on a


network, and then lets you know how long it took to transmit that data and
get a response. It’s a handy tool that you can use to quickly test various
points of your network. Here’s how to use it.

How Does Ping Work?

Ping comes from a term used in sonar technology that sends out pulses of
sound, and then listens for the echo to return. On a computer network, a
ping tool is built into most operating systems that works in much the same
way. You issue the ping command along with a specific URL or IP address.
Your computer sends several packets of information out to that device, and
then waits for a response. When it gets the response, the ping tool shows
you how long each packet took to make the round trip—or tells you there
was no reply.

It sounds simple, and it is. But you can use it to good effect. You can test
whether your computer can reach another device—like your router—on your
local network, or whether it can reach a device on the Internet. This can help
you determine if a network problem is somewhere on your local network, or
somewhere beyond. The time it takes packets to return to you can help you
identify a slow connection, or if you’re experiencing packet loss.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

And it pretty much doesn’t matter what operating system you’re using. Pull
up a terminal or Command Prompt window, and you can use ping on macOS,
Linux, or any version of Windows.

How to Use Ping

We’re going to use the Windows Command Prompt in our example here. But
you can also use the ping command in Windows PowerShell, or in the
Terminal app on macOS or any Linux distro. Once you get to using the actual
command, it works the same everywhere.

In Windows, hit Windows+R. In the Run window, type “cmd” into the search
box, and then hit Enter.

At the prompt, type “ping” along with the URL or IP address you want to
ping, and then hit Enter. In the image below, we’re pinging
www.howtogeek.com and getting a normal response.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

That response shows the URL you’re pinging, the IP address associated with
that URL, and the size of the packets being sent on the first line. The next
four lines show the replies from each individual packet, including the time (in
milliseconds) it took for the response and the time-to-live (TTL) of the packet,
which is the amount of time that must pass before the packet is discarded.

At the bottom, you’ll see a summary that shows how many packets were
sent and received, as well as the minimum, maximum, and average response
time.

And in the next image, we’re pinging the router on our local network using its
IP address. We’re also getting a normal response from it.

When the ping tool does not get a response from whatever devices you’re

pinging, it lets you know that, too.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

And that’s how to use ping at its most basic. Of course, like most commands,
there are some advanced switches you can use to make it behave a bit
differently. For example, you can have it keep pinging a destination until you
stop the command, specify the number of times you want it to ping, set how
often it should ping, and more. But unless you’re doing some very specific
types of troubleshooting, you won’t need to worry much about those
advanced switches.

If you’re curious about them, though, just type “ping /?” at the Command
Prompt to see a list.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

So, What Can You Do With Ping?

Now that you know how to use the command, here are some interesting
things you can do with it:

● Ping a URL (like www.howtogeek.com) or IP address to see if you can reach


an internet destination. If you get a successful response, you know that all
the networking devices between you and that destination are working,
including the network adapter in your computer, your router, and
whatever devices exist on the internet between your router and the
destination. And if you’re interested in exploring those routes further, you
can use another networking tool named tracert to do just that.
● Ping a URL to resolve its IP address. If you want know the IP address for a
particular URL, you can ping the URL. The ping tool shows you right at the
top the IP address it’s working with.
● Ping your router to see if you can reach it. If you can’t successfully ping an
internet location, you can then try pinging your router. A successful
response lets you know that your local network is working okay, and that
the problem reaching the internet location is somewhere out of your
control.
● Ping your loopback address (127.0.0.1). If you can’t successfully ping your
router, but your router appears to be turned on and working, you can try
pinging what’s known as a loopback address. That address is always
127.0.0.1, and pinging it successfully lets you know that the network
adapter on your computer (and the networking software in your OS) is
working properly.

Note: You may not get a ping response from other computers on your local
network because the built-in firewalls on those devices prevent them from
responding to ping requests. If you want to be able to ping those devices,
you’ll need to turn off that setting to allow pings through the firewall.

The list above uses a kind of outside-in approach, where you ping the
furthest destination first, and then work your way in to the more local
devices. Some people like to work inside-out by pinging the loopback
address first, then their router (or another local device), and then an internet
address.

And of course, what we’re talking about in this article is mostly about using
ping to perform troubleshooting on a home or small business network. On
larger networks, there’s a lot more complexity to worry about. Plus, if you’re

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

tasked with troubleshooting larger networks, you probably already know how
to use ping and many other networking tools.

TASK SHEET 3.1-1

TESTING THE CONFIGURED COMPUTER NETWORKS

Performance Objective: given necessary tools,equipment and materials,


you should be able to testing the configured computer networks ff.
standard operating procedures within 1 half hour

Supplies/Materials and Equipment:


2 computer systems unit,table, wireless router tp-link,switch hub,patch
panel,network cable,modem internet,Lan tester.

Steps / Procedure:
1.Wear your ppe
2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

A.Testing Your Computer Network


1.Check the physical connections. Check that the Link light — the little red or green
light next to the RJ-45 port — is lit on every computer

2.Verify that you can log on

3.Check the network configuration

4.This command will spit out numerous lines of information

5.Verify that the computers can ping each other

Assessment Method:
Demonstration Downloaded by Edison Casumpang ([email protected])
lOMoARcPSD|29684099

PERFORMANCE CRITERIA CHECKLIST 3.1-1


YE N
CRITERIA S O
Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Check the physical connections. Check that the Link light — the
little red or green light next to the RJ-45 port — is lit on
every computer

1. Verify that you can log on

Check the network configuration

2. This command will spit out numerous lines of information


3.

4. Verify that the computers can ping each other

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

INFORMATION SHEET 3.1-2


SECURED THE CONFIGURED COMPUTER NETWORKS

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Determine and secured the computer networks

2. Identify and secured the computer netwroks

Checking Network Configuration


If hardware isn't at fault, you may have a fundamental network configuration
problem. Often the Event Log or Device Manager gives these problems away,
but if they don't, you can use another batch of tools to check the computer's
network configuration.

ipconfig
If your computer can't communicate with others on your LAN, after you
check the Event Log and Device Manager, use the ipconfig command-line
utility to see whether your computer has a valid IP address. Check other
computers on the LAN, too, to ensure that they do as well.
At the command prompt (which you open by choosing Start, All Programs,
Accessories, Command Prompt), type the following command:

ipconfig /all

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

The results should look something like this:

Windows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : mycompany.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . . : Yes

WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :

Description . . . . . . . . . . . : Intel 21140-Based PCI Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-FF-DD-CA-5F

DHCP Enabled. . . . . . . . . . . : Yes

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe80::ed10:dff9:693c:803d%8(Preferred)

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

IPv4 Address. . . . . . . . . . . : 192.168.15.108(Preferred)

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Lease Obtained. . . . . . . . . . : Friday, October 20, 2006 5:55:11 PM

Lease Expires . . . . . . . . . . : Friday, October 27, 2006 5:55:23 PM

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

DNS Servers . . . . . . . . . . . : 192.168.15.1

NetBIOS over Tcpip. . . . . . . . : Enabled

(Unless you're troubleshooting IPv6 Teredo connections, ignore the parts that
mention Tunnel adapters.)

The most important items to look for are the following:

● Host name—This should be set to the desired name for each computer.
If you can correspond with some computers but not others, be sure that
the ones that don't work are turned on and correctly named. Make sure
that you don't have two computers with the same name, and that none
of the computer names is the same as the workgroup name.
● IP address—This should be set appropriately for your network. If your
LAN uses Internet Connection Sharing, the address will be a number in
the range 192.168.0.1 through 192.168.0.254. If your LAN uses DHCP for
automatic configuration, your network manager can tell you whether the
IP address is correct. Networks with cable/DSL sharing
routers usually use numbers starting with 192.168.x where x is a number
from 0 to 15.

If you see a number in the range 169.254.0.1 through 169.254.255.254,


your computer is set for automatic configuration, but no DHCP server

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

was found, so Windows has chosen an IP address by itself. This is fine if


your LAN uses this automatic configuration system. However, if there
should have been a DHCP server, or if you use Internet Connection
Sharing or a hardware Internet Connection router, this is a problem.
Restart the ICS computer or the router, and then restart your computer
and try again.

● Network mask—This usually looks like 255.255.255.0, but other


settings are possible. At the least, all computers on the same LAN should
have the same network mask.

Each computer on the same LAN should have a similar valid IP address and
the same network mask. If they don't, check your network configuration. The
built-in Windows "Repair" function may also be used to help fix problems
with DHCP-based (automatic) IP address assignment.

NOTE

To learn more about IP addressing, network masks, and configuration, visit


support.microsoft.com and search for article number 164015, which is titled
"Understanding TCP/IP Addressing and Subnetting Basics."

Computer
You can check your computer's identification and workgroup or domain
membership setup from the Computer window. To do so, click Start,
Computer. Look in the Details pane at the bottom of the screen for the
computer name and domain or workgroup name, as shown in

On a Windows Workgroup network, the workgroup name should be the same


on all computers on your workgroup LAN. All of the computer names must be
different from each other.

NOTE

None of your computers can use the workgroup or domain name as its
computer name. For example, if your workgroup is MSHOME, you can't also
name a computer MSHOME. If you find this on one of your computers,
change that computer's name.

On a Windows domain network, you should see your computer's name


displayed as part of a Windows domain name (for example, my computer
named myvpc-hb would be called myvpc-hb.mycompany.com on a domain
network) and the domain name. Your domain name might not include .com.
It might say .local instead, or may use a different ending. In any case, be
sure that your computer is actually a domain member. If the word

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

"workgroup" appears instead, your computer is not a domain member and


will not be able to use domain logins or some domain resources.

Network Connections
You can manually check all installed network protocols and services and their
configuration by viewing Network Connections and viewing the properties for
Local Area Connection. To view this screen, click Start, Network. At the top of
the Network window, click Network and Sharing Center. In the left pane of
that window, click Manage Network Settings. Then, right-click your Local
Area Connection icon (or the appropriate wireless connection icon) and select
Properties.

Confirm that each required protocol is installed and correctly configured. In


general, the settings on each computer on your LAN should match, except
that the IP address differs (usually only in the last of its four dot-separated
numbers). If your LAN uses Automatic IP address configuration, you need to
use the ipconfig command, described earlier, to check the settings.

HOW TO CHECK THE SERVER AND CLIENT NETWORK?

What Is a Client-Server Network?


A client-server network is designed for end-users, called clients, to
access resources such as files, songs, video collections, or some other
service from a central computer called a server. A server's sole purpose is to
do what its name implies - serve its clients! You may have been using this
configuration and not even have known it. Have you ever played Xbox Live
or used the PlayStation Network? Your Xbox One is the client, and when it
logs into the network, it contacts the Xbox Live servers to retrieve gaming
resources like updates, video, and game demos.

How Does It Work?

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Imagine a customer sitting


at a restaurant. He is
waiting for the server to
come by and take his
order. The same rules
apply in a client-server
network; the client, which
can be a laptop, desktop,
a smartphone, or pretty
much any computerized
device, can make a
request from the server.
The client uses
the network as a way to
connect with and speak to
the server. Just as the customer speaks to his server, the client uses the
network to send and receive communications about its order, or request. The
server will take the request and make sure that the request is valid. If
everything checks out okay, then the server will fetch the request and serve
the client.
The server can make a request from the client as well. It may want to check
up on the status of the client, or ask if it has received any security patches,
or if it still needs resources from the server. If not, the server will close the
connection in order to free up network traffic.
Can you imagine a server standing next to a customer who just stares at the
menu without ordering anything? After 15 minutes, it would be a good idea
for the server to leave and check on other customers. In both cases, the
server moves on to other clients as needed.

What Are the Advantages of a


Client-Server Network?
The biggest advantage to using this
setup is central management of the
server. Only one server is used to
host the resources that all the clients
request and use. This is especially
good for server administrators,
because they only have to be in one
place and can solve all the problems
in one place, as well. Having to
manually update several hundred
servers would take much more time.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

One centrally managed server is the key to ease of management, and it is


cost effective, too.
Another advantage of using one physical server is that the configuration is
simple to set up and takes less time to troubleshoot. For instance, if there
were a site with multiple servers providing redundant services, and it was
having issues, it could take an extreme amount of work to effectively
troubleshoot why services are being hindered. In a single server role, all
troubleshooting takes place at one physical server, so it takes much less
time.

How To Secure & check your Computer System And Network


Technology advancements have helped us improve our security and safety –
think security cameras. It has helped us increase our productivity – think
smartphones.

However, at times we technology also presents to us some potential threats


that we need to deal with. For instance, in offices as well as households, we
have wireless networks connecting all major electronic devices. This can
potentially bring about a security concern – as hackers can aim to attack
your system or network and steal your confidential information.

How Severe Is The Threat?

According to a report by Javelin Strategy and Research, the cost of


recovering from such security damage for major organizations can be as high
as $7 Million. And this is just the economic loss – there is always the damage
done to brand image and reputation that is far more disastrous.

How Can You Deal With It?

So, how do you protect devices from the prying eyes of the hackers?

Here are some of the ways in which


you can secure your home or office
system and network.

1. Securing your system with


Passwords
It may seem unnecessary for having
passwords and encrypted system

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

altogether, but this has been among one of the main reasons why hackers
are easily able to attack to the systems because of weak password and
accessibility to access points.

All the wireless networks and secretive information should be well encrypted
with unique username and passwords making it difficult for the hackers to
break into the system. Using a WPA2 encryption is more secure way than any
other encryption protocol as it is not easily hacked into.

2. Safe and Secure Wireless Router


The wireless router allows multiple users to use the internet at the same
time, but if that is kept wide open, it can be dangerous. Any Individual with
malicious intention can use your internet for free, and can even steal your
valuable information or may use for some cyber crime. So it is always
advised to change the SSID provided by the service network and use firewall.

3. Active checking of the system


This majorly applies for the office users, as there may be some of the
malicious insiders, employees from the company who may hack into the
systems. It is comparatively easy for the employees to steal and hack the
accounts, as they are well aware of the system and networks. Such hackers
are dangerous for the organization. So a thorough screening of the
employees is advised. Also, the important files should be admin encrypted so
nobody can use it whenever required.

4. Encrypt the whole disk


This is especially true for Laptop users, as such devices can be stolen easily.
One can even lose it, and there may be some of the important files on the
laptop which can be accessible by the potential hacker or stealer.

So it is a better idea to protect your laptops or systems with whole disk


encryption. They are not very costly but gives protection to your valuable
information.

5. Updated security software


Always make sure to update the operating system, web browser and most
importantly security software. They prove good against any of the viruses or
malware. Make sure to scan any of the USBs and other external devices with
your software security scan to guard against any of the threats. It is
important to keep the software updated.

6. Keeping your in-house security out of reach

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Most offices as well as households have been using CCTV cameras to keep
their home or office secure and are attached to the home or office network to
view them anytime and anywhere. But this can be dangerous at times.

If the CCTV hooked up with the system is not encrypted strongly than
hackers can easily view your updates of home or office and steal prime
information. Hackers could get all the insights of your office and household
and can make a right move at the right time.So it is very important to keep it
secure with username and password which may not be guessed. You can
have an alarm and security features if any unknown device hacks into it to
keep your system safe.

7. Beware of Spoofing and Phishing


Hackers know how and when to break into the system. They may attract the
home mobile users or office desktop users by asking them to download or
install any software to speed up the performance of the system. Upon
downloading, all lucrative information can be stolen by them.

Do not register on any untrusted websites asking for personal details or


installing any such software. Also avoid opening unknown email attachments
as they may have a virus, worms or Trojans. These emails can be sent from
trusted sources – so think before clicking.

⮚ Secure your Computer Network


1. Enable encryption on your access point. Using 128-bit encryption or
higher makes your Wireless
Network more secure. WEP
and WPA are entirely
different encryption
schemes. WEP has been
proven insecure and can be
cracked in a few minutes
using free utilities that can
be downloaded from the
Internet. Using at least WPA
is recommended, because it
is much more secure, but is
sometimes a bit harder to
set up correctly than WEP is, and isn't completely secure.[1] [2] Some
older access points or wireless cards do not support WPA2. If you have
one of these, it is recommended that you purchase a newer one that
supports WPA2, depending on how important you consider your security.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

2. Set the router access password. Anybody who gains access to the
router configuration settings can disable the security you have set up. If
you forget the password, most routers have a hardware reset that will
restore all of the settings to factory defaults. The best option is to use a
random sequence of the maximum length of characters - you only have to
type that once, so it is not a big thing. When you connect to the router via
LAN cable while setting it up, you can copy and paste the password onto
the router and onto your local setting, so you never need to type it again.
Use a secure password. Don't use easily guessed passwords for your
WPA2 or router access passwords, such as "ABC123", "Password", or a
string of numbers in order. Use something hard to guess that contains
both upper and lowercase letters as well as numbers. Special characters
such as !@#$% are not supported by some routers. The longer the key,
the better, although the WPA2 key has a minimum and maximum length.
Try to make a little mental effort -- good passwords might be hard to
remember, but they are harder to crack.
If you use a weak key then even WPA and WPA2 can be easily cracked
within a day using a combination of special precomputed tables and
dictionary attacks. The best way to generate a secure key is to use an
offline random number generator or write the entire alphabet in
uppercase and lowercase and numbers 0-9 on separate pieces of paper,
mix the paper up and randomly pick up pieces and return them, mixing
them up again each time; each character you pull out becomes a
character in your key. You can also try throwing a pair of dice and using
the resulting numbers as your password.

3. Disable MAC Address filtering on your Access Point or router. A


MAC (not to be confused with the computer model 'Mac') address is a
code unique to every wireless networking card in existence. MAC Address
filtering will register the hardware MAC Address of your networked
devices, and only allow devices with known MAC Addresses to connect to
your network. However, hackers can clone MAC addresses and still enter
your network, so MAC address filtering should not be used in place of
proper WPA2 encryption.
4. Don't disable the 'SSID Broadcast'. Do not disable the 'SSID
Broadcast' feature of your Access Point or router. This seems counter-
intuitive, but it is actually a bad idea.[3] Although this would make your
network invisible to your neighbors, any determined hacker can still sniff
out your SSID; and you are implicitly forcing your computer to shout out
your SSID anywhere you are, while it is trying to connect to it. Anyone
could then impersonate your router with that SSID, and get your
credentials that way.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

5. Disable remote login. The first router worm brute forces its way into
the router in this manner. Most default usernames are set to Admin. It
isn't hard for a virus/worm to crack the password if the username is
known. The good thing is that routers normally have this disabled by
default. Be sure to confirm that it is disabled when you first set up your
router and periodically thereafter. If you need to update your router
setting remotely, only set up access for the time you are going to be
connected.
6. Disable wireless administrating. Finally, change the setting that
allows administrating the router through a wireless connection to 'off'
(meaning that you need to connect with a LAN cable for administration).
This disables any wireless hacking into the router.
7. Update your software regularly. Regular software updates are one of
the most effective steps you can take to improve the overall
cybersecurity posture of your home networks and systems. Besides
adding new features and functionality, software updates often include
critical patches and security fixes for newly discovered threats and
vulnerabilities. Most modern software applications will automatically
check for newly released updates. If automated updates are not available,
consider purchasing a software program that identifies and centrally
manages all installed software updates. (See Understanding Patches and
Software Updates.)
8. Remove unnecessary services and software. Disable all unnecessary
services to reduce the attack surface of your network and devices,
including your router. Unused or unwanted services and software can
create security holes on a device’s system, which could lead to an
increased attack surface of your network environment. This is especially
true with new computer systems on which vendors will often pre-install a
large number of trial software and applications—referred to as
“bloatware”—that users may not find useful. The Cybersecurity and
Infrastructure Security Agency (CISA) recommends that you research and
remove any software or services that are not being used regularly.
9. Adjust factory-default configurations on software and
hardware. Many software and hardware products come “out of the box”
with overly permissive factory-default configurations intended to make
them user-friendly and reduce the troubleshooting time for customer
service. Unfortunately, these default configurations are not geared
towards security. Leaving them enabled after the installation may create
more avenues for an attacker to exploit. Users should take steps to
harden the default configuration parameters to reduce vulnerabilities and
protect against intrusions.
10. Change default log-in passwords and usernames. Most network
devices are pre-configured with default administrator passwords to

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

simplify setup. These default credentials are not secure—they may be


readily available on the internet, or may even be physically labeled on the
device itself. Leaving these unchanged creates opportunities for malicious
cyber actors to gain unauthorized access to information, install malicious
software, and cause other problems.
11. Use strong and unique passwords. Choose strong passwords to
help secure your devices. Additionally, do not use the same password
with multiple accounts. This way, if one of your accounts is compromised,
the attacker will not be able to breach any other of your accounts. (See
Choosing and Protecting Passwords for more information.)
12. Run up-to-date antivirus software. A reputable antivirus software
application is an important protective measure against known malicious
threats. It can automatically detect, quarantine, and remove various
types of malware, such as viruses, worms, and ransomware. Many
antivirus solutions are extremely easy to install and intuitive to use. CISA
recommends that all computers and mobile devices on your home
network run antivirus software. Additionally, be sure to enable automatic
virus definition updates to ensure maximum protection against the latest
threats. Note: because detection relies on signatures—known patterns
that can identify code as malware—even the best antivirus will not
provide adequate protections against new and advanced threats, such as
zero-day exploits and polymorphic viruses.
13. Install a network firewall. Install a firewall at the boundary of your
home network to defend against external threats. A firewall can block
malicious traffic from entering your home network and alert you to
potentially dangerous activity. When properly configured, it can also serve
as a barrier for internal threats, preventing unwanted or malicious
software from reaching out to the internet. Most wireless routers come
with a configurable, built-in network firewall that includes additional
features—such as access controls, web-filtering, and denial-of-service
(DoS) defense—that you can tailor to fit your networking environment.
Keep in mind that some firewall features, including the firewall itself, may
be turned off by default. Ensuring that your firewall is on and all the
settings are properly configured will strengthen the network security of
your network. Note: your internet service provider (ISP) may be able to
help you determine whether your firewall has the most appropriate
settings for your particular equipment and environment.
14. Install firewalls on network devices. In addition to a network
firewall, consider installing a firewall on all computers connected to your
network. Often referred to as host- or software-based, these firewalls
inspect and filter a computer’s inbound and outbound network traffic
based on a predetermined policy or set of rules. Most modern Windows
and Linux operating systems come with a built-in, customizable, and

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

feature-rich firewall. Additionally, most vendors bundle their antivirus


software with additional security features such as parental controls, email
protection, and malicious websites blocking.
15. Regularly back up your data. Make and store—using either external
media or a cloud-based service—regular backup copies of all valuable
information residing on your device. Consider using a third-party backup
application, which can simplify and automate the process. Be sure to
encrypt your backup to protect the confidentiality and integrity of your
information. Data backups are crucial to minimize the impact if that data
is lost, corrupted, infected, or stolen.
16. Increase wireless security. Follow the steps below to increase the
security of your wireless router. Note: consult your router’s instruction
manual or contact your ISP for specific instructions on how to change a
particular setting on your device.
17. Use the strongest encryption protocol available. CISA
recommends using the Wi-Fi Protected Access 3 (WPA3) Personal
Advanced Encryption Standard (AES) and Temporary Key Integrity
Protocol (TKIP), which is currently the most secure router configuration
available for home use. It incorporates AES and is capable of using
cryptographic keys of 128, 192, and 256 bits. This standard has been
approved by the National Institute of Standards and Technology (NIST).
18. Change the default service set identifier (SSID). Sometimes
referred to as the “network name,” an SSID is a unique name that
identifies a particular wireless local area network (WLAN). All wireless
devices on a Wireless Local Area Network (WLAN) must use the same
SSID to communicate with each other. Because the device’s default SSID
typically identifies the manufacturer or the actual device, an attacker can
use this to identify the device and exploit any of its known vulnerabilities.
Make your SSID unique and not tied to your identity or location, which
would make it easier for the attacker to identify your home network.
19. Disable Wi-Fi Protected Setup (WPS). WPS provides simplified
mechanisms for a wireless device to join a Wi-Fi network without the need
to enter the wireless network password. However, a design flaw in the
WPS specification for PIN authentication significantly reduces the time
required for a cyberattacker to brute force an entire PIN, because it
informs them when the first half of the eight-digit PIN is correct. Many
routers lack a proper lockout policy after a certain number of failed
attempts to guess the PIN, making a brute-force attack much more likely
to occur. See Brute Force Attacks Conducted by Cyber Actors.
20. Reduce wireless signal strength. Your Wi-Fi signal frequently
propagates beyond the perimeters of your home. This extended emission
allows eavesdropping by intruders outside your network perimeter.
Therefore, carefully consider antenna placement, antenna type, and

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

transmission power levels. By experimenting with your router placement


and signal strength levels, you can decrease the transmitting coverage of
your Wi-Fi network, thus reducing this risk of compromise. Note: while this
reduces your risk, a motivated attacker may still be able to intercept a
signal that has limited coverage.
21. Turn the network off when not in use. While it may be impractical
to turn the Wi-Fi signal off and on frequently, consider disabling it during
travel or extended periods when you will not need to be online.
Additionally, many routers offer the option to configure a wireless
schedule that will automatically disable the Wi-Fi at specified times. When
your Wi-Fi is disabled, you prevent outside attackers from being able to
exploit your home network.
22. Disable Universal Plug and Plan (UPnP) when not needed. UPnP
is a handy feature that allows networked devices to seamlessly discover
and establish communication with each other on the network. However,
though the UPnP feature eases initial network configuration, it is also a
security risk. Recent large-scale network attacks prove that malware
within your network can use UPnP to bypass your router’s firewall, allow
attackers to take control of your devices remotely, and spread malware to
other devices. You should therefore disable UPnP unless you have a
specific need for it.
23. Upgrade firmware. Check your router manufacturer’s website to
ensure you are running the latest firmware version. Firmware updates
enhance product performance, fix flaws, and address security
vulnerabilities. Note: some routers have the option to turn on automatic
updates.
24. Disable remote management. Most routers offer the option to view
and modify their settings over the internet. Turn this feature off to guard
against unauthorized individuals accessing and changing your router’s
configuration.
25. Monitor for unknown device connections. Use your router
manufacturer’s website to monitor for unauthorized devices joining or
attempting to join your network. Also see the manufacturer’s website for
tips on how to prevent unauthorized devices from connecting to your
network.
26. Mitigate Email Threats. Phishing emails continue to be one of the
most common initial attack vectors employed by for malware delivery and
credential harvesting. Attacking the human element—considered the
weakest component in every network—continues to be extremely
effective. To infect a system, the attacker simply has to persuade a user
to click on a link or open an attachment. The good news is that there are
many indicators that you can use to quickly identify a phishing email. The
best defense against these attacks is to become an educated and

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

cautious user and familiarize yourself with the most common elements of
a phishing attack.
27. Use a security-focused DNS service provider. By default, your
router will be configured to forward Domain Name System (DNS) requests
to your ISP, which means you have to trust your ISP to maintain a secure
DNS lookup service. Since DNS acts as the internet’s phone book, locating
the IP addresses of the websites you want to visit, hackers commonly
target it to direct users to malicious websites in a way that’s typically
hard to spot. Companies like Google, Cloudflare, OpenDNS (Cisco) and
others offer publicly available DNS resolvers that are security-focused and
even have encrypted versions.

SELF-CHECK 3.1-2
SECURED THE CONFIGURED COMPUTER NETWORKS

Fill the blank: write the correct answer

--------------------------1. Its is a wireless router allows multiple users to use the


internet at the same time, but if that is kept wide open, it can be dangerous.

____________________2. Its is a reputable antivirus software application is an


important protective measure against known malicious threats. It can
automatically detect, quarantine, and remove various types of malware, such
as viruses, worms, and ransomware. Many antivirus solutions are extremely
easy to install and intuitive to use.

____________________3. Its is a Anybody who gains access to the router


configuration settings can disable the security you have set up. If you forget

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

the password, most routers have a hardware reset that will restore all of the
settings to factory defaults.

_____________________4.its is a while it may be impractical to turn the Wi-Fi


signal off and on frequently, consider disabling it during travel or extended
periods when you will not need to be online.

____________________5. Its is a regular software updates are one of the most


effective steps you can take to improve the overall cybersecurity posture of
your home networks and systems.

Enumeration: write the answer in your whole sheet pad paper

1. Gives the secure your computer network?

2. Gives the Secure & check your Computer System And


Network?

TASK SHEET 3.1-2

SECURED THE CONFIGURED COMPUTER NETWORKS

Performance Objective: given necessary tools,equipment and materials,


you should be able to secured the configured computer networks ff.
Standard operating procedures within 2 half hour

Supplies/Materials and Equipment:


Rj45 , crimper ,utp cable,wire stripper, lan tester ,router ,switch hub,bay rack
Patch panel ,2 computer systems unit,table, etc.

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation
3.Gather the necessary materrials and equipment

4. Follow the steps / procedures below:


1. Put In And Monitor Firewall Performance. A firewall is a piece or set of
software or hardware designed to block unauthorized access
to computers and networks
2. Update Passwords At Least Every Quarter
3. Maintain Your Anti-Virus Software
4. Create A Virtual Private Network (VPN)
5. Training Your Employees
6. Ask for Help

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-2


YE N
CRITERIA S O
Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Downloaded by Edison Casumpang ([email protected])


lOMoARcPSD|29684099

Put In And Monitor Firewall Performance. A firewall is a piece or


set of software or hardware designed to block unauthorized
access to computers and networks
Update Passwords At Least Every Quarter

Maintain Your Anti-Virus Software

Create A Virtual Private Network (VPN)

Training Your Employees

Ask for Help

Downloaded by Edison Casumpang ([email protected])

You might also like