0% found this document useful (0 votes)
4 views

q1 Module1 g12 Css-Ncii - Modular

Uploaded by

Audrey Hidalgo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

q1 Module1 g12 Css-Ncii - Modular

Uploaded by

Audrey Hidalgo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

TVL - ICT

COMPUTER SYSTEMS SERVICING (CSS NCII)


QUARTER 1 – MODULE 1

Setting Up Computer Networks:


Install Network Cables
MELC:SETTING UP COMPUTER NETWORKS: INSTALL NETWORK CABLES
K to 12 BEC CG: TLE_IACSS912ICCS-Ia-j-33

Objective: LO 1.1 Plan cable routes in accordance with network design and actual
installation site.

I. INTRODUCTION

Network design refers to the planning of the implementation of a computer network


infrastructure. Network design is generally performed by network designers, engineers, IT
administrators and other related staff. It is done before the implementation of a network
infrastructure.

Network design involves evaluating, understanding, and scoping the network to be


implemented. The whole network design is usually represented as a network diagram that
serves as the blueprint for implementing the network physically

II. MODULE CONTENTS

Cabling structure
Networking cables are
networking hardware used to
connect one network device to
other network devices or to connect
two or more computers to share
printers, scanners etc. ... Electrical
connections using twisted pair or
coaxial cable are used within a
building.

IP addressing structure
An IP address is a 32-bit number that
uniquely identifies a host (computer or
other device, such as a printer or router)
on a TCP/IP network. IP addresses are
normally expressed in dotted-decimal
format, with four numbers separated by
periods, such as 192.168. 123.132.
A network address is an identifier for a
node or host on a telecommunications
network. Network addresses are
designed to be unique identifiers across the network, although some networks allow for local,
private addresses, or locally administered addresses that may not be unique.
An IP address is a number that is used to identify a device on the network. Each
device on a network must have a unique IP address to communicate with other network
devices. Network devices are those that move data across the network, including hubs,
switches, and routers. On a LAN, each host (device that sends or receives information on the
network) and network device must have an IP address within the same network to be able to
communicate with each other.
A person’s name and fingerprints usually do not change. They provide label or
address for the person’s physical aspect—the body. A person’s mailing address, on the other
hand, relates to where the person lives or picks up mail. This address can change. On a host,
the Media Access Control (MAC) address is assigned to the host Network Interface Card

1
(NIC) and is known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that fingerprints remain
with someone regardless of where he or she goes.

The 3 major classes of an IP network


IP addressing supports three
different commercial address classes;
Class A, Class B, and Class C. In a class A
address, the first octet is the network
portion, so the class A address of, 10.1.
25.1, has a major network address of 10.
Octets 2, 3, and 4 (the next 24 bits) are for
the hosts.

Internet Protocols
A protocol is a set of rules. A
letter sent through the postal
system also uses protocols. Part
of the protocol specifies where
on the envelope the delivery
address needs to be written. If
the delivery address is written in
the wrong place, the letter cannot
be delivered. Internet protocol
works in a similar way. Internet
protocols are sets of rules
governing communication within
and between computers on a
network. Protocol specifications
define the format of the
messages to be exchanged.
Timing is crucial to
network operation. Protocols
require messages to arrive within
a certain amount of time so that
computers do not wait indefinitely
for messages that may have been
lost. Therefore, systems maintain
one or more times during transmission of data. Protocols also initiate alternative actions if the
network does not meet the timing rules. Many protocols consist of a suite of other protocols
that are stacked in layers. These layers depend on the operation of the other layers in the
suite to function properly.
The main functions of protocols are:
✓ Identifying errors
✓ Compressing the data
✓ Deciding how the data should be sent
✓ Addressing the data
✓ Deciding how to announce sent and received data
To understand how networks and the Internet work, you must be familiar with the
commonly used protocols. These protocols are used to browse the web, send and receive e-
mail, and transfer data files. You will encounter other protocols as your experience in IT grows,
but they are not used as often as the common protocols described here:
TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of
protocols has become the dominant standard for internetworking. TCP/IP represents

2
a set of public standards that specify how packets of information are exchanged
between computers over one or more networks.
IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol
suite originally employed by Novell Corporation’s network operating system, NetWare.
It delivers functions similar to those included in TCP/IP. Novell in its current releases
supports the TCP/IP suite. A large installed base of NetWare networks continues to
use IPX/SPX.
NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small
Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each
other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving
a few computers directly connected to each other. It can be used in conjunction with
another routable protocol such as TCP/IP. This gives the network administrator the
advantages of the high performance of NetBEUI within the local network and the ability
to communicate beyond the LAN over TCP/IP.
AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers. It is
composed of a comprehensive set of protocols that span the seven layers of the Open
Systems Interconnection (OSI) reference model. The AppleTalk protocol was
designed to run over Local Talk, which is the Apple LAN physical topology. This
protocol is also designed to run over major LAN types, notably Ethernet and Token
Ring.
HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound,
and video are exchanged on the World Wide Web (WWW). The Internet Engineering
Task Force (IETF) developed the standards for HTTP.
FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP
allows multiple simultaneous connections to remote file systems.
SSH: Secure Shell is used to securely connect to a remote computer.
Telnet: It is an application used to connect to a remote computer that lacks security
features.
POP3: Post Office Protocol is used to download e-mail from a remote mail server.
IMAP: Internet Message Access Protocol is also used to download e-mail from a
remote mail server.
SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
The more you understand about each of these protocols, the more you will
understand how networks and the Internet work.

IpConfig
Ipconfig is a command used to find out the IP address of a certain network you are
connected to.
How to use the ipconfig command?
1. Click on Start Button, then type cmd (command prompt) on the search box.
(A black screen will appear as shown in the figure below).

Figure 1: Command Prompt Window

3
2. Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will
be useful because it shows the IP address, subnet mask and default
gateway of a network you are connected

Figure 2: IP Configuration in CMD Window

Assigning a static IP Address


In a home network with several computers and devices, it is ideal to assign each of
them a specific address. This is for the purpose of avoiding problems when you do
troubleshoot which requires figuring out the IP address of each of them. It is also a means to
prevent address conflicts between the devices. You can also manage them with ease if you
have assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base computer
system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s Wireless network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).

Figure 4.1: TCP / IPV4 Dialog Box

4
5. Click the Properties button. The Internet Protocol (TCP/IP)
(Properties dialog box appears.)

Figure 5.1: Properties Dialog Box

6. Type the IP address for your computer. Enter the appropriate IP


Address in the IP address section.
7. Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type
the router’s address.

Figure 8.1: Shows an example of assigning an IP Address,


Subnet mask and default gateway.

9. Type the address for the preferred DNS server. The address should be obtained
from your Internet Service Protocol. It is used to help your computer find web
pages and other addresses on the internet.
10. Type the address for the alternate DNS server.
11. The alternate Domain Name System (DNS) server’s IP address is something
that your ISP provides.
12. Click OK to confirm the settings.
13. Close all other open dialog boxes and windows.

5
Assigning a Dynamic IP Address
If more than a few computers comprise the LAN, manually configuring IP
addresses for every host on the network can be time-consuming and prone to errors.
In this case, using a Dynamic Host Configuration Protocol (DHCP) server would
automatically assign IP addresses and greatly simplify the addressing process.

Figure 3: Assigning a Dynamic IP Address

These are the IP address information that a DHCP server can assign to hosts:
▪ IP address
▪ Subnet mask
▪ Default gateway
▪ Optional values, such as a Domain Name System (DNS) server address
If your computer cannot communicate with the DHCP server to obtain an IP address,
the Windows operating system automatically assigns a private IP address. If your computer is
assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, it can communicate
with only other computers in the same range. An example of when these private addresses
would be useful is in a classroom lab where you want to prevent access outside to your
network. This operating system feature is called Automatic Private IP Addressing (APIPA).
APIPA continually requests an IP address from a DHCP server for your computer.

Ping
The ping is a Command Prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually used as
a simple way to verify that a computer can communicate over the network with another
computer or network device.
The ping command operates by sending Internet Control Message Protocol (ICMP)
Echo Request messages to the destination computer and waiting for a response. How many
of those responses are returned, and how long it takes for them to return, are the two major
pieces of information that the ping command provides.
Syntax Description
-t Using this option will ping the target until you force it to stop using Ctrl-C.
This ping command option will resolve, if possible, the hostname of an IP
-a
address target.
Use this ping command option to prevent ICMP Echo Requests from
being fragmented by routers between you and the target. The -f option is
-f
most often used to troubleshoot Path Maximum Transmission Unit
(PMTU) issues.

6
-R This option tells the ping command to trace the round trip path.
-S Use this option to specify the source address
This forces the ping command to use IPv4 only but is only necessary if
-4
target is a hostname and not an IP address
This forces the ping command to use IPv6 only but as with the -4
-6
option, is only necessary when pinging a hostname
This is the destination you wish to ping, which is either an IP address or
Target
a hostname
Use the help switch with the ping command to show detailed help about
/?
the command’s several options.
Using the ping Command
Ping is one of your most important tools in troubleshooting Internet problems. It
shows you whether the Domain Name Server is working, whether the computer you are
trying to talk to is reachable, and how long it takes to get there. It does this at a very low
level — only the most basic Internet functions have to be up and running.
1. Click on Start Button, then type cmd
(command prompt) on the search box then
select command prompt icon on the top.

Figure 1.1: The Start Button – Search box

2. A black screen will appear as shown in the


figure below.

Figure 2.1: Command prompt window

3. Type ping followed by the IP address you


desire to verify. The figure below shows the
screen of the ping command and its output.

Figure 3.1: The output of Pinging www.google.com

7
III. ACTIVITY PROPER
A. Choose the best answer from the following questions by encircling the letter of the correct
answer.

1. What do you call the IP Class that is used in medium-sized networks, implemented by
universities?
A. Class A C. Class C
B. Class B D. Class D
2. It refers to the planning of the implementation of a computer network infrastructure.
A. Network Design C. Protocol
B. Cable Design D. none of the above
3. Which of the following protocol is used primarily on small Windows NT networks?
A. FTP C. IMAP
B. TCP/IP D. NetBEUI
4. Which of the following protocol is an application used to connect to a remote computer
that lacks security features?
A. POP3 C. IMAP
B. SMTP D. Telnet
5. What protocol is suite used to network Macintosh computers?
A. AppleTalk C. SSH
B. Telnet D. SMTP
6. What is the proper syntax of the ping command when you ping the target until you
force to stop it using Ctrl-C?
A. -f C. -s
B. -t D. -v
7. It is a protocol used to download e-mail from a remote mail server.
A. TCP/IP C. SMTP
B. IMAP D. SSH
8. What do call the IP Class that is used for large networks, implemented by large
companies and some countries?
A. Class A C. Class C
B. Class B D. Class D
9. What is the proper syntax of the ping command in which it forces the ping command
to use the IPv4 only but is only necessary if target is a hostname and not an IP
address?
A. -t C. -6
B. -s D. none of the above
10. Which of the following ping command is NOT applicable to use?
A. ping 192.168.13.1 C. ping 10.10.10.10
B. ping facebook.com D. ping 50.a.40.40

B. Write TRUE if the statement is correct, else, write FALSE if the statement is incorrect.

_________ 1. Networking cables are networking software used to connect one network
device to other network devices.
_________ 2. A network address is an identifier for a node or a host on
telecommunications network.
_________ 3. Internet protocols are set of rules governing communication within and
between computers on a network
_________ 4. An IP address is a combination of letter and number that is used to identify a
device on the network
_________ 5. Dynamic Host Configuration Protocol is a software utility used to dynamically
assign IP addresses to network devices.

8
SUMMATIVE EVALUATION
COMPUTER SYSTEMS SERVICING (CSS-12)
Quarter 1, Module 2

Name: ____________________________________________ Date: _________


Grade/Section: _____________________________________ Score: ________
Test 1.
Direction: Give the meaning of the acronyms given below. Write your answer in your
answer sheet. (10 pts)

1. DNS ________________________________________________________
2. DHCP ________________________________________________________
3. IMAP ________________________________________________________
4. SSH ________________________________________________________
5. FTP ________________________________________________________
6. HTTP ________________________________________________________
7. TCP ________________________________________________________
8. ICMP ________________________________________________________
9. IP ________________________________________________________
10. MAC ________________________________________________________

Test II.
Direction: Complete the crossword puzzle. Use the guide questions to help you answer
the crossword puzzles. Write your answer in your answer sheet.

Down:
1. An IP ___________ is a 32-bit
number that uniquely identifies a
host on a TCP/IP network.
2. A command used to find out the IP
address of a certain network you are
connected to.
3. A computer ___________ is a
collection of computing devices
connected in various ways either
through physical wires or wireless
connections.
ACROSS:
4. Are set of rules governing
communication within and between
computers on a network.
5. A command use to test the ability of
the source computer to reach a
specified destination computer.

10
Test III.
Direction: Read carefully and answer the question below. Write your answer in your
answer sheet.

1. Compare and Contrast Static IP Address to Dynamic IP Address. (5pts)


_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

2. What is PING? Why it is important in Networking? (5 pts)


_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

EXPLANATORY WRITING RUBRIC


Acceptable(0-1) Good (2-3) Excellent(4-5)
Basic topic Clear topic sentence
Unclear or lacking sentence, doesn’t introducing key
Topic Sentence
topic sentences fully introduce elements of the
response paragraph
Three or more
Minimal/irrelevant One to two relevant
Evidence relevant supporting
evidence supporting details
details
Complete
Explanation No Explanation Minimal Explanation
Explanation

11

You might also like