0% found this document useful (0 votes)
5 views142 pages

CATHHH

This document is a competency-based learning material for the Computer System Servicing NC II course, specifically focusing on setting up computer networks. It outlines the necessary knowledge, skills, and attitudes required, along with a series of learning activities and assessments for students. The module includes core competencies, learning outcomes, and instructional materials to guide learners through the process of installing and configuring computer networks.

Uploaded by

Cathyrine Lazona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views142 pages

CATHHH

This document is a competency-based learning material for the Computer System Servicing NC II course, specifically focusing on setting up computer networks. It outlines the necessary knowledge, skills, and attitudes required, along with a series of learning activities and assessments for students. The module includes core competencies, learning outcomes, and instructional materials to guide learners through the process of installing and configuring computer networks.

Uploaded by

Cathyrine Lazona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 142

WEST PRIME HORIZON INSTITUTE, INC.

PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

COMPETENCY-BASED LEARNING MATERIAL

Sector : ELECTRONICS

Qualification Title : COMPUTER HARDWARE SERVICING NC II

Unit of Competency : SET-UP COMPUTER NETWORK

Module Title : SETTING-UP COMPUTER NETWORK

WEST PRIME HORIZON INSTITUTE, INC

V. SagunCor. M. Roxas, San Francisco District,

Pagadian city

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 1
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL

Welcome to the Module “SET-UP COMPUTER NETWORKS”. This module

contains training materials and activities for you to complete.

The unit of competency “SETTING-UP COMPUTER NETWORKS” contains

knowledge, skills and attitudes required for a Computer System Servicing NC II course.

You are required to go through a series of learning activities in order to complete

each of the learning outcomes of the module. In each learning outcome there are

Information Sheets, Task Sheets, and Job Sheets. Follow these activities on your own and

answer the Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your Trainer for assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this module

because you have:

● Been working for some time

● Already have already completed training in this area.

If you can demonstrate to your Trainer that you are competent in a particular skill

or skills, talk to him/her about having them formally recognized so you don’t have to do

the same training again. If you have a qualification or Certificate of Competency from

previous training, show it to your teacher. If the skills you acquired are still current and

relevant to this module, they may become part of the evidence you can present for RPL.

If you are not sure about the currency of your skills, discuss it with your Trainer.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 2
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

After completing this module ask your Trainer to assess your competency. Result

of your assessment will be recorded in your competency profile. All the learning activities

are designed for you to complete at your own pace. Inside this module you will find the

activities for you to complete followed by relevant information sheets for each learning

outcome. Each learning outcome may have more than one learning activity.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 3
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

COMPETENCY-BASED LEARNING MATERIAL

List of Core Competencies

No. Unit of Competency Module Title Code

1 Install and configure Installing and configuring ELC724331

computer systems computer systems

2 Set-Up Computer Setting-up Computer Networks ELC724332

Networks

3 Set-up Computer Servers Setting up Computer Servers ELC724333

4 Maintain and Repair Maintaining and Repairing ELC724334

Computer Systems and Computer Networks

Networks

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 4
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

TABLE OF CONTENTS

HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL…………………… 2

LIST OF COMPETENCIES…………………………………………….………………………………..4

TABLE OF CONTENTS…………………………………………………………………………………. 5

MODULE CONTENT……………………………………………………………………………

LEARNING EXPERIENCES…………………………………………………………………………………

INFORMATION SHEET………………………………………………………………………………………..

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 5
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

MODULE CONTENT

Program/Course : COMPUTER SYSTEM SERVICING NC II

Unit of Competency : SET-UP COMPUTER NETWORKS

Module : SETTING-UP COMPUTER NETWORKS

INTRODUCTION:

This module contains information and suggested learning activities on Computer

System Servicing NCII. It includes activities and materials on Setting up Computer

Network.

Completion of this module will help you better understand the succeeding module

on the SETTING-UP COMPUTER SERVERS.

This module consists of 4 learning outcomes. Each learning outcome contains

learning activities supported by each instruction sheet. Before you perform the

instructions, read the information sheets and answer the self-check and activities

provided to ascertain to yourself and your trainer that you have acquired the knowledge

necessary to perform the skill portion of the particular learning outcome.

Upon completion of this module, report to your trainer for assessment to check

your achievement of knowledge and skills requirement of this module. If you pass the

assessment, you will be given a certificate of completion.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 6
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

SUMMARY OF LEARNING OUTCOMES:

Upon completion of the module you should be able to:

LO1. INSTALL NETWORK CABLES

LO2. SET NETWORK CONFIGURATION

LO3. SET ROUTER/WI-FI/ WIRELESS ACCESS POINT/REPEATER CONFIGURATION

LO4. INSPECT AND TEST THE CONFIGURED COMPUTER NETWORKS

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 7
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

LEARNING EXPERIENCE

LO1. INSTALL NETWORK CABLES

Learning Activities Special Instructions


● Read Information Sheets 2.1-1
“Network Concepts” In these Learning outcomes you
● Trainer to Discuss Network should be able to understand, explain,
Concepts using ppt. and apply Install Network Cables.
● Answer Self-Check CO2.1-1
“Network Concepts” Go Through Information Sheets and
● Compare your answer in Answer answer self-checks to ensure that
Key CO2.1-1 “Network Concepts” knowledge of standards in install
● Read Information Sheets CO2.1-2 network cables is acquired.
“Network Topology”
● Trainer to Discuss Network
Topology using ppt. The output of this Learning Outcome
● Answer Self-Check CO2.1-2 is the following.
“Network Topology”
● Compare your answer in Answer ● Learn the Network Concepts
Key CO2.1-2 “Network Topology” ● Have Knowledge About Different
● Read Information Sheets CO 2.1-3 ○ Network Topologies
“Network OHS & 5s Principles” ● Perform Cabling Splicing &
● Trainer to Discuss Network Testing maintenance.
Topology using ppt. ● Perform Cable Installation
● Answer Self-Check CO2.1-3 ● Do Waste Management
“Network OHS & 5s Principles”
● Compare your answer in Answer Show your output to your trainer for
Key CO.1-3 “Network OHS & 5s his feedback as you accomplish them.
Principles”
● Read Information Sheets CO2.1-4
“Network Tools, Materials &
Testing Devices”

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 8
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Trainer to Discuss Network Tools,


Materials & Testing Devices using
ppt.
● Answer Self-Check CO2.1-4 in
“Network Tools, Materials &
Testing Devices”
● Compare your answer in Answer
Key
● CO2.1-4 “Network Tools, Materials
& Testing Devices”
● Read Information Sheets CO2.1-5
“Network cable installation and
testing.”
● Trainer to Discuss Network cable
installation and testing using ppt.
● Perform Task-Sheet CO2.1-5 in
“Network cable installation and
testing”
● Check Performance Criteria
Checklist CO2.1-5a “Network cable
installation and testing”
● Perform Job-Sheet CO2.1-5 in
“Network cable installation and
testing”
● Check Performance Criteria
Checklist
● CO2.1-5b “Network cable
installation and testing”
● Read Information Sheets CO2.1-6
“Waste Management”
● Trainer to Discuss Waste

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 9
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Management using ppt.


● Answer Self-Check CO2.1-6
“Network Concepts”
● Compare your answer in Answer
Key CO2.1-6 “Waste Management”

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 10
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

INFORMATION SHEET 2.1-1


NETWORK CONCEPTS
Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Have knowledge about network concepts

2. Identify the different components of network

3. Identify the different types of network

Before installing network cable you should have knowledge about the Networking

Concepts.

What is a Computer Network?

● Two or more computers connected together through a communication media

form a computer network.

● The computers are connected in a network to exchange information and data. The

computers connected in a network can also use resources of other computers.

Computer Network Components

There are different components of a network. Following are the basic components

of the network.

1. Server - Powerful computers that provides services to the other computers on the

network

2. Client - Computer that uses the services that a server provides the client is less

powerful than server

3. Media - A physical connection between the devices on a network

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 11
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

4. Network Adapter - Network adapter or network interface card (NIC) is a circuit

board with the components necessary for sending and receiving data. It is plugged

into one of the available slots on the Pc and transmission cable is attached to the

connector on the NIC.

5. Resources - Anything available to a client on the network is considered a resource

printers, data, fax devices and other network devices and information are

resources.

6. User - Any person that uses a client to access resources on the network

7. Protocols - These are written rules used for communications. They are the

languages that computers use to talk to each other on a network

Different Types of Computer Network

● Local Area Network (LAN) - Supplies networking capability to a group of

computers in close proximity to each other such as in an office building, a school,

or a home. A LAN is useful for sharing resources like files, printers, games or other

applications.

● Metropolitan Area Network (MAN) - Is a computer network that usually spans a

city or a large campus, A MAN usually interconnects a number of (LANs) using a

high-capacity backbone technology, such as fiber-optical links.

● Wide Area Network (WAN) - Is a network that covers a broad area (i.e., any

telecommunications network that links across metropolitan, regional, or national

boundaries) using private or public network transports, Business and government

entities utilize WANs to relay data among employees, clients, buyers, and

suppliers from various geographical locations. In essence, this mode of

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 12
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

telecommunication allows a business to effectively carry out its daily

function regardless of location. The Internet can be considered a WAN as well, and

is used by businesses, governments, organizations, and individuals for almost any

purpose imaginable.

● Storage Area Network (SAN) - Is a high-speed sub network of shared storage

devices, A storage device is a machine that contains nothing but a disk or disks for

storing data.

● Virtual Private Network (VPN) - Technology included in Windows Server 2003

helps enable cost-effective, secure remote access to private networks. VPN

allows administrators to take advantage of the Internet to help provide the

functionality and security of private WAN connections at a lower cost. In Windows

Server 2003, VPN is enabled using the Routing and Remote Access service. VPN

is part of a comprehensive network access solution that includes support for

authentication and authorization services, and advanced network security

technologies.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 13
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Self-check 2.1-1
Multiple Choices:
1. Two or more computers connected together through a communication media?
a. Computer
b. Computer Network
c. Network
d. All of the Above
2. Powerful computers that provide services to the other computers on the
network?
a. Network Adapter
b. Client
c. Server
d. Media
3. Computer that uses the services that a server provides?
a. a.) Client
b. Media
c. Server
d. Network Adapter
4. A physical connection between the devices on a network?
a. Client
b. Media
c. Server
d. Network Adapter
5. Any person that uses a client to access resources on the network?
a. Client
a. User
b. Server
c. Media
6. Supplies networking capability to a group of computers in close proximity to each
other such as in an office building, a school, or a home?
a. Local Area Network

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 14
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

b. Metropolitan Area Network


c. Wide Area Network
d. Storage Area Network
7. Is a computer network that usually spans a city or a large campus?
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Virtual Private Network
8. Is it a network that covers a broad area?
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Storage Area Network
9. Is a machine that contains nothing but a disk or disks for storing data?
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Storage Area Network
10. 10.Allows administrators to take advantage of the Internet to help provide the
functionality and security of private WAN connections at a lower cost.
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Virtual Private Network

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 15
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Answer key 2.1-1

1. B

2. C

3. A

4. B

5. B

6. A

7. B

8. C

9. D

10. D

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 16
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheets CO2.1-2

“Network Topology”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Learn the Different Network Topology

2. Draw Network Topology

Network topology is the diagram that you will follow in installing network cables.

What is Network Topology?

- Physical and logical network layout of computer Network.

Physical – actual layout of the computer cables and other network devices.

Logical – the way in which the network appears to the devices that use it.

COMMON TOPOLOGIES:

● BUS TOPOLOGY

- Uses a trunk or backbone to which all of the computers on the network

connect.

- Systems connect to this backbone using T connectors or taps

- Coaxial cablings (10Base-2, 10Base5) were popular options years ago.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 17
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

BUS TOPOLOGY
Advantages Disadvantages

Cheap and easy to implement Network disruption when computers are


added or removed
Require less cable A break in the cable will prevent all
Systems from accessing the network.
Does not use any specialized network Difficult to Troubleshoot
to troubleshoot.

RING TOPOLOGY

1. Logical ring

- Meaning that data travels in circular fashion from one computer to another on

the network.

- Typically FDDI, SONET or Token Ring technology are used to implement a ring

network

- Ring networks are most commonly wired in a star configuration

2. Token Ring

- Has multi-station access unit (MSAU), equivalent to hub or switch.

- MSAU performs the token circulation internally.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 18
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

RING TOPOLOGY

Advantages Disadvantages

Cable faults are easily located, making Expansion to the network can cause

troubleshooting easier network disruption

Ring networks are moderately easy to install A single break in the cable can

disrupt the entire network.

STAR TOPOLOGY

- All computers/devices connect to a central

device called hub or switch.

- Each device requires a single cable point-

to- point connection between the device

and hub.

- Most widely implemented

- Hub is the single point of failure

STAR TOPOLOGY
Advantages Disadvantages

Easily expanded without disruption Requires more cable to the network

Cable failure affects only a single User A central connecting device allows for a
single point of failure

Easy to troubleshoot and isolate to problems More difficult to implement

MESH TOPOLOGY

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 19
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

- Each computer connects to every other.

- High level of redundancy.

- Rarely used.

- Wiring is very complicated

- Cabling cost is high

- Troubleshooting a failed cable is tricky A variation hybrid mesh – create point to

point connection between specific network devices, often seen in WAN

implementation.

MESH TOPOLOGY

Advantages Disadvantages

Requires more cable than the other


Provides redundant paths between devices
LAN topologies

The network can be expanded without Can be expanded implementation


disruption to current uses

WIRELESS NETWORKING

- Do not require physical cabling

- Particularly useful for remote access for laptop users

- Eliminate cable faults and cable breaks.

- Signal interference and security issue.

MESH TOPOLOGY

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 20
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Advantages Disadvantages

Allows for wireless remote access Potential security issues associated


with wireless transmissions

Network can be expanded without disruption to Limited speed in comparison to other


current users network topologies

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 21
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Self-check 2.1-2

Multiple Choices:

1. Physical and logical network layout?

a. Layout

b. Drawing

c. Topology

d. All of the Above

2. Actual layout of the computer cables and other network devices?


a. Drawing

A. Topology

B. Physical Layout

C. Logical Layout

3. The way in which the network appears to the devices that use it?

a. Drawing
b. Topology
c. Physical Layout
d. Logical Layout

4. Uses a trunk or backbone to which all of the computers on the network connect?

a. Bus Topology
b. Star Topology
c. Ring Topology
d. Mesh Topology
4. Meaning that data travels in circular fashion from one computer to another on
the network?

a. Logical Ring
b. Token Ring
c. Ring Topology
d. Mesh Topology
5. Has multi-station access unit (MSAU), equivalent to hub or switch. MSAU
performs the token circulation internally?

a.) Logical Ring

b.) Token Ring

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 22
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

c.) Ring Topology

d.) Mesh Topology

6. Each computer connects to every other?

a.) Bus Topology

b.) Star Topology

c.) Ring Topology

d.) Mesh Topology

7. Do not require physical cabling

a.) Bus Topology

b.) Star Topology

c.) Ring Topology

d.) Wireless Networking

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 23
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Answer key 2.1-1

1. C

2. C

3. D

4. A

5. A

6. B

7. D

8. D

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 24
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheets CO2.1-3

“Network OHS & 5s Principles”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Learn the Network Occupation Health and Safety

2. Learn the Network 5s Principles

Before installing network cables we must practice Network OHS & 5s Principles

to ensure our safety during the training.

OHS Policies and Procedures

Occupational health and safety (OHS) refers to the legislation, policies, procedures

and activities that aim to protect the health, safety and welfare of all people at the

workplace.

Every worker has a right to healthy and safe work and to a work environment that

enables them to live a socially and economically productive life. Safety practices should

be learned early and always adhered to when working with any electrical device including

personal computers and peripherals.

Personal safety while working with PC’s

Here are some safety precautions to take before working with any computer devices:

● Before doing anything, listen to your trainer’s instructions to prevent accidents or

any unwanted events that may occur in your workplace.

● Be sure not to mix electronic components and water.

● Avoid playing or running while inside the room.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 25
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Always wear personal protective equipment (PPE) like coverall, shoes with rubber

sole, anti-static wrist strap, etc.

● Ask for assistance from your trainer when it comes to dealing with tools &

equipment.

● Applying safety measures when handling tools and equipment are necessary to

avoid certain damages.

● Be sure to use the tools and equipment properly to avoid accidents.

Manufacturing companies are all familiar with the 5S methodology to organize the

workspace for efficiency and effectiveness. 5S is the name of a workplace organization

method that uses a list of five Japanese words: seiri, seiton, seiso, seiketsu, and

shitsuke. Amazingly, transliterated or translated into English, they all start

with the letter S: sort, set, shine, standardize, sustain. (Credit goes to Hiroyuki

Hirano and his overall approach to production systems)

The obvious benefit of 5S methodology is improved productivity. This

methodology can be applied to any workplace – and for our purpose we can discuss it to

improve your Computer Network environment. Organizing the hardware and software

used in your environment, identifying and running the items used, maintaining the

equipment, and sustaining the new order through standardization, which builds

understanding among employees of how they should best utilize the computer network

– including hardware, software and business applications in the cloud – to be most

productive at work. Let’s review.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 26
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

1. Sort

Sorting helps you to use a red tag method that will get rid of all the different

processes or items that you don’t need. Throughout the years, your organization may

have acquired software and hardware that may be either used partially, or not used at all.

I bet you have some old boxes and bundles of cables and trinkets that you don’t know

what to do with. Some of them you probably don’t even know what they are for! This is

also a good time to do an inventory of your software, to make sure that all of your copies

are licensed and up-to-date. Perhaps you can donate your old or unused computers, or

discard old and broken gadgets and network-related equipment. Don’t forget to comply

with your local laws about e- waste! Check these resources for more on e-cycling and

electronic waste:

EcoSquid is a web search platform that helps consumers identify the best options

to resell, recycle, or donate new and used electronics.

Earth 911 has taken environmental hotlines, web sites and other information

sources nationwide, and consolidated them into one network where you can find

community-specific information on e-Cycling and much more.

Electronic Industries Alliance’s Consumer Education Initiative helps you find

reuse, recycling and donation programs for electronics products in your state;

here is the link to their page specific to e-Cycling in New Jersey)

TechSoup provides resources for those who would like to donate hardware, those

who would like to acquire recycled hardware, and refurbishes.

Evaluate your legacy systems to have full understanding of what is going to go

now. Take steps to remove these items from your location. Sorting will declutter

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 27
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

and free up space that your organization will need to move on to the next step –

Set.

2. Set - Now that you have a better understanding of what you have, and what you

need – and let’s not forget some free space, you can move on to the next aspect of 5 S

method: set everything in order. During this step you will make sure to lay out your

computer network in the most efficient way, and make sure that your employees have a

proper workplace that allows them to be productive within your network: make sure that

if new equipment, software or license is required, it is acquired. Don’t be an

unintentional software pirate! Make sure that your offices are properly wired, and your

necessary items such as printers, scanners, etc. at a reachable distance and can be easily

accessed. So, set things in order – and then shine!

3. Shine - Once you have the workplace sorted and set, it’s time to put some shine

on. What are you doing to make sure your network is neat and clean? The third step,

shine, is crucial to the 5 S methods. Teach your workforce the importance of maintaining

and cleaning the equipment and data for a great impact on the way your business

operates. Shine also helps the equipment to last longer as you aren’t neglecting it and

allowing it to get cluttered or dusty. In addition to prolonging the lifespan of your

equipment, keeping things right is also healthy for your employees. This page from OSHA

– Ergonomic Solutions for Occupational Safety is a great resource for

recommended workspace standards. Any environment can benefit from equipment

that is ergonomic – there is plethora of items such as monitors, keyboards, mice, office

chairs, etc. that are designed to keep your employees comfortable while on the job. When

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 28
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

they perform their jobs better, your business is doing better. To propel your success even

further, move on to the next step – standardize.

4. Standardize - One of the most important things you can do for your business is to

standardize the equipment and processes within your computer network. New

procedures, once vetted, should be properly documented and made standard. It will

ensure that large orders and other processes would flow easily, especially if you are

looking to expand your business. When you have your equipment documented, and when

procedures become part of the employee manual, your organization will benefit from

improved operations. You can easily use standard procedures for cross-training of your

employees, or bringing new hires on board. In addition, many platforms and solutions

now come with options to migrate data one to another, and having a standardized setup

makes things like data migrations, equipment and software updates a breeze.

With standards in mind keep an eye on the new trend – Bring Your Own Device (BYOD).

Users are shifting away from corporate issued devices, such as Blackberry smart phones,

to devices they feel more comfortable with, such as iOS or Android based platforms. If

not all of your equipment is standard, processes still should be. Keep computer network

security and efficiency in mind when considering BYOD for your organization.

5. Sustain - Your final step, sustain, is the hardest – not falling back into old habits is

not easy. It is even more difficult if you don’t have a full-time IT staff on board to perform

tech support and maintenance. Left unmonitored, your data, your network and computer

equipment and devices may get compromised and bring you to a gradual decline back to

the old ways. It may affect your business directly by having your business data and

environment vulnerable. It turns, it will leave employees idle and impacting your ability to

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 29
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

do business, costing you evens more through the loss of productivity, revenue, or

reputation.

Managed Services allows you to maintain and review standards through practice of

outsourcing day-to-day IT management and Computer Network Tech Support as a cost-

effective method for improving business operations. Boost performance, tighten

security, and extend the life of your IT assets. Many IT companies provide Managed

services. If your business is in New Jersey or New York, give us a call at 201-493-1414 to

discuss the benefits of Managed IT Services for your business.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 30
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Self-check 2.1-3

Write T if the answer is True and write F if the answer is False.

1. After doing anything, listen to your trainer’s instructions to prevent accidents or

any unwanted events that may occur in your workplace.

2. Be sure to mix electronic components and water.

3. Avoid playing or running while inside the room.

4. Always wear personal protective equipment (PPE) like coverall, shoes with rubber

sole, anti-static wrist strap, etc.

5. Ask for assistance from your trainer when it comes to dealing with tools &

equipment.

6. Applying safety measures when handling tools and equipment are necessary to

avoid certain damages.

7. Be sure to use the tools and equipment properly to avoid accidents.

Enumerate Network Cabling 5s.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 31
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Answer-key 2.1-3

TRUE OR FALSE

1. F

2. F

3. T

4. T

5. T

6. T

7. T

ENUMERATION

1. Sort

2. Set

3. Shine

4. Standardize

5. Sustain

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 32
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheets 2.1-4

“Network Tools, Equipment, Materials & Testing Devices”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Learn Different Networking tools, materials & testing devices.

2. Familiarize Different Networking tools, equipment, materials & testing devices.

Before installing network cables we must know the different Networking tools, materials,

equipment & testing devices that we will use during the training.

Network Tools

●Crimping tool

A crimping tool is a tool designed to crimp or

connect a connector to the end of a cable. For

example, network cables and phone cables are

created using a crimping tool to connect the RJ-45

and RJ-11 connectors to the end of the cable. In the

example picture below, this crimper is capable of

crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire

cutter near the handles that can be used to cut phone or CAT5 cable.

● Wire stripper - A tool designed to remove the

protective covering off of a cable to expose the

inner wires. Because different wires come in

different shapes, there are dozens of different wire

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 33
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

strippers available. The picture shows an example of a wire stripper, which strips a

cable by placing the cable in-between the blade and one of the ridges and then

spun around the cable until the jacket can be pulled off.

● Electric Hand Drill with Drill bit - Is a tool

fitted with a cutting tool attachment or

driving tool attachment, usually a drill bit or

driver bit, used for boring holes in various

materials or fastening various materials

together with the use of fasteners. The

attachment is gripped by a chuck at one

end of the drill and rotated while pressed against the target material. The tip, and

sometimes edges, of the cutting tool does the work of cutting into the target

material. This may be slicing off thin shavings (twist drills or auger bits), grinding

off small particles (oil drilling), crushing and removing pieces of the workpiece

(SDS masonry drill), countersinking, counter boring, or other operations.

Drills are commonly used in woodworking, metalworking, construction and do-it-

yourself projects. Specially designed drills are also used in medicine, space

missions and other applications. Drills are available with a wide variety of

performance characteristics, such as power and capacity.

Network Equipments

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 34
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Patch panel - A patch panel, patch

bay, patch field or jack field is a

device or unit featuring a number of

jacks, usually of the same or similar

type, for the use of connecting

and routing circuits for

monitoring, interconnecting, and testing circuits in a convenient,

flexible manner. Patch panels are commonly used in computer

networking, recording studios, and radio and television.

● Network Hub - When referring to a

network, a hub is the most basic

networking device that

connects multiple computers or other

network devices together. Unlike a

network switch or router, a network hub has no routing tables or

intelligence on where to send information and broadcasts all network

data across each connection. Most hubs can detect basic network errors

such as collisions, but having all information broadcast to multiple ports

can be a security risk and cause bottlenecks. In the past network hubs

were popular because they were much cheaper than a switch and router,

but today most switches do not cost much more than a hub and are a

much better solution for any network.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 35
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

In general, a hub refers to a hardware device that enables multiple

devices or connections to be connected to a computer. Another

example besides the one given above is a USB hub, which allows dozens

of to be connected to one computer, even though that computer may

only have a few USB connections. The picture is an example of a USB

hub.

● Network Switch - A network switch

(also called switching hub, bridging hub,

officially MAC Bridge) is a computer

networking device that connects

devices together on a computer

network, by using packet switching to

receive, process and forward data to the destination device. Unlike less

advanced network hubs, a network switch forwards data only to one or

multiple devices that need to receive it, rather than broadcasting the

same data out of each of its ports.

● Managed switches - Give you more

control over your LAN traffic and offer

advanced features to control that

traffic. An unmanaged switch simply allows Ethernet devices to

communicate with one another, such as a PC or network printer, and

those are typically what we call “plug and play.”

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 36
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Network Controller/Network Interface

Card - A network interface controller (NIC,

also known as a network interface

card, network adapter, LAN adapter or

physical network interface and by similar

terms) is a computer hardware

component that connects a computer to a computer network.

- Early network interface controllers were commonly

implemented on expansion cards that plugged into a computer bus.

The low cost and ubiquity of the Ethernet standard means that most

newer computers have a network interface built into the

motherboard.

- Modern network interface controllers offer advanced features such

as interrupt and DMA interfaces to the host processors, support for

multiple receive and transmit queues, partitioning into multiple

logical interfaces, and on-controller network traffic processing such

as the TCP offload engine.

● Wireless Router - A wireless router is a device that performs the

functions of a router and also includes the functions of a wireless

access point. It is used to provide access to the

Internet or a private computer network. It can function in a wired LAN

(local area network), in a wireless- only LAN (WLAN), or in a mixed

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 37
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

wired/wireless network, depending on the

manufacturer and model.

● Wireless Access point - In computer networking,

a wireless access point(AP) is a device that allows

wireless devices to connect to a wired network

using Wi-Fi, or related standards. The AP usually

connects to a router (via a wired network) as a

standalone device, but it can also be an integral

component of the router itself.

● Printer - In computing, a printer is a peripheral

which makes a persistent human readable

representation of graphics or text on paper or similar physical media.

The two most common printer mechanisms are black and white laser

printers used for common documents, and color inkjet printers which

can produce high quality photograph quality output.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 38
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Cable Tester/Network Tester - A cable tester is a

device that is used to test the strength and

connectivity of a particular type of cable or other

wired assemblies. There are a number of different

types of cable testers, each able to test a specific

type of cable or wire (some may be able to test different types of cables or wires).

The cable tester can test whether a cable or wire is set up properly, connected to

the appropriate source points, and if the communication strength between the

source and destination is strong enough to serve its intended purpose. The picture

is an example of a cable tester from TRENDnet.

Network Materials

● RJ 45 - Short for Registered Jack-45, an eight-wire

connector used commonly to connect computers onto local-

area networks (LAN), especially Ethernets. RJ-45

connectors look similar to the ubiquitous RJ-11 connectors

used for connecting telephone equipment, but they are

somewhat wider.

● Modular Box - Use to in a large building, usually place on the wall to connect

telephone lines or network cable easily.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 39
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Raceway - A raceway (sometimes referred to as a raceway

system) is an enclosed conduit that forms a physical

pathway for electrical wiring. Raceways protect wires and

cables from heat, humidity, corrosion, water intrusion and

general physical threats.

● UTP Cable - Unshielded Twisted Pair cable is most

certainly by far the most popular cable around the world.

UTP cable is used not only for networking but also for the

traditional telephone.

● Fiber Optic Cable - An optical fiber cable is a cable containing one or more

optical fibers that are used to carry light. The optical

fiber elements are typically individually coated with

plastic layers and contained in a protective tube

suitable for the environment where the cable will be

deployed. Different types of cable are used for

different applications, for example long distance telecommunication, or

providing a high- speed data connection between different parts of a building.

Network Personal Protective Equipment

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 40
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Protective eyewear - is protective gear for the

eyes, which comes in many types depending upon the

threat that is to be reduced. The threats can be particles,

light, wind blast, heat, sea spray or some type of

ball or puck used in sports.

● Gloves - A glove (Middle English from Old English

glof) is a garment covering the whole hand. Gloves have

separate sheaths or openings for each finger and the

thumb; if there is an opening but no covering sheath for each

finger they are called "fingerless gloves". Fingerless gloves

have one large opening rather than individual openings for each

finger are sometimes called gauntlets. Gloves which cover the entire hand or fist but do

not have separate finger openings or sheaths are called mittens. Mittens are warmer than

gloves made of the same material because fingers maintain their warmth better when

they are in contact with each other. Reduced surface area reduces heat loss.

● Working clothes - is clothing worn for work, especially work

that involves manual labour. Often those employed within trade

industries elect to be outfitted in workwear because it is built to

provide durability and safety.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 41
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Self-Check 2.1-4

Identification:

1. Is a tool designed to crimp or connect a connector to the end of a cable?

2. A tool designed to remove the protective covering off of a cable to expose the

inner wires.

3. Is a device or unit featuring a number of jacks, usually of the same or similar type,

for the use of connecting and routing circuits for monitoring, interconnecting, and

testing circuits in a convenient, flexible manner?

4. Is a computer networking device that connects devices together on a computer

network, by using packet switching to receive, process and forward data to the

destination device.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 42
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

5. It is used to provide access to the Internet or a private computer network.

6. Is a device that is used to test the strength and connectivity of a particular type

of cable or other wired assemblies.

7. Is an eight-wire connector used commonly to connect computers onto local-area

networks (LAN), especially Ethernets.

8. Is an enclosed conduit that forms a physical pathway for electrical wiring.

9. Is used not only for networking but also for the traditional telephone.

10. Is protective gear for the eyes, which comes in many types depending upon

the threat that is to be reduced.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 43
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Answer-Key 2.1-4

1. Crimping Tool

2. Wire Stripper

3. Patch Panel

4. Network Switch

5. Wireless Router

6. Lan/Cable Tester

7. Raceways

8. RJ 45

9. UTP Cable

10. Protective Eye wear/Goggles

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 44
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheets 2.1-5

“Network cable installation and testing.”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Familiarize the different Types of UTP Cable and their uses.

2. Learn the proper ways in splicing cable.

3. Learn how to install cables properly.

4. Install Patch Panel Cable

5. Install Modular Box

6. Install Network Equipment

7. Test Network Installation

Installing cable is one of the most critical part of this module because this can

affect other module so it should be done properly to avoid problems during configuration

of the network.

● Network Cables - Networking cables are used to connect one network device to

other network devices or to connect two or more computers to share printer,

scanner etc. Different types of network cables like Coaxial cable, Optical fiber

cable, Twisted Pair cables are used depending on the network's

topology, protocol and size. The devices can be separated by a few meters (e.g. via

Ethernet) or nearly unlimited distances (e.g. via the interconnections of the

Internet).

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 45
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Unshielded Twisted Pair - Unshielded Twisted Pair cable is most certainly by far

the most popular cable around the world. UTP cable is used not only for

networking but also for the traditional telephone.

UTP Cable Categories

● CAT1

- Data rate up to 1Mbps

- Traditional Telephone & ISDN – Modem

● CAT2

- Data rate up to 4Mbps

- Token Ring

● CAT3

- Data rate up to 10Mbps

- Token Ring & 10Base-T

● CAT4

- Data rate up to 16Mbps

- Token Ring

● CAT5

- Data rate up to 100Mbps

- Ethernet (10Mbps)

- Fast Ethernet (100Mbps) & Token Ring (16Mbps)

● CAT5e

- Data rate up to 1000Mbps

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 46
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

- Gigabit Ethernet

● CAT6

- Data rate up to 1000Mbps

- Gigabit Ethernet

Ethernet Cable Standard Color Coding

● - The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the

TIA/EIA 568-B standard in 2002 and has been updated since. Both standards

define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable

and RJ-45 connectors for Ethernet connectivity. The standards and pin-out

specification appear to be related and interchangeable, but are not the same and

should not be used interchangeably.

● Both the T-568A and the T-568B standard Straight-Through cables are used

most often as patch cords for your Ethernet connections. If you require a cable to

connect two Ethernet devices directly together without a hub or when you

connect two hubs together, you will need to use a Crossover cable instead.

● A good way of remembering how to wire a Crossover Ethernet cable is to wire

one end using the T-568A standard and the other end using the T- 568B

standard. Another way of remembering the color coding is to simply switch the

Green set of wires in place with the Orange set of wires. Specifically, switch the

solid Green (G) with the solid Orange, and switch the green/white with the

orange/white.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 47
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

T-568A Straight-Through Ethernet Cable

T-568B Straight-Through Ethernet Cable

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 48
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Ethernet Cable Instructions:

● Pull the cable off the reel to the desired length and cut. If you are pulling cables

through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The

total length of wire segments between a PC and a hub or between two PC’s

cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for

10BASE-T.

● Start on one end and strip the cable jacket off (about 1″) using a stripper or a knife.

Be extra careful not to nick the wires, otherwise you will need to start over.

● Spread, untwist the pairs, and arrange the wires in the order of the desired cable

end. Flatten the end between your thumb and forefinger. Trim the ends of the

wires so they are even with one another, leaving only 1/2″ in wire length. If it is

longer than 1/2″ it will be out-of-spec and susceptible to crosstalk. Flatten and

insure there are no spaces between wires.

● Hold the RJ-45 plug with the clip facing down or away from you. Push the wires

firmly into the plug. Inspect each wire is flat even at the front of the plug. Check

the order of the wires. Double check again. Check that the jacket is fitted right

against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45

with the crimper.

● Check the color orientation, check that the crimped connection is not about to

come apart, and check to see if the wires are flat against the front of the plug. If

even one of these are incorrect, you will have to start over. Test the Ethernet

cable.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 49
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Ethernet Cable Tips:

● A straight-thru cable has identical ends.

● A crossover cable has different ends.

● A straight-thru is used as a patch cord in Ethernet connections.

● A crossover is used to connect two Ethernet devices without a hub or for

connecting two hubs.

● A crossover has one end with the Orange set of wires switched with the Green set.

● Odd numbered pins are always striped, even numbered pins are always solid

colored.

● Looking at the RJ-45 with the clip facing away from you, Brown is always on the

right, and pin 1 is on the left.

● No more than 1/2″ of the Ethernet cable should be untwisted otherwise it will be

susceptible to crosstalk.

● Do not deform, do not bend, do not stretch, do not staple, do not run parallel with

power cables, and do not run Ethernet cables near noise inducing components.

Basic Theory:

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 50
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet

crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected

to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see

that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either

standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or

required in 100BASE-TX as well. So why bother using these wires, well for one thing its

simply easier to make a connection with all the wires grouped together. Otherwise you’ll

be spending time trying to fit those tiny little wires into each of the corresponding holes

in the RJ-45 connector.

How to wire your room with Cat5e or Cat6 Ethernet Cable.

- Although wireless is simpler for a lot of people, due to multimedia sharing,

bandwidth on a home network, and paranoia about wireless security, you may want to use

a hard wired solution for home networking. Having a wired network at home allows you to

have a private, high-speed network for internet access, file sharing, media streaming,

online gaming, IP security cameras, and much more.

Step 1: Initial Considerations and Planning

There are certain design considerations that need to be addressed based on your needs.

1. Which room(s) do I want wired?

2. How many ports do I want in each location?

3. What is a good location for distribution?

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 51
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

4. What path should the cables take?

5. What network speed do I need?

Step 2: Required Tools, Equipments and Materials

Tools

Crimping Tool

Electric Hand Drill

Wire Stripper

Equipments

Patch panel

Network Switch/Hub

Wireless Router

Wireless Access point

Manage Switch

Materials

Cat5e or Cat6 UTP

Cat5e or Cat6 UTP Cable Crimp (Straight-through & Crossover)

Raceways

Modular Box

Label maker (optional).

Step 3: Measure and Run the Cables

There are a number of ways to do this. You can estimate, measure from floor plans, run

one, etc.

Step 4: Connect the Wires to the Patch Panel

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 52
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Strip the sheath

a. Remove the cable sheath 2.54 cm (1 inch) from the end of the cable.

Position wires in data jack

a. Position wires in the proper channels on the RJ-45 jack maintaining the

twists as close to the jack as possible. The diagram that follows shows an example

of how to place the wires with one type of jack.

b. Most jacks have the channels color-coded to indicate where the wires go. The

following photo of the jack shows one model. Jacks are typically stamped to

indicate whether they are T568A or T568B.

Punch down the data jack

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 53
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

a. Use the punch tool to push conductors into the

channels. Make sure to position the cutting side of the punch

tool so that it faces the outside of the jack. If this is not done,

it will cut the wire being punched. Try tilting the handle of the

punch tool a little to the outside, so it will cut better.

b. If any wire remains attached after using the punch tool, simply twist the ends

gently to remove them. Then place the clips on the jack, and tighten them. Make sure that

no more than 1.27 cm (one half inch) of untwisted wire is between the end of the cable

jacket and the channels on the jack. Attach the faceplate.

c. Snap the jack into the faceplate by pushing it from the back side. Make sure when

this is done, that the jack is right-side up so the clip faces down when the wall plate is

mounted.

d. Use the screws to attach the faceplate to either the box or to the bracket. If there

is a surface mounted box, keep in mind that it might hold 30-60 cm (1-2 feet) of excess

cable. Then it will be necessary to either slide the cable through the tie-wraps, or pull back

the raceway that covers it, in order to push the excess cable back into the wall. If there is

a flush-mounted jack, all that is needed is to push the excess cable back into the wall.

Punch down the patch panel

a. On the opposite end of the cabling, remove the jacket 2.54 cm (1 inch) from the

cable.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 54
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

b. Lay the wires down in the patch panel so that the colors of the wires correspond

exactly to the colors indicated on the pin locations in the same manner as the data jack

was punched down.

c. Keep the sheath within .64 cm (¼ inch) of where the wires begin branching out to

their pin locations.

d. Do not untwist the wires more than necessary to lay them down at the pin

locations. A good way to keep from untwisting too much is to hold down the wires next to

the patch panel with one finger while using the other hand to pull apart each end as you

lay it across the connector.

e. The following figure shows a large punch down patch panel with carefully routed

cabling.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 55
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Step 5: Test the data jack and patch panel terminations

a. Obtain two straight-through Ethernet patch cables and verify they both function

properly using a simple cable tester.

b. Connect one end of one of the straight-through Ethernet patch cables to the data

jack outlet and one end of the other straight-through cable to the jack at the patch panel.

c. Insert the opposite ends of the two cables into a simple cable tester and check for

continuity from end to end through both patch cables, the data jack, and the patch panel.

Did the cable run test good from end to end?

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 56
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Step 6: Connect the wires to the modular box.

a. Make sure the stripper is adjusted properly on a scrap piece of cable. The Stripper

should be adjusted to only score the jacket to make removing it easier and not nick the

twisted pairs.

b. Straighten the pairs out completely and lay them over the top of the keystone jack

noting the color pattern for the 568b wiring. Note: Each keystone jack is slightly different

in how they are labeled and how the colors are arranged. The 568B standard is most

commonly used and ends of the cable must have the same standards to communicate.

We have the 3 most common keystone jack styles pictured here. The first jack pictured

has the 2 standard pairs on the right, and the 2 variable pairs on the left. The A standard is

the center column and the B standard is on the left. Both A and B standard applies to the

right side of the jack. The solid color box with the lower right corner missing represents

the solid color wire with the white stripe. The white box with the colored tip represents

the white wire with the colored stripe. The second jack pictured here has both A and B

standards on both sides of the jack, with the color code running down the center. The

solid color rectangle represents the solid color wire with the white stripe, wile the half

white half color rectangle represents the white wire with the colored stripe. The third jack

pictured here has the A and B standard codes labeled on the outside of the jack. With the

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 57
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

A standard on top and the B standard on the bottom. The solid box represents the solid

wire with the white stripe Wile the box with the white diagonal stripe going throught the

middle, represents the white wire with the colored stripe.

c. Keeping the pairs as twisted as possible press the wire into the correct groove

with your thumbs. If you completely straighten the wires to run them through the jack you

will risk cross talk between the pairs.

d. Using a punch down tool punch the wires down into the blades built into the

keystone jack. The blades in the jack are designed to work with solid cable, and may not

work with stranded cable. Make sure the blade (as noted in the picture) is facing the

outside of the keystone jack. If you reverse it you will cut the wires inside the keystone

jack rendering them useless. The punch down tool should cut off the remaining pieces of

the wire on the outside, but sometimes you may need to punch them down

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 58
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

a 2nd time and wiggle the wire to it breaks clean off. Once this is done you can install the

dust covers if your keystone jack comes with them. This keystone jack did not have the

covers. The covers should never be used to do the job of the punch down tool.

Step 7: Connect to the Internet

a. Connect Network Switch/Hub to the patch panel using cross-over cable base on

the netowork topology.

b. Connect the Wireles Router to the Network hub & to the Modem using cross-over

cable base on the netowork topology.

c. Connect your pc on the modular box using straight-through cable.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 59
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Task-Sheet CO2.1-5

Title: Cabling & Testing

Performance Objective: Given (tools, equipment, materials &


Protective equipment), you should be able to (create straight-through & crossover
cable) following (the proper way of cabling).

Supplies/Materials : UTP Cable & RJ 45


Tools & Equipment : Crimping Tools, Wire stripper & Cable/Lan
Tester

Steps/Procedure:

1. Make sure to follow the proper way of cutting & crimping cables.
2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment, materials & protective equipments you will use.
4. Crimp straight-through & crossover cable.
5. Test your cable if they are working properly.

Assessment Method:
● Demonstration
● Interview

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 60
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Performance Criteria Check-list CO2.1-5a

CRITERIA Did you….


YES NO

1. Make sure to follow the proper way of cutting & crimping cables.

2. Make sure that you’re working area is ready.

3. Prepare all tools, equipment, materials & protective equipments you will use.

4. Crimp straight-through & crossover cable.

5. Test your cable if they are working properly.

Job-Sheet CO2.1-5

Title: Network Cable Installation

Performance Objective: Given (tools, equipment & materials), you should be able to
(Install Cable in the Patch Panel, Modular box and connect to the other network
equipments) following (the steps written in the information sheet CO2.1-6).

Supplies/Materials : Crimp Straight-through & Cross-over Cable, UTP Cable, Raceways,


Modular Box & Label Marker.

Tools & Equipment : Crimping Tools, Wire stripper & Cable/Lan Tester, Electric Hand Drill,
Patch panel, Network Switch/Hub, Wireless Router, Wireless Access point, Manage
Switch.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 61
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Steps/Procedure:

1. Make sure to follow the proper way of cable installation.


2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment & materials you will use.
4. Install Patch Panel Cable.
5. Connect Cable to Modular box.
6. Connect Network equipments according to Network Topology.
Assessment Method:

• Demonstration

• Interview

Performance Criteria Check-list CO2.1-5b


CRITERIA Did you….
YES NO

1. Make sure to follow the proper way of cable installation.

2. Make sure that you’re working area is ready.

3. Follow the proper way of cutting & crimping cables.

4. Install Patch Panel Cable.

5. Connect Cable to Modular box.

6. Connect Network equipments according to Network Topology.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 62
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheets CO2.1-6

“Waste Management”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Learn the proper disposal of network cables

Recycling used cable: Challenges and opportunities

The cabling industry has a ways to go before it can be considered “green.”

It has been more than four years since the National Electrical Code, in its 2002

edition, first required the removal of abandoned cable. That requirement, which is law

wherever the 2002 NEC or the portions of it relating to abandoned cable have been

adopted, kicks in whenever a cabling project of any type takes place. Chief among the

concerns about abandoned cable is that it represents a fire hazard, and it is no

coincidence that the document requiring its removal is published by the National Fire

Protection Association (NFPA; www.nfpa.org).

The requirement has stimulated something of a cottage industry, with some

contractors specializing in, or limiting their practice exclusively to, removing abandoned

cable from buildings. Soon (or perhaps even today), it may be inappropriate to call it a

cottage industry, as signs point to cable removal becoming a mainstream practice. The

ground first shook on that concept in May 2005 when DuPont launched its Abandoned

Cable Services program (www.dupont.com/cablingsolutions). Under the program, DuPont

conducts engineering analysis of a building’s abandoned cable and provides building

owners with a written report. Building owners then have the option to have the cable

removed, a process carried out by a stable of DuPont-sanctioned contractors.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 63
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Last summer, Communications Planning Corp. (CPC;

www.communicationsplanning.com) also launched cable-removal services. Headed by

noted industry figure, Frank Bisbee, CPC is one of several cabling design and installation

contractors that have turned at least some of their attention to abating abandoned cable.

Guidance for recycling

In June, DuPont introduced a specification guide for abandoned cable assessment

and removal. The guide is meant to act as an aid to project specifies and designers, and

provides a template by which those professionals can dictate that abandoned cable be

identified and removed. The specifications are written in accordance with the 2004

edition of the Master Format, which is a series of construction specifications endorsed by

the Construction Specifications Institute and the American Institute of Architects.

In addition to the guide covering abandoned cable assessment and removal, DuPont

simultaneously introduced similar specification guides for installing limited-combustible

cable and for recycling removed abandoned cable. DuPont and some cable

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 64
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

manufacturers have advocated installation of limited-combustible cable for several

years. But the notion of recycling communications cable that has been removed from

buildings is a newer concept-one that DuPont incorporated into its Abandoned Cable

Services program last year.

If abandoned cable removal services can be called a “cottage industry,” then the

recycling of such cable might be described as “fledgling,” because by and large, it is a new

enterprise that has not yet taken firm hold. Among several contributing factors, CPC’s

Bisbee emphasizes that labor is a significant hurdle. “The process of separating the

removed abandoned cables to get them into the recycle stream can be more costly than

the materials recovered,” he notes.

What's in there?

Those contractors that have been recycling cable, and did so even before the

2002 NEC edict about abandoned cable removal, have not necessarily followed strict

procedures preparing that cable for recycling. While nobody would go on record

admitting the following practice, many in the industry have heard about or perhaps even

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 65
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

witnessed a batch of old cable being thrown into a large barrel and burned down to its

copper-the component most often recycled. Considering the chemicals that make up a

twisted-pair copper cable, such a practice can hardly be considered environmentally

friendly.

Additionally, the fluoropolymers that insulate the copper conductors in a plenum- rated

twisted-pair cable do not burn easily (that’s exactly the point of a plenum cable). Stripping

those cables down to their bare copper is, as Bisbee referred to, a labor-intensive

endeavor. But it can be done, by hand or other means.

This author also could not find a recycler willing to go on record describing in detail the

process by which an unshielded twisted-pair cable is broken down and prepared for

recycling. The closest thing to a description was, “The separation and recovery processes

are proprietary; however, the processes used are mechanical in nature and do not require

any chemicals.”

In a big-picture view, cable that is removed from a building and intended for the recycling

stream are separated into several groups, including communications cable containing

copper, communications cable containing optical fiber, and electrical cables. Other pieces

of hardware, including racks, trays, and blocks, also must be dealt with separately from

the copper communications cable.

Once separated, the cables get put into some type of temporary storage. Depending on

how much cable is involved and the time frame in which it will be removed, it may be

stored in a dumpster placed on site exclusively for cable; or, for smaller projects, it may

be stored in bags or boxes. On smaller projects, the contractor is responsible for

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 66
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

transporting the cable to the recycling facility. DuPont notes that it can provide

dumpsters to larger job sites for cable that will be recycled through its program.

Once the cable reaches the recycling facility, the sites employ their proprietary processes

to break down the cable. Says one recycler that is part of DuPont’s program, “After

abandoned cable is removed from a building, fiber-optic, electrical cables, and related

hardware are separated from the low-voltage communication cable, which is then

recycled. First, the metal is separated from the non-metal components. Then the non-

metal components-primarily

fluoropolymers, polyvinylchloride, and polyethylene-are separated and recovered.”

As far as what happens to each part of a cable, the recycler states, “Usually all the parts of

an unshielded twisted-pair cable can be recycled except polyester wraps or draw strings.

Each of the components is separated by material type. The copper is sent to a copper

refining company, the PVC and polyethylene are sold to secondary converters for a

variety of applications, and the fluoropolymer is cleaned and extruded into pellets for

secondary applications and sold by DuPont in the wire and cable industry.”

Some cable types can present significant challenges to a recycler. Specifically, coaxial

and shielded twisted-pair cable may contain tin-plated copper as a shielding element.

That material is not worth as much as pure copper and is hard to segregate from pure

copper. Additionally, wrapped shields can vary greatly from heavy foils to metalized

polyester. They also pose segregation challenges, which diminish their value.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 67
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Taking an interest

With DuPont cleaning and reusing recovered fluoropolymers, it has a financial

interest in reclaiming these materials; it stands to reason the company will make

accommodations to facilitate large-scale recycling activities. When the company

introduced its new specification guides, Robert Kenny, global business manager of

DuPont Cabling Solutions, stated, “DuPont is committed to making it easier for building

owners to comply with codes in a way that is environmentally responsible through

recycling, and to follow best practice recommendations for fire safety on an ongoing

basis.”

But will recycling take hold across the board on cable-removal projects? The

current price of copper suggests there is some chance contractors will find it worthwhile

to recycle cable for that element alone. Copper is the cable component most in demand

today.

Another significant aspect of cable removal and recycling is the fact that many

cables in buildings today contain hazardous substances, particularly lead. The recently

enacted European Union environmental initiative RoHS (Restriction on Hazardous

Substances) has spurred any cable manufacturer wanting to do business in Europe to

remove lead from its products. California legislation set to go into effect on January 1

contains restrictions similar to that of RoHS. So, by and large, lead and other dangerous

materials have been eliminated from products now reaching the marketplace. But the

entire issue of abandoned cable focuses on products that were manufactured years and

in some cases decades ago, and almost certainly contain hazardous materials.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 68
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Bisbee, outspoken about the use of heavy metals and other hazardous materials in

cabling products, comments that while over-the-counter swipe kits can be helpful in

determining the presence of high quantities of lead, a lower and still-dangerous lead level

may not show up on such a test. The Environmental Protection Agency also has

cautioned that tests of these types are not accurate enough to distinguish between high

and low levels. Impossible to verify or quantify without third-party testing, the presence

of lead dust in abandoned cabling systems looms as a possible threat and, at this point, an

unknown.

A less-heard-about but perhaps no less significant European Union environmental

law is WEEE-the Waste Electrical and Electronic Equipment directive. Although it is

aimed at household electronics users and not commercial users, it provides a blueprint

that puts the onus for waste-electronics collection and recycling on the manufacturers of

the equipment.

Meanwhile, in the United States, building owners face the task of having unused

cable removed. And where it goes once it leaves the building varies greatly from project

to project. PATRICK McLaughlin is chief editor of Cabling Installation & Maintenance.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 69
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Self-Check 2.1-6

Multiple Choices:

1. Introduced a specification guide for abandoned cable assessment and removal.

a.) DuPont

b.) PATRICK McLaughlin

c.) Robert Kenny

d.) All of the Above

2. NEC Stands For?

a.) National Electrical Code

b.) National Electrician Code

c.) National Electricity Code

d.) National Electronics Code

3. Abandoned cable removal services can be called what?

a.) Equipment directive

b.) Cottage industry

c.) Fledgling

d.) All of the Above

4. Recycling of such cable might be described as what?

a.) Equipment directive

b.) Cottage industry

c.) Fledgling

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 70
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

d.) All of the Above

5. Is the cable component most in demand today.

a.) Copper

b.) Silver

c.) Aluminum

d.) All of the Above

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 71
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Answer key 2.1-7

1. A

2. A

3. B

4. C

5. A

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 72
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

LEARNING EXPERIENCES

LEARNING OUTCOME 2

SET NETWORK CONFIGURATION

Learning Activities Special Instructions

• Read Information Sheets CO2.2-1 In these Learning outcomes you should be able

“Configure Computer Network” to understand, explain, and apply Setting-up of

• Trainer to Discuss Configure Computer Network Configuration.

Network using ppt. Go Through Information Sheets and answer

• Perform Task-Sheet CO2.2-1 self-checks to ensure that knowledge of

“Configure Computer Network” standards in install network cables is acquired.

• Check Performance Criteria Checklist The output of this Learning Outcome is the

CO2.2-1 following.

“Configure Computer Network” • Perform Network Configuration

• Read Information Sheets CO2.2-2

“Inspect & Diagnose Computer Network” • Diagnose computer network

• Trainer to Discuss Inspect & Diagnose

Computer Network ppt. • Perform Network Inspection

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 73
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

• Perform Job-Sheet CO2.2-2

“Inspect & Diagnose Computer Network”

• Check Performance Criteria Checklist

CO2.2-2

“Inspect & Diagnose Computer Network” Show your output to your trainer for his

feedback as you accomplish them.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 74
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheets CO2.2-1

“Configure Computer Network”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Configure Peer to Peer Network

2. Share Folders and Printers

Windows 7, as with many of the different operating systems available, has a number of

different network functions which can be configured.

How to Configure a Static IP Address in Windows 7

Sometimes in order to gain connectivity in certain networks where a DHCP server

is not running, the configuration of a static IP address is required.

The steps required to setup up a static IP address are rather

straightforward, but the process is a bit different from Windows Vista and XP.

Let’s go through the steps now and configure a static IPv4 address in Windows 7.

Static IPv4 Configuration in Windows 7

The first thing that must be done is to gain access to the Network and Sharing

Center in Windows 7. This can be done in one of two ways; the first way to access it is via

the control panel.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 75
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Select the Windows 7 or on the bottom left-hand corner and select the control panel

option as shown below:

There are several views which are available for the control panel; by default the

category view is used. When using the category view the option that you need to select is

called View network status and Tasks, as highlighted below.

This will bring you to the Network and Sharing Center.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 76
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

The second way to gain access to the Network and Sharing Center is to utilize the

network icon which is displayed in the system tray when a network interface has been

enabled.

When this icon is right-clicked the option to open the Network and Sharing Center is

given as shown below:

Once the Network and Sharing Center is open there is an option which allows the change

of adapter settings which is shown in the upper left hand corner of the window. This is

shown highlighted in the following figure (click on the image to enlarge):

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 77
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Once in the Network Connections window, an interface must be selected which is going

to be configured with the static IP address. In the following example, both a wired and

wireless interface is shown as examples.

For the purposes of this article the wired interface will be used as the interface being

given a static IP Address.

By right-clicking on the correct interface a sub-menu is shown; from this menu select the

properties option.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 78
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Once the properties option is selected the interface properties windows will be displayed.

This screen gives the option to configure a number of different network parameters.

Since we want to change the interface IPv4 IP address this option must be selected

from the window. Once this option is selected the properties button will be enabled; press

the properties button.

Once the properties button is pressed the IPv4 properties window is displayed which

shows that the interface is currently configured to obtain both its IP address and its DNS

server information automatically.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 79
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 80
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

In order to change to a static IP address the option to Use the following IP address must

be selected; once this is done the option to enter the IP address parameters is enabled

and the Use the following DNS server addresses option is selected.

For the purpose of this article the IP address 192.168.1.100 is used with a subnet mask of

255.255.255.0 and a default gateway of 192.168.1.1. The DNS server which will be

configured is 4.2.2.2.

These options are shown in their correct locations in the following figure:

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 81
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Once these options have been entered on the screen simply press Ok on both property

screens and the configuration of a static IP is complete.

The knowledge of static IP configuration is vital in modern organizational environments

as many do not completely utilize automatic IP assignment; it is also vital knowledge

when trying to troubleshoot IPv4.

HOMEGROUP Configuration in Windows 7

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 82
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

A new option which was introduced with Windows 7 is HomeGroup. HomeGroup allows

Windows 7 machines to be linked in an easier way which makes the sharing of resources

between machines much simpler to setup. Each machine must become a member of a

HomeGroup in order to utilize this functionality.

The first thing that must be done on the first computer used is the creation of a

HomeGroup. This is done through the Choose HomeGroup and Sharing Options in the

Network and Sharing Center window.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 83
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Once this option is selected, the HomeGroup window is displayed. The first computer to

be configured with a HomeGroup will be given the option to Create a homegroup. Once a

HomeGroup is configured on a network it will actively broadcast its existence to the other

computers on the network (HomeGroup requires IPv6 to be enabled), this option is

shown in the following figure:

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 84
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 85
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 86
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Once a HomeGroup has been created on a network, all other participating computers

must join it. In order to join the HomeGroup, the HomeGroup password shown in the

figure above is required (this can also be changed).

The following figure shows how the HomeGroup window will display when there is an

existing HomeGroup on the network. Once this is shown, simply press theJoin now button

and select the local shared options and enter the HomeGroup password.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 87
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 88
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Once this is complete the machine has become part of a HomeGroup.

Windows 7 Network Locations aka Profiles

Another feature which can be used with Windows 7 is network location. Everytime a new

network connection is established, a prompt will be given to select what type of location

the new network connection is. The three options are Home, Work and Public.

When using the Home location, network discovery and HomeGroup are enabled which

allows the easy networking of Windows machines. The Work location is similar to

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 89
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

the Home location but disables the use of the HomeGroup functionality. The Public

location is the most secure and disables the various sharing functionalities which are

enabled then in the other locations.

The current location which is selected is shown in the Network and Sharing Center under

View your active networks and can be changed by selecting the current setting.

Once the setting is selected the Set Network Location window is opened which enables

the configuration of a different network location. This window is also the same window

which will be used to prompt initial network location selection.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 90
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Conclusion

There are a number of different advanced options which can be utilized with Windows 7;

this article shows how to configure some of the most used options.

Windows 7, as with newer operating systems, continues to make better help systems.

Take the time to utilize these systems and learn even more about Windows 7

functionality.

How to Change the Name of Your Windows Computer

Changing this in XP was extremely simple, but in Windows 7, Windows 8, or Vista it’s

buried behind a few more menus. Here are three routes you can take to open up System

Properties:

• Type sysdm.cpl into the start menu search box (quickest)

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 91
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

• Right-click on the Computer option on the start menu or in My Computer.

• Open Control Panel, and go to System and Maintenance, and then System.

If you chose one of the last two options, then you’ll need to click on

Advanced System Settings on the left menu:

Now you’ll finally be on the right screen, which should say System Properties.

Click on the “Change” button to rename the computer, which will pop up this dialog:

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 92
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Now you can finally change the name of the computer. You could also change the name

of the workgroup to something more descriptive as well. You’ll have to reboot after you

make this change.

Share files and folders over the network

Sharing files with public folders

To share items in your Public folder and its subfolders with other users of your computer,

you don’t need to do a thing. By default, all users with an account on your computer can

log on and create, view, modify, and delete files in the Public folders. The person who

creates a file in a Public folder (or copies an item to a Public folder) is the file’s Owner and

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 93
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

has Full Control access. All others who log on locally have Modify access. For more

information on access levels, see what are permissions?

To share items in your Public folder with network users, click the Start button ,

click Network, and then click Network and Sharing Center. Turn on Public Folder Sharing

(for information on how to do this, see sharing files with the Public folder). You can’t

select which network users get access, nor can you specify different access levels for

different users. Sharing via the Public folder is quick and easy—but it’s rigidly inflexible.

Sharing files and folders from any folder

Whether you plan to share files and folders with other people who share your computer

or with those who connect to your computer over the network (or both), the process for

setting up shared resources is the same as long as the Sharing Wizard is enabled. We

recommend that you use the Sharing Wizard even if you normally disdain wizards. It’s

quick, easy, and almost certain to make all of the correct settings for network shares and

NTFS permissions—a sometimes daunting task if undertaken manually. Once you’ve

configured shares with the wizard, you can always dive in and make changes manually if

you want.

To make sure the Sharing Wizard is enabled, click the Start button , type “folder” in the

Search box, and then click Folder Options. Click the View tab. In the Advanced

settings box, scroll down the list and make sure the Use Sharing Wizard (Recommended)

check box is selected.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 94
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

The process for setting up shared resources is the same as long as the

Sharing Wizard is enabled

With the Sharing Wizard at the ready, follow these steps to share files or folders:

1. In Windows Explorer, select the folders or files you want to share. (You can select

multiple objects.)

2. In the Command bar, click Share. (Alternatively, right-click, and then click Share.)

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 95
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

3. With the Sharing Wizard, it’s quick and easy to share files or folders with other

people

4. In the file sharing box, enter the name of the user with whom you want to share

files or folders, and then click Add. You can type a name in the box or click the arrow to

display a list of available names. Repeat for each person you want to add.

The list includes all of the users who have an account on your computer, plus everyone. If

you want to grant access to someone who doesn’t appear in the list, you need to create a

user account for that person (for information on how to do this, see Create a user

account).

Note:

If you select everyone, and you have password-protected sharing enabled, the user must

still have a valid account on your computer. However, if you have turned off password-

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 96
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

protected sharing, network users can gain access only if you grant permission to

everyone or to Guest.

For each user, select a permission level. Your choices are:

• Reader Users with this permission level can view shared files and run shared

programs, but cannot change or delete files. Selecting . Reader in the Sharing Wizard is

equivalent to setting NTFS permissions to Read & Execute.

• Contributor This permission level, which is available only for shared folders (not

shared files), allows the user to view all files, add files, and change or delete files that the

user adds. Selecting . Contributor sets NTFS permissions to Modify.

• Co-owner Users who are assigned the Co-owner permission have the same

privileges that you do as the Owner: They can view, change, add, and delete files in a

shared folder. Selecting . Co-owner sets NTFS permissions to Full Control for this user.

Note:

You might see other permission levels if you return to the Sharing Wizard after you set up

sharing. The Custom permission level identifies NTFS permissions other than Read &

Execute, Modify, and Full Control. The Mixed permission level appears if you select

multiple items, and those items have different sharing settings. Owner, of course,

identifies the owner of the item.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 97
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

5. Click Share. After a few moments, the wizard displays a page similar to the page

shown in the following illustration.

The Sharing Wizard displays the network path for each item you’ve shared

6. In the final step of the wizard, you can do any of the following:

• Send an e-mail message to the people with whom you’re sharing. The message

includes a link to the shared file or folder.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 98
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

With the Sharing Wizard, you can send a message that includes a link to the item you

want to share

• Copy the network path to the Clipboard. This is handy if you want to send a link via

instant messenger or another application.

• Double-click a share name to open the shared item.

• Open a search folder that shows all of the folders or files you’re sharing.

7. When you’re finished with these tasks, click done.

Creating a share requires privilege elevation. But, after a folder has been shared, the

shared folder is available to network users no matter who is logged on to your computer

—or even when nobody is logged on.

Using advanced sharing to create shorter network paths

Confusingly, when you share one of your profile folders (or any other subfolder of

%SystemDrive%\Users), Windows Vista creates a network share for the Users folder—

not for the folder you shared. This isn’t a security problem; NTFS permissions prevent

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 99
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

network users from seeing any folders or files except the ones you explicitly share. But it

does lead to some long UNC paths to network shares.

For example, if you share the My Received Files subfolder of Documents (as shown after

step 5 in the previous section), the network path is \\CARL- PC\Users\Carl\Documents\

My Received Files. If this same folder had been anywhere on your computer outside of

the Users folder, no matter how deeply nested, the network path would instead be \\

CARL-PC\My Received Files. Other people to whom you’ve granted access wouldn’t

need to click through a series of folders to find the files in the intended target folder.

Network users, of course, can map a network drive or save a shortcut to your target

folder to avoid this problem. But you can work around it from the sharing side, too: Use

advanced sharing to share the folder directly. (Do this after you’ve used the Sharing

Wizard to set up permissions.)

Note:

Make sure the share name you create doesn’t have spaces. Eliminating spaces makes it

easier to type a share path that works as a link.

Stopping or changing sharing of a file or folder

If you want to stop sharing a particular shared file or folder, select it in Windows Explorer,

and then click Share. The Sharing Wizard appears, as shown in the following illustration.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 100
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Use the Sharing Wizard to change sharing permissions or to stop sharing a

file or folder

If you click Change sharing permissions, the wizard continues as when you created the

share, except that all existing permissions are shown. You can add or remove names and

change permissions.

The Stop sharing option removes access control entries that are not inherited. In

addition, the network share is removed; the folder will no longer be visible in another

user’s Network folder.

Setting advanced sharing properties

If you disable the Sharing Wizard, Windows Vista reverts to a process similar to that

employed by earlier versions of Windows (except the aberration in Windows XP called

Simple File Sharing—nothing before or after is similar to that). Without the Sharing

Wizard, you configure network shares independently of NTFS permissions. (For more

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 101
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

information about this distinction, see How share permissions and NTFS permissions

work together at the end of this section.)

With the Sharing Wizard disabled, when you select a folder, and then click Share, rather

than the wizard appearing, Windows opens the folder’s properties dialog box and displays

the Sharing tab, as shown in the next illustration. Even with the Sharing Wizard enabled,

you can get to the same place; right-click the folder, and then choose Properties.

Note:

The Sharing tab is part of the properties dialog box for a folder, but not for files. Also,

when the Sharing Wizard is disabled, the Share button appears on the Command bar only

when you select a single folder. Only the Sharing Wizard is capable of making share

settings for files and for multiple objects simultaneously.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 102
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

The Share button summons the Sharing Wizard, but it’s available only when the Sharing

Wizard is enabled

To create or modify a network share using advanced settings, follow these steps:

1. On the Sharing tab, click Advanced Sharing.

2. Select the Share this Folder check box.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 103
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Use advanced settings to create or modify a network share

3. Accept or change the proposed share name.

Note:

If the folder is already shared, and you want to add another share name (perhaps with

different permissions), click Add, and then type the name for the new share. The share

name is the name that other users will see in their own Network folders. Windows initially

proposes to use the folder’s name as its share name. That’s usually a good choice, but

you’re not obligated to accept it. If you already have a shared folder with that name, you’ll

need to pick a different name.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 104
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

4. Type a description of the folder’s contents in the Comments box. Other users will

see this description when they inspect the folder’s properties dialog box in their Network

folder (or when they use the Details view).

5. To limit the number of users who can connect to the shared folder concurrently,

specify a number in the Limit the number of simultaneous users to box. Windows Vista

permits up to 10 concurrent users. (If you need to share a folder with more than 10 users

at once, you must use a server version of Windows.)

6. Click Permissions.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 105
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

The default share permission associated with a new share is Read access to everyone.

Caution:

When you share a folder, you also make that folder’s subfolders available on the network.

If the access permissions you set for the folder aren’t appropriate for any of its

subfolders, either reconsider your choice of access permissions or restructure your

folders to avoid the problem.

7. In the Group or user names box, select the name of the user or group you want to

manage. The share permissions for the selected user or group appear in the permissions

box.

8. Select Allow, Deny, or neither for each access control entry:

• Full Control Allows users to create, read, write, rename, and delete files in the

folder and its subfolders. In addition, users can change permissions and take ownership

of files on NTFS volumes. .

• Change Allows users to read, write, rename, and delete files in the folder and its

subfolders, but not create new files. .

• Read Allows users to read files but not write to them or delete them. If you select

neither . allow nor Deny, it is still possible that the user or group can inherit the

permission through membership in another group that has the permission. If the user or

group doesn’t belong to another such group, the user or group is implicitly denied

permission.

Note:

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 106
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

To remove a name from the Group or user names box, select the name, and then click

Remove. To add a name to the list, click Add. Enter the names of the users and groups

you want to add.

9. Click OK in each dialog box.

How share permissions and NTFS permissions work together

The implementation of share permissions and NTFS permissions is confusingly similar,

but it’s important to recognize that these are two separate levels of access control. Only

connections that successfully pass through both gates are granted access.

Share permissions control network access to a particular resource. Share permissions do

not affect users who log on locally. You set share permissions in the Advanced Sharing

dialog box, which you access from the Sharing tab of a folder’s properties dialog box.

NTFS permissions apply to folders and files on an NTFS-formatted drive. They provide

extremely granular control over an object. For each user to whom you want to grant

access, you can specify exactly what they’re allowed to do: run programs, view folder

contents, create new files, change existing files, and so on. You set NTFS permissions on

the Security tab of the properties dialog box for a folder or file.

It’s important to recognize that the two types of permissions are combined in the most

restrictive way. If, for example, a user is granted Read permission on the network share, it

doesn’t matter whether or not the account has Full Control NTFS permissions on the

same folder; the user gets only Read access when connecting over the network.

In effect, the two sets of permissions act in tandem as gatekeepers that winnow out

incoming network connections. An account that attempts to connect over the network

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 107
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

is examined first by the share permissions gatekeeper. The account is either bounced

out on its caboodle or allowed to enter with certain permissions. It’s then confronted by

the NTFS permissions gatekeeper, which might strip away (but not add to) some or all of

the permissions granted at the first doorway.

In determining the effective permission for a particular account, you must also consider

the effect of group membership. Permissions are cumulative; an account that is a

member of one or more groups is granted all of the permissions that are granted

explicitly to the account as well as all of the permissions that are granted to each group of

which it’s a member. The only exception to this rule is Deny permissions, which take

precedence over any conflicting Allow permissions.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 108
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Task-Sheet CO2.2-1

Title: Network Configuration

Performance Objective: Given (Equipments & Materials), you should be able to

(configure network and share files) following (network configuration and sharing

steps).

Materials : 1 Crossover Cable

Equipment : 2 Computer Sets

Steps/Procedure:

1. Make sure that you’re working area is ready.

2. Prepare two computers with network cable.

3. Configure HOMEGROUP.

4. Use static class C IP address.

5. Share Local Folder.

Assessment Method:

• Demonstration

• Interview

Performance Criteria Check-list CO2.2-1

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 109
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

CRITERIA Did you…. YES NO

1. Configure HOMEGROUP Properly.

2. Use static class C IP address.

3. Share Files on the Network.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 110
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheets 2.2-2

“Inspect & Diagnose Computer Network”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:

1. Inspect Network Configuration

2. Diagnose Network Problems

When a user experiences a networking problem, NDF provides the ability to diagnose and

repair it by presenting the person with diagnostic assessments and resolution steps. NDF

simplifies and automates many of the common troubleshooting steps and solution

implementations for networking troubles.

Network Troubleshooting from the Network Icon in the Notification Area

You can easily launch network troubleshooting by right-clicking on the network icon in

the notification area of the Windows 7 desktop and selecting Troubleshoot problems.

Windows Network Diagnostics will launch and attempt to detect and correct what’s

wrong.

Network Troubleshooting from Control Panel

With Windows 7, you don’t have to wait for an error to occur to use the built-in

diagnostics. You can launch a troubleshooting session anytime from the new

Troubleshooting item in Control Panel. When you do, the screen shown in Figure 1

appears. In this case, the tool has found that the computer has no Internet connection.

The page displays a boxed message that informs you of the problem and offers a Try to

connect again option.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 111
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Figure 1 Opening the Troubleshooting item in Control Panel produces this screen.

If you click on the Network and Internet selection, you’ll get the dialog box shown in

Figure 2. There you can choose from seven options that start sessions for

troubleshooting several types of issues: Internet-connection difficulties, problems

accessing files and folders on other computers, and network-printing troubles.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 112
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Figure 2 Troubleshooting network and Internet problems.

Choosing any of the seven options launches a wizard that steps you through diagnosis of

the problem, and if possible, automated or manual correction. The troubleshooter also

records an Event Tracing Log (ETL). If the problem can’t be resolved, you can examine

and even forward the log. Just click on View History from the Troubleshooting dialog.

Figure 3 shows an example ETL.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 113
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Figure 3 an example of troubleshooting history.

Each item in the history list represents a separate troubleshooting session.

Double-clicking on a session displays the results for it.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 114
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Figure 4 Example of a troubleshooting report.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 115
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

To view the details of the detection, click the Detection details link, and you’ll see a

window like the one in Figure 5.

Figure 5 A typical Detection-details screen from a troubleshooting report.

Near the top of the dialog, you’ll see the name of the ETL file that contains the

information from the troubleshooting session. If you want to send a copy to support staff

or Microsoft for analysis, you can save the file by clicking on its name, which will bring up

the File Download dialog.

You can view and analyze ETL files with Network Monitor 3.3. You can also view the files

with Event Viewer and the Tracerpt.exe tool as well as by converting them to XML or text

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 116
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

files with the netsh trace convert command. You can save the details of the

troubleshooting session in a CAB file by right-clicking the session in the Troubleshooting

History window and then selecting Save As. Just as with ETL files, you can send the CAB

file to support staff for analysis.

Network Tracing with Netsh.exe

Windows 7 includes a new Netsh.exe context, netsh trace, for network tracing.

Commands in the netsh trace context allow you to selectively enable tracing for

providers and scenarios. A provider represents an individual component in the network

protocol stack, such as Winsock, TCP/IP, wireless LAN services, or NDIS. A tracing

scenario is a predefined collection of providers for a specific function, such as file sharing

or wireless LAN access. To exclude irrelevant details and reduce the size of the ETL file

you can apply filters.

Typically, to perform detailed troubleshooting of networking issues, you have to supply

your helpdesk staff or Microsoft’s Customer Service and Support organization with both

internal component tracing information and a capture of the network traffic at the time of

the problem. Prior to Windows 7, you had to carry out two different procedures to obtain

this information: Use Netsh.exe commands to enable and disable tracing and a packet-

sniffer program, such as Network Monitor to capture the network traffic. And then you

faced the difficult task of tying together the information from these two sources to

determine when network traffic was sent relative to the events in the tracing logs.

In Windows 7, when you perform network tracing with commands in the netsh trace

context, ETL files can contain both network traffic and component tracing in sequence.

And you can display the ETL files with Network Monitor 3.3, which provides much more

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 117
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

efficient way to analyze and troubleshoot network problems. Figure 6 shows an

example of an ETL file being viewed in Network Monitor 3.3.

Figure 6 Using Network Monitor 3.3 to view the network traffic recorded in an ETL file.

With this new capability, capturing network traffic requires neither end users nor

helpdesk staff to install and use Network Monitor on the computer having the problem.

Note that by default the ETL files generated for troubleshooting sessions from

Control Panel | Troubleshooting do not contain network traffic information.

To capture both tracing and network traffic information sequentially for multiple

components in the network stack (such as Winsock, DNS, TCP, NDIS, WFP and so forth),

Windows uses an activity-ID-based correlation known as grouping to collect and record

the tracing and traffic information in the ETL file. Grouping within the ETL file allows you

to examine the entire transaction as a single, correlated sequence of events.

For more information about the Netsh.exe commands for a tracing session, see the

“Starting and Stopping a Netsh.exe Trace” sidebar.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 118
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

When you enable tracing with Netsh.exe, Windows 7 can create two files. An ETL file

contains trace events for Windows components, and if specified, network traffic. By

default, the ETL file is named Nettrace.etl and stored in the %TEMP%\NetTraces

folder. You can specify a different name and storage location with the trace file=

parameter. An optional CAB file can contain several types of files including text, Windows

Registry, XML and others that store additional troubleshooting information. The CAB file

also includes a copy of the ETL file. By default, the CAB file is named Nettrace.cab and

stored in the %TEMP%\NetTraces folder.

You can also use Netsh.exe tracing in conjunction with Control Panel | Troubleshooting.

First, use the appropriate Netsh.exe command to enable tracing for the scenario. For

example, use the netsh trace scenario=internetclient report=yes command. Use Control

Panel | Troubleshooting to run the Connect to the Internet troubleshooting session.

When complete, run the netsh trace stop command. Now, when you view the history of

the troubleshooting session, you’ll be able to access the CAB file.

Sidebar: Starting and Stopping a Netsh.exe Trace

To start a network trace with Netsh.exe, first run an elevated command prompt. To

display the list of trace providers, type netsh trace show providers. To produce the list of

trace scenarios, type netsh trace show scenarios. To show the list of trace providers

within a scenario, type netsh trace show scenario Name.

You can start a trace for one or multiple providers or scenarios. For example, to do so for

the Internet Client scenario, type netsh trace start scenario=internetclient.

To start tracing for more than one scenario, you can specify all of the appropriate

scenarios, such as netsh trace start scenario=File Sharing scenario=Direct Access. You

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 119
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

can create a CAB file with a formatted report by including the report=yes parameter. Use

trace file=parameter to specify a name and location for the ETL and CAB files. If you

want to record network traffic in the ETL file, include the capture=yes parameter.

For example, here’s the command that will start a trace for the WLAN scenario, create a

CAB file with a formatted report, capture network traffic, and store the files with the

name WLAN Test in the C:\Tshoot folder: netsh trace start scenario=WLAN capture=yes

report=yes trace file=c:\tshoot\WLANtest.etl.

To stop tracing, use the netsh trace stop command.

For more information, see Netsh Commands for Network Trace in Windows Server 2008

R2.

Sidebar: Using Network Monitor 3.3 to View ETL Files

Before Network Monitor 3.3 can fully display the ETL files generated by Windows 7, you

must configure full Windows parsers. By default, Network Monitor

3.3 uses stub Windows parsers. To configure full Windows parsers, click Tools | Options |

Parsers. In the list of parsers, click Windows | Stubs to disable stub parsers and enable full

parsers, then click OK.

Job-Sheet CO2.2-2

Title: Diagnose computer network

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 120
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Performance Objective: Given (Equipments & Materials), you should be able to

(Diagnose computer network) following (Network Diagnostic procedures).

Materials : 1 Crossover Cable


Equipment : 2 Computer Sets

Steps/Procedure:

1. Make sure that you’re working area is ready.

2. Prepare two computers with network cable.

3. Inspect & diagnose network.

4. Make diagnostic report.

5. Prepare repair solutions report.

Assessment Method:

• Demonstration

• Interview

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 121
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Performance Criteria Check-list CO2.2-2

CRITERIA Did you…. YES NO

1. Make sure that working area is ready.

2. Prepare two computers with network cable.

3. Inspect & diagnose network.

4. Make diagnostic report.

5. Prepare repair solutions report.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 122
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Set router/Wi-Fi/ wireless access point/ repeater


Learning Outcome 3
configuration

CONTENTS:

1. Configure Client device


2. LAN & WAN Configuration
3. Wireless Network Configuration

ASSESSMENT CRITERIA:

1. Client Device systems settings are configured in accordance with manufacturers’ instructions and
end user preferences.
2. Local area network (LAN) port is configured in accordance with manufacturers’ instructions and
network design.
3. Wide area network (WAN) port is configured in accordance with manufacturers’ instructions and
network design.
4. Wireless settings are configured in accordance manufacturers’ instructions, network design and
end-user preferences.
5. Security/Firewall/Advance settings are configured in accordance with manufacturers’ instructions
and end user preferences.

CONDITION:
Student/ trainee must be provided with the following:

● Protective eyewear
● Digital multi-meter
● Wire stripper with bolt cutter
● Pliers (assorted)
● Screw drivers (assorted)
● LAN Tester
● Crimping tools Crimping tools
● Laptop
● Desktop
● Network storage
● Network storage
● Network printer

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 123
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● Wireless Router
● Switch or Hub

ASSESSMENT METHOD:

1. Demonstration
2. Interview

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 124
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Information Sheet 2.3-1:


CLIENT DEVICE CONFIGURATION
I. Learning Outcomes

You are expected to:

1. Configure Client Device

Your wireless router has a variety of useful options you can configure. These are
practically hidden you wouldn’t know these features exist unless you were digging
through your router’s configuration pages. Bear in mind that different routers have
different options. You may not have all the options listed here on your own router. The
options will also be in different places with different names.

Click the Details button to view more information about the connection.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 125
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Look for the IPv4 Default Gateway IP address in the details window. Plug this IP
address into your web browser’s address bar.

You’ll need to log in with your username and password combination. If you don’t
know these, your router is probably using its default combination — check your router’s
manual or perform a web search for its model number and “default password.” If you’ve
previously changed the password and can’t remember it, you can reset your router’s
password to the default. Once you’ve logged in, you can now browser your router’s
configuration pages and configure its settings.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 126
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

● The most typical username is “admin”.


● The most typical passwords are “admin” and “password”.
● Many routers will only require a username and a blank password, and some allow
you to leave all fields blank.
● If you can’t figure out the correct IP address, your username or password, search
for your router model online to see what the default login is. If it has been
changed, press the Reset button on the back of the router for 10 (to 30+ seconds

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 127
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

as dictated in the instructions for the router model) to restore factory defaults
and try again.

Open the Wireless Settings. When you log in to your router, you will be taken to the
router’s main menu or status screen. There will be several options to choose from. The
Internet section can usually be left at default settings, unless Page 100 of 118 you
received specific instructions from your internet service provider. The Wireless section
will allow you to set up your wireless network.

Enter a name for your wireless network.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 128
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

In the Wireless section, you should see a field labeled SSID or Name. Enter a
unique name for your wireless network. This is what other devices will see when
scanning for networks.

Check the box to enable SSID broadcast. This will essentially “turn on” the wireless
network so that it may be readily seen by anyone in range of the signal. *See the Tips
section below for additional information on the SSID setting.

Choose a security method. Choose from the list of available security options. For the
best security, choose WPA2-PSK as the encryption method. This is the most difficult
security to crack, and will give you the most protection from hackers and intruders.

Create a passphrase. Once you’ve chosen your security method, enter in a


passphrase for the network. This should be a difficult password, with a combination of

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 129
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

letters, numbers, and symbols. Don’t use any passwords that could be easily deduced
from your network name or from knowing you.

Save your settings. Once you are finished naming and securing your wireless
network, click the Apply or Save button. The changes will be applied to your router,
which may take a few moments. Once the router has finished resetting, your wireless
network will be enabled.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 130
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Performance Criteria Check-list 2.3-1

CRITERIA YES NO
Did you……..
1. Make sure that you’re working area is ready.

2. Prepare computer/laptop and other equipments.

3. Configure wireless router.

4. Change SSID.

5. Change wireless router password.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 131
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

INFORMATION SHEETS 2.3-2


LAN & WAN NETWORK CONFIGURATION
Learning objectives
You are expected to:

1. Configure LAN Network


2. Configure WAN Network

What is an IP Address?

An Internet Protocol address (IP address) in layman’s terms is basically the


address given to your computer when it’s connected to a network. Technically speaking,
an IP address is a 32-bit number that signifies the address of both the sender and
receiver of packets on a network.

Let’s take an example: suppose you want to send an email to your friend. Though
your email may be broken down into millions of data packets before it’s transmitted,
right now for simplicity’s sake consider it a single information packet. The IP addresses
are embedded on each packet that is transmitted over the network and are used to
identify the machine.

CLASS ADDRESS RANGE SUPPORTS


Class A 1.0.0.1 to 126.255.255.254 Large networks with many devices

Class B 128.1.0.1 to 191.255.255.254 Medium-sized networks.

Class C 192.0.1.1 to 223.255.254.254 small networks (fewer than 256


devices)
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.

Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or


Research and Development
Purposes.

Note: It’s totally possible for your computer to have two IP addresses at the same
time. One may be for the Internet and another one for the local area network.

These IP addresses are further divided into two main types: Static and Dynamic
IP address. Let’s have a good look at both for better understanding.

Static IP Address

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 132
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

As the name speaks, the static IP addresses are those types of IP address that
never change once they are assigned to a device on a network. No doubt this type of
addressing is cost effective but could have a high security risk. Static IP addresses are
mostly used by web, email and gaming servers who don’t care much about hiding their
locations.

Dynamic IP Address

On the other hand, a Dynamic IP address changes each time the device logs in to
a network. This kind of IP address is very tough to trace and are thus used by companies
and business firms. You must be thinking as to who or what allocates this Dynamic IP
address every time the device logs in. Well, these IP address are assigned using DHCP
(Dynamic Host Configuration Protocol). Talking about DHCP in detail is beyond the
scope of this article and we will take it up in a future post.

Which is better, Static or Dynamic?

You are probably wondering which type of IP addressing is better, Static or


Dynamic? Static IP addresses, as I already mentioned above, are used in places where
security is not a big concern like web servers, FTP and dedicate VOIP services. Dynamic
IP addressing, on the other hand are used when you browse through the Internet,
receive mails, download files, etc.

What is Local Area Connection?

LAN (Local Area Network) card will automatically install when you setup windows
7. LAN connection is required when you want to share your pc with others in your Home
Group. Supposes you have two Laptop/Pc and you want to connect them for some
purpose say playing multiplayer games (Cod 1, Cod 2, Cod4, Cod5 etc.) or to access
another Pc, just setup Local Area Connection. You can also connect your Pc to your
friends Pc no meter how far the distance, connect them with cable connection.

Procedure of setup Local Area Connection:


∙ Crete Workgroup:
1. Go to my computer properties.
2. Click change settings.
3. See

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 133
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

4. Type your Computer name and WORKGROUP

5. This message will appear

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 134
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Restart your computer then your WorkGroup will be created.

Give your IP Address:


1. Go to control panel
2. Click Network and Internet
3. Click Network and Sharing Center
4. Click HomeGroup
5. Click Advance Sharing Setting
6. There are two types: Home to work, Public
7. From Home to work select >Turn on Network Discovery >Turn on file and printer
sharing >Turn on public folder sharing..... >Enable file sharing for device........ >Allow
windows to manage.....
8. From Public select >Turn on Network Discovery >Turn on file and printer sharing
>Turn on public folder sharing..... >Enable file sharing for device........ >Turn off password
protected sharing.
9. Click change Adapter Setting (Top left side of the window)
10. You will find this

11. Plug your cable and then find this

12.Now setup your IP. Right click on Local Area Connection go to properties.
13. Double click Internet protocol version 4 (TCP/IPv4) Or click properties
14. Click Use the following IP address
15. IP address: Give your IP address
16. Subnet mask: Just press tab it will automatically generate (Default255.255.255.0)
17.Click use the following DNS server address.
18. Click ok.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 135
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

TCP/IP and WAN

TCP/IP is in most companies now the standard protocol, especially when multiple
locations (Offices and/or factories) are connected via a Wide-AreaNetwork (WAN).

In the headquarter, there will be most probably some servers, which need to be
Page 110 of 118 accessed from Remote offices and/ or factories (like a mail-server
and/or a company internal web server) and/or a main-frame or mini-computer, running a
common accounting system or an Enterprise Resource Planning System ( ERP ), which
usually are accessed from the client-computers via TCP/IP.

The head quarter could be connected via fixed lines (provided by WAN providers)
to the remote offices and/ or factories. Once the routers are setup properly by the WAN
provider, you as a user will not need to worry about the WAN; you have access to the

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 136
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

servers and main-frame, as long as in all locations the systems are properly configured
for the router/Gateway.

In this example, you would need to define in the remote location the Gateway (=
Router) address, either manually or using DHCP when IP-addresses are obtained
automatically (for example from a DHCP-service on an NT4-server) Just verify the
values using ipconfig on windows 7.

Test the connection from the remote location to the headquarter by making the
PING test to the systems located in the headquarter.

For File-Access to an NT-server in the head quarter via the WAN, you will either
to setup a WINS server or use LMHOSTS.

It is getting more complicated, when you have a second router/gateway installed,


for example for permanent Internet access.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 137
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

But there is also a special item to watch out for in the remote location when connecting
via a modem and a dial-up connection to the Internet.

Once you connect to the Internet, you will lose the connection via the WAN to all
the systems in the Headquarter, you will not be able to PING them. What Happened?

Use in the START-menu the RUN-command to start "ipconfig" and check your IP-
values of the dial-up connection (via the modem) to the Internet, which is the "PPP
Adapter": Usually, you get an additional Gateway address assigned to you for the
Internet connection. All network traffic, also for the internal communications, will now be
send to the Internet gateway!

While you are connected, you have now a configuration with multiple
routers/gateways, and you will have to give Windows a "helping hand" to tell it, which
router/gateway to be used for Internet network traffic and which one for company
internal network traffic: you need to use the "ROUTE" command to inform Windows,
which gateway to use to access the systems in the headquarter (more details on ROUTE
in the next section below):

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 138
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Your system knows now to use the gateway address at 192.168.1.1 for internal
communication with the Headquarter, while all other communications will use the
gateway defined by the Internet connection.

A WAN setup with multiple Routers/gateways in a location:

With 2 gateways, you have 2 possibilities:

1) Define one of them as the Default gateway (usually the Internet Gateway) and
program this gateway to pass any network traffic for the headquarter on to the WAN
router/gateway. But very often, you as a user or even network administrator do not have
access to the internal routing tables of your router, requiring you to use the 2nd
possibility.

2) Define the gateway with the widest range of IP-addresses (usually the Internet
Gateway) as your Default gateway and then program your own system to send all other
network traffic (for internal communication) to the WAN router by using the "ROUTE" -
command:

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 139
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

The Help-information, as displayed on a WindowsNT4 or Windows2000 system in a


Command-prompt window:

We need to use the "ROUTE ADD" command to program the system to send all
network traffic for the address range 192.168.2.0 (applying the subnet-mask of
255.255.255.0) to the gateway/ router at 192.168.1.1

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 140
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

Performance Criteria Check-list CO2.3-2

CRITERIA YES NO
Did you……..
1. Make sure that you’re working area is ready.

2. Prepare three computers with network cable.

3. Configure two Local Area Network

4. Set Static IP Address using Class CIP.

5. Test Network if working.

6. Configure WAN Network.

7. Change the IP Address of 2 computers to class B IP.

8. Connect the 2 Local Area Network to form WAN.

9. Test the Network if it is successful.

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 141
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II

INFORMATION SHEET 2.3-3


Wireless Network Configurations
Learning objectives
You are expected to:

1. Configure Wireless LAN


2. Connect client to a Wireless Network

A wireless network is any type of computer network that uses wireless data
connections for connecting network nodes.
Wireless networking is a method by which homes, telecommunications networks and
enterprise (business) installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations. Wireless
telecommunications networks are generally implemented and administered using radio
communication. This implementation takes place at the physical level (layer) of the OSI
model network structure.

Examples of wireless networks include cell phone networks, Wi-Fi local networks
and terrestrial microwave networks.

Wireless Devices
- Wireless Router
- Wireless Accesspoint
- Wireless Network Adapter

Date Developed: Document No.


COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 142

You might also like