CATHHH
CATHHH
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Sector : ELECTRONICS
Pagadian city
knowledge, skills and attitudes required for a Computer System Servicing NC II course.
each of the learning outcomes of the module. In each learning outcome there are
Information Sheets, Task Sheets, and Job Sheets. Follow these activities on your own and
If you have questions, don’t hesitate to ask your Trainer for assistance.
You may already have some of the knowledge and skills covered in this module
If you can demonstrate to your Trainer that you are competent in a particular skill
or skills, talk to him/her about having them formally recognized so you don’t have to do
the same training again. If you have a qualification or Certificate of Competency from
previous training, show it to your teacher. If the skills you acquired are still current and
relevant to this module, they may become part of the evidence you can present for RPL.
If you are not sure about the currency of your skills, discuss it with your Trainer.
After completing this module ask your Trainer to assess your competency. Result
of your assessment will be recorded in your competency profile. All the learning activities
are designed for you to complete at your own pace. Inside this module you will find the
activities for you to complete followed by relevant information sheets for each learning
outcome. Each learning outcome may have more than one learning activity.
Networks
Networks
TABLE OF CONTENTS
LIST OF COMPETENCIES…………………………………………….………………………………..4
TABLE OF CONTENTS…………………………………………………………………………………. 5
MODULE CONTENT……………………………………………………………………………
LEARNING EXPERIENCES…………………………………………………………………………………
INFORMATION SHEET………………………………………………………………………………………..
MODULE CONTENT
INTRODUCTION:
Network.
Completion of this module will help you better understand the succeeding module
learning activities supported by each instruction sheet. Before you perform the
instructions, read the information sheets and answer the self-check and activities
provided to ascertain to yourself and your trainer that you have acquired the knowledge
Upon completion of this module, report to your trainer for assessment to check
your achievement of knowledge and skills requirement of this module. If you pass the
LEARNING EXPERIENCE
Before installing network cable you should have knowledge about the Networking
Concepts.
● The computers are connected in a network to exchange information and data. The
There are different components of a network. Following are the basic components
of the network.
1. Server - Powerful computers that provides services to the other computers on the
network
2. Client - Computer that uses the services that a server provides the client is less
board with the components necessary for sending and receiving data. It is plugged
into one of the available slots on the Pc and transmission cable is attached to the
printers, data, fax devices and other network devices and information are
resources.
6. User - Any person that uses a client to access resources on the network
7. Protocols - These are written rules used for communications. They are the
or a home. A LAN is useful for sharing resources like files, printers, games or other
applications.
● Wide Area Network (WAN) - Is a network that covers a broad area (i.e., any
entities utilize WANs to relay data among employees, clients, buyers, and
function regardless of location. The Internet can be considered a WAN as well, and
purpose imaginable.
devices, A storage device is a machine that contains nothing but a disk or disks for
storing data.
Server 2003, VPN is enabled using the Routing and Remote Access service. VPN
technologies.
Self-check 2.1-1
Multiple Choices:
1. Two or more computers connected together through a communication media?
a. Computer
b. Computer Network
c. Network
d. All of the Above
2. Powerful computers that provide services to the other computers on the
network?
a. Network Adapter
b. Client
c. Server
d. Media
3. Computer that uses the services that a server provides?
a. a.) Client
b. Media
c. Server
d. Network Adapter
4. A physical connection between the devices on a network?
a. Client
b. Media
c. Server
d. Network Adapter
5. Any person that uses a client to access resources on the network?
a. Client
a. User
b. Server
c. Media
6. Supplies networking capability to a group of computers in close proximity to each
other such as in an office building, a school, or a home?
a. Local Area Network
1. B
2. C
3. A
4. B
5. B
6. A
7. B
8. C
9. D
10. D
“Network Topology”
Learning Objectives:
Network topology is the diagram that you will follow in installing network cables.
Physical – actual layout of the computer cables and other network devices.
Logical – the way in which the network appears to the devices that use it.
COMMON TOPOLOGIES:
● BUS TOPOLOGY
connect.
BUS TOPOLOGY
Advantages Disadvantages
RING TOPOLOGY
1. Logical ring
- Meaning that data travels in circular fashion from one computer to another on
the network.
- Typically FDDI, SONET or Token Ring technology are used to implement a ring
network
2. Token Ring
RING TOPOLOGY
Advantages Disadvantages
Cable faults are easily located, making Expansion to the network can cause
Ring networks are moderately easy to install A single break in the cable can
STAR TOPOLOGY
and hub.
STAR TOPOLOGY
Advantages Disadvantages
Cable failure affects only a single User A central connecting device allows for a
single point of failure
MESH TOPOLOGY
- Rarely used.
implementation.
MESH TOPOLOGY
Advantages Disadvantages
WIRELESS NETWORKING
MESH TOPOLOGY
Advantages Disadvantages
Self-check 2.1-2
Multiple Choices:
a. Layout
b. Drawing
c. Topology
A. Topology
B. Physical Layout
C. Logical Layout
3. The way in which the network appears to the devices that use it?
a. Drawing
b. Topology
c. Physical Layout
d. Logical Layout
4. Uses a trunk or backbone to which all of the computers on the network connect?
a. Bus Topology
b. Star Topology
c. Ring Topology
d. Mesh Topology
4. Meaning that data travels in circular fashion from one computer to another on
the network?
a. Logical Ring
b. Token Ring
c. Ring Topology
d. Mesh Topology
5. Has multi-station access unit (MSAU), equivalent to hub or switch. MSAU
performs the token circulation internally?
1. C
2. C
3. D
4. A
5. A
6. B
7. D
8. D
Learning Objectives:
Before installing network cables we must practice Network OHS & 5s Principles
Occupational health and safety (OHS) refers to the legislation, policies, procedures
and activities that aim to protect the health, safety and welfare of all people at the
workplace.
Every worker has a right to healthy and safe work and to a work environment that
enables them to live a socially and economically productive life. Safety practices should
be learned early and always adhered to when working with any electrical device including
Here are some safety precautions to take before working with any computer devices:
● Always wear personal protective equipment (PPE) like coverall, shoes with rubber
● Ask for assistance from your trainer when it comes to dealing with tools &
equipment.
● Applying safety measures when handling tools and equipment are necessary to
Manufacturing companies are all familiar with the 5S methodology to organize the
method that uses a list of five Japanese words: seiri, seiton, seiso, seiketsu, and
with the letter S: sort, set, shine, standardize, sustain. (Credit goes to Hiroyuki
methodology can be applied to any workplace – and for our purpose we can discuss it to
improve your Computer Network environment. Organizing the hardware and software
used in your environment, identifying and running the items used, maintaining the
equipment, and sustaining the new order through standardization, which builds
understanding among employees of how they should best utilize the computer network
1. Sort
Sorting helps you to use a red tag method that will get rid of all the different
processes or items that you don’t need. Throughout the years, your organization may
have acquired software and hardware that may be either used partially, or not used at all.
I bet you have some old boxes and bundles of cables and trinkets that you don’t know
what to do with. Some of them you probably don’t even know what they are for! This is
also a good time to do an inventory of your software, to make sure that all of your copies
are licensed and up-to-date. Perhaps you can donate your old or unused computers, or
discard old and broken gadgets and network-related equipment. Don’t forget to comply
with your local laws about e- waste! Check these resources for more on e-cycling and
electronic waste:
EcoSquid is a web search platform that helps consumers identify the best options
Earth 911 has taken environmental hotlines, web sites and other information
sources nationwide, and consolidated them into one network where you can find
reuse, recycling and donation programs for electronics products in your state;
TechSoup provides resources for those who would like to donate hardware, those
now. Take steps to remove these items from your location. Sorting will declutter
and free up space that your organization will need to move on to the next step –
Set.
2. Set - Now that you have a better understanding of what you have, and what you
need – and let’s not forget some free space, you can move on to the next aspect of 5 S
method: set everything in order. During this step you will make sure to lay out your
computer network in the most efficient way, and make sure that your employees have a
proper workplace that allows them to be productive within your network: make sure that
unintentional software pirate! Make sure that your offices are properly wired, and your
necessary items such as printers, scanners, etc. at a reachable distance and can be easily
3. Shine - Once you have the workplace sorted and set, it’s time to put some shine
on. What are you doing to make sure your network is neat and clean? The third step,
shine, is crucial to the 5 S methods. Teach your workforce the importance of maintaining
and cleaning the equipment and data for a great impact on the way your business
operates. Shine also helps the equipment to last longer as you aren’t neglecting it and
equipment, keeping things right is also healthy for your employees. This page from OSHA
that is ergonomic – there is plethora of items such as monitors, keyboards, mice, office
chairs, etc. that are designed to keep your employees comfortable while on the job. When
they perform their jobs better, your business is doing better. To propel your success even
4. Standardize - One of the most important things you can do for your business is to
standardize the equipment and processes within your computer network. New
procedures, once vetted, should be properly documented and made standard. It will
ensure that large orders and other processes would flow easily, especially if you are
looking to expand your business. When you have your equipment documented, and when
procedures become part of the employee manual, your organization will benefit from
improved operations. You can easily use standard procedures for cross-training of your
employees, or bringing new hires on board. In addition, many platforms and solutions
now come with options to migrate data one to another, and having a standardized setup
makes things like data migrations, equipment and software updates a breeze.
With standards in mind keep an eye on the new trend – Bring Your Own Device (BYOD).
Users are shifting away from corporate issued devices, such as Blackberry smart phones,
to devices they feel more comfortable with, such as iOS or Android based platforms. If
not all of your equipment is standard, processes still should be. Keep computer network
security and efficiency in mind when considering BYOD for your organization.
5. Sustain - Your final step, sustain, is the hardest – not falling back into old habits is
not easy. It is even more difficult if you don’t have a full-time IT staff on board to perform
tech support and maintenance. Left unmonitored, your data, your network and computer
equipment and devices may get compromised and bring you to a gradual decline back to
the old ways. It may affect your business directly by having your business data and
environment vulnerable. It turns, it will leave employees idle and impacting your ability to
do business, costing you evens more through the loss of productivity, revenue, or
reputation.
Managed Services allows you to maintain and review standards through practice of
security, and extend the life of your IT assets. Many IT companies provide Managed
services. If your business is in New Jersey or New York, give us a call at 201-493-1414 to
Self-check 2.1-3
4. Always wear personal protective equipment (PPE) like coverall, shoes with rubber
5. Ask for assistance from your trainer when it comes to dealing with tools &
equipment.
6. Applying safety measures when handling tools and equipment are necessary to
Answer-key 2.1-3
TRUE OR FALSE
1. F
2. F
3. T
4. T
5. T
6. T
7. T
ENUMERATION
1. Sort
2. Set
3. Shine
4. Standardize
5. Sustain
Learning Objectives:
Before installing network cables we must know the different Networking tools, materials,
equipment & testing devices that we will use during the training.
Network Tools
●Crimping tool
crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire
cutter near the handles that can be used to cut phone or CAT5 cable.
strippers available. The picture shows an example of a wire stripper, which strips a
cable by placing the cable in-between the blade and one of the ridges and then
spun around the cable until the jacket can be pulled off.
end of the drill and rotated while pressed against the target material. The tip, and
sometimes edges, of the cutting tool does the work of cutting into the target
material. This may be slicing off thin shavings (twist drills or auger bits), grinding
off small particles (oil drilling), crushing and removing pieces of the workpiece
yourself projects. Specially designed drills are also used in medicine, space
missions and other applications. Drills are available with a wide variety of
Network Equipments
data across each connection. Most hubs can detect basic network errors
can be a security risk and cause bottlenecks. In the past network hubs
were popular because they were much cheaper than a switch and router,
but today most switches do not cost much more than a hub and are a
example besides the one given above is a USB hub, which allows dozens
hub.
receive, process and forward data to the destination device. Unlike less
multiple devices that need to receive it, rather than broadcasting the
The low cost and ubiquity of the Ethernet standard means that most
motherboard.
The two most common printer mechanisms are black and white laser
printers used for common documents, and color inkjet printers which
type of cable or wire (some may be able to test different types of cables or wires).
The cable tester can test whether a cable or wire is set up properly, connected to
the appropriate source points, and if the communication strength between the
source and destination is strong enough to serve its intended purpose. The picture
Network Materials
somewhat wider.
● Modular Box - Use to in a large building, usually place on the wall to connect
UTP cable is used not only for networking but also for the
traditional telephone.
● Fiber Optic Cable - An optical fiber cable is a cable containing one or more
have one large opening rather than individual openings for each
finger are sometimes called gauntlets. Gloves which cover the entire hand or fist but do
not have separate finger openings or sheaths are called mittens. Mittens are warmer than
gloves made of the same material because fingers maintain their warmth better when
they are in contact with each other. Reduced surface area reduces heat loss.
Self-Check 2.1-4
Identification:
2. A tool designed to remove the protective covering off of a cable to expose the
inner wires.
3. Is a device or unit featuring a number of jacks, usually of the same or similar type,
for the use of connecting and routing circuits for monitoring, interconnecting, and
network, by using packet switching to receive, process and forward data to the
destination device.
6. Is a device that is used to test the strength and connectivity of a particular type
9. Is used not only for networking but also for the traditional telephone.
10. Is protective gear for the eyes, which comes in many types depending upon
Answer-Key 2.1-4
1. Crimping Tool
2. Wire Stripper
3. Patch Panel
4. Network Switch
5. Wireless Router
6. Lan/Cable Tester
7. Raceways
8. RJ 45
9. UTP Cable
Learning Objectives:
Installing cable is one of the most critical part of this module because this can
affect other module so it should be done properly to avoid problems during configuration
of the network.
● Network Cables - Networking cables are used to connect one network device to
scanner etc. Different types of network cables like Coaxial cable, Optical fiber
topology, protocol and size. The devices can be separated by a few meters (e.g. via
Internet).
● Unshielded Twisted Pair - Unshielded Twisted Pair cable is most certainly by far
the most popular cable around the world. UTP cable is used not only for
● CAT1
● CAT2
- Token Ring
● CAT3
● CAT4
- Token Ring
● CAT5
- Ethernet (10Mbps)
● CAT5e
- Gigabit Ethernet
● CAT6
- Gigabit Ethernet
● - The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the
TIA/EIA 568-B standard in 2002 and has been updated since. Both standards
define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable
and RJ-45 connectors for Ethernet connectivity. The standards and pin-out
specification appear to be related and interchangeable, but are not the same and
● Both the T-568A and the T-568B standard Straight-Through cables are used
most often as patch cords for your Ethernet connections. If you require a cable to
connect two Ethernet devices directly together without a hub or when you
connect two hubs together, you will need to use a Crossover cable instead.
one end using the T-568A standard and the other end using the T- 568B
standard. Another way of remembering the color coding is to simply switch the
Green set of wires in place with the Orange set of wires. Specifically, switch the
solid Green (G) with the solid Orange, and switch the green/white with the
orange/white.
● Pull the cable off the reel to the desired length and cut. If you are pulling cables
through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The
total length of wire segments between a PC and a hub or between two PC’s
cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for
10BASE-T.
● Start on one end and strip the cable jacket off (about 1″) using a stripper or a knife.
Be extra careful not to nick the wires, otherwise you will need to start over.
● Spread, untwist the pairs, and arrange the wires in the order of the desired cable
end. Flatten the end between your thumb and forefinger. Trim the ends of the
wires so they are even with one another, leaving only 1/2″ in wire length. If it is
longer than 1/2″ it will be out-of-spec and susceptible to crosstalk. Flatten and
● Hold the RJ-45 plug with the clip facing down or away from you. Push the wires
firmly into the plug. Inspect each wire is flat even at the front of the plug. Check
the order of the wires. Double check again. Check that the jacket is fitted right
against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45
● Check the color orientation, check that the crimped connection is not about to
come apart, and check to see if the wires are flat against the front of the plug. If
even one of these are incorrect, you will have to start over. Test the Ethernet
cable.
● A crossover has one end with the Orange set of wires switched with the Green set.
● Odd numbered pins are always striped, even numbered pins are always solid
colored.
● Looking at the RJ-45 with the clip facing away from you, Brown is always on the
● No more than 1/2″ of the Ethernet cable should be untwisted otherwise it will be
susceptible to crosstalk.
● Do not deform, do not bend, do not stretch, do not staple, do not run parallel with
power cables, and do not run Ethernet cables near noise inducing components.
Basic Theory:
crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected
to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see
that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either
standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or
required in 100BASE-TX as well. So why bother using these wires, well for one thing its
simply easier to make a connection with all the wires grouped together. Otherwise you’ll
be spending time trying to fit those tiny little wires into each of the corresponding holes
bandwidth on a home network, and paranoia about wireless security, you may want to use
a hard wired solution for home networking. Having a wired network at home allows you to
have a private, high-speed network for internet access, file sharing, media streaming,
There are certain design considerations that need to be addressed based on your needs.
Tools
Crimping Tool
Wire Stripper
Equipments
Patch panel
Network Switch/Hub
Wireless Router
Manage Switch
Materials
Raceways
Modular Box
There are a number of ways to do this. You can estimate, measure from floor plans, run
one, etc.
a. Remove the cable sheath 2.54 cm (1 inch) from the end of the cable.
a. Position wires in the proper channels on the RJ-45 jack maintaining the
twists as close to the jack as possible. The diagram that follows shows an example
b. Most jacks have the channels color-coded to indicate where the wires go. The
following photo of the jack shows one model. Jacks are typically stamped to
tool so that it faces the outside of the jack. If this is not done,
it will cut the wire being punched. Try tilting the handle of the
b. If any wire remains attached after using the punch tool, simply twist the ends
gently to remove them. Then place the clips on the jack, and tighten them. Make sure that
no more than 1.27 cm (one half inch) of untwisted wire is between the end of the cable
c. Snap the jack into the faceplate by pushing it from the back side. Make sure when
this is done, that the jack is right-side up so the clip faces down when the wall plate is
mounted.
d. Use the screws to attach the faceplate to either the box or to the bracket. If there
is a surface mounted box, keep in mind that it might hold 30-60 cm (1-2 feet) of excess
cable. Then it will be necessary to either slide the cable through the tie-wraps, or pull back
the raceway that covers it, in order to push the excess cable back into the wall. If there is
a flush-mounted jack, all that is needed is to push the excess cable back into the wall.
a. On the opposite end of the cabling, remove the jacket 2.54 cm (1 inch) from the
cable.
b. Lay the wires down in the patch panel so that the colors of the wires correspond
exactly to the colors indicated on the pin locations in the same manner as the data jack
c. Keep the sheath within .64 cm (¼ inch) of where the wires begin branching out to
d. Do not untwist the wires more than necessary to lay them down at the pin
locations. A good way to keep from untwisting too much is to hold down the wires next to
the patch panel with one finger while using the other hand to pull apart each end as you
e. The following figure shows a large punch down patch panel with carefully routed
cabling.
a. Obtain two straight-through Ethernet patch cables and verify they both function
b. Connect one end of one of the straight-through Ethernet patch cables to the data
jack outlet and one end of the other straight-through cable to the jack at the patch panel.
c. Insert the opposite ends of the two cables into a simple cable tester and check for
continuity from end to end through both patch cables, the data jack, and the patch panel.
a. Make sure the stripper is adjusted properly on a scrap piece of cable. The Stripper
should be adjusted to only score the jacket to make removing it easier and not nick the
twisted pairs.
b. Straighten the pairs out completely and lay them over the top of the keystone jack
noting the color pattern for the 568b wiring. Note: Each keystone jack is slightly different
in how they are labeled and how the colors are arranged. The 568B standard is most
commonly used and ends of the cable must have the same standards to communicate.
We have the 3 most common keystone jack styles pictured here. The first jack pictured
has the 2 standard pairs on the right, and the 2 variable pairs on the left. The A standard is
the center column and the B standard is on the left. Both A and B standard applies to the
right side of the jack. The solid color box with the lower right corner missing represents
the solid color wire with the white stripe. The white box with the colored tip represents
the white wire with the colored stripe. The second jack pictured here has both A and B
standards on both sides of the jack, with the color code running down the center. The
solid color rectangle represents the solid color wire with the white stripe, wile the half
white half color rectangle represents the white wire with the colored stripe. The third jack
pictured here has the A and B standard codes labeled on the outside of the jack. With the
A standard on top and the B standard on the bottom. The solid box represents the solid
wire with the white stripe Wile the box with the white diagonal stripe going throught the
c. Keeping the pairs as twisted as possible press the wire into the correct groove
with your thumbs. If you completely straighten the wires to run them through the jack you
d. Using a punch down tool punch the wires down into the blades built into the
keystone jack. The blades in the jack are designed to work with solid cable, and may not
work with stranded cable. Make sure the blade (as noted in the picture) is facing the
outside of the keystone jack. If you reverse it you will cut the wires inside the keystone
jack rendering them useless. The punch down tool should cut off the remaining pieces of
the wire on the outside, but sometimes you may need to punch them down
a 2nd time and wiggle the wire to it breaks clean off. Once this is done you can install the
dust covers if your keystone jack comes with them. This keystone jack did not have the
covers. The covers should never be used to do the job of the punch down tool.
a. Connect Network Switch/Hub to the patch panel using cross-over cable base on
b. Connect the Wireles Router to the Network hub & to the Modem using cross-over
Task-Sheet CO2.1-5
Steps/Procedure:
1. Make sure to follow the proper way of cutting & crimping cables.
2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment, materials & protective equipments you will use.
4. Crimp straight-through & crossover cable.
5. Test your cable if they are working properly.
Assessment Method:
● Demonstration
● Interview
1. Make sure to follow the proper way of cutting & crimping cables.
3. Prepare all tools, equipment, materials & protective equipments you will use.
Job-Sheet CO2.1-5
Performance Objective: Given (tools, equipment & materials), you should be able to
(Install Cable in the Patch Panel, Modular box and connect to the other network
equipments) following (the steps written in the information sheet CO2.1-6).
Tools & Equipment : Crimping Tools, Wire stripper & Cable/Lan Tester, Electric Hand Drill,
Patch panel, Network Switch/Hub, Wireless Router, Wireless Access point, Manage
Switch.
Steps/Procedure:
• Demonstration
• Interview
“Waste Management”
Learning Objectives:
It has been more than four years since the National Electrical Code, in its 2002
edition, first required the removal of abandoned cable. That requirement, which is law
wherever the 2002 NEC or the portions of it relating to abandoned cable have been
adopted, kicks in whenever a cabling project of any type takes place. Chief among the
coincidence that the document requiring its removal is published by the National Fire
contractors specializing in, or limiting their practice exclusively to, removing abandoned
cable from buildings. Soon (or perhaps even today), it may be inappropriate to call it a
cottage industry, as signs point to cable removal becoming a mainstream practice. The
ground first shook on that concept in May 2005 when DuPont launched its Abandoned
owners with a written report. Building owners then have the option to have the cable
noted industry figure, Frank Bisbee, CPC is one of several cabling design and installation
contractors that have turned at least some of their attention to abating abandoned cable.
and removal. The guide is meant to act as an aid to project specifies and designers, and
provides a template by which those professionals can dictate that abandoned cable be
identified and removed. The specifications are written in accordance with the 2004
In addition to the guide covering abandoned cable assessment and removal, DuPont
cable and for recycling removed abandoned cable. DuPont and some cable
years. But the notion of recycling communications cable that has been removed from
buildings is a newer concept-one that DuPont incorporated into its Abandoned Cable
If abandoned cable removal services can be called a “cottage industry,” then the
recycling of such cable might be described as “fledgling,” because by and large, it is a new
enterprise that has not yet taken firm hold. Among several contributing factors, CPC’s
Bisbee emphasizes that labor is a significant hurdle. “The process of separating the
removed abandoned cables to get them into the recycle stream can be more costly than
What's in there?
Those contractors that have been recycling cable, and did so even before the
2002 NEC edict about abandoned cable removal, have not necessarily followed strict
procedures preparing that cable for recycling. While nobody would go on record
admitting the following practice, many in the industry have heard about or perhaps even
witnessed a batch of old cable being thrown into a large barrel and burned down to its
copper-the component most often recycled. Considering the chemicals that make up a
friendly.
Additionally, the fluoropolymers that insulate the copper conductors in a plenum- rated
twisted-pair cable do not burn easily (that’s exactly the point of a plenum cable). Stripping
those cables down to their bare copper is, as Bisbee referred to, a labor-intensive
This author also could not find a recycler willing to go on record describing in detail the
process by which an unshielded twisted-pair cable is broken down and prepared for
recycling. The closest thing to a description was, “The separation and recovery processes
are proprietary; however, the processes used are mechanical in nature and do not require
any chemicals.”
In a big-picture view, cable that is removed from a building and intended for the recycling
stream are separated into several groups, including communications cable containing
copper, communications cable containing optical fiber, and electrical cables. Other pieces
of hardware, including racks, trays, and blocks, also must be dealt with separately from
Once separated, the cables get put into some type of temporary storage. Depending on
how much cable is involved and the time frame in which it will be removed, it may be
stored in a dumpster placed on site exclusively for cable; or, for smaller projects, it may
transporting the cable to the recycling facility. DuPont notes that it can provide
dumpsters to larger job sites for cable that will be recycled through its program.
Once the cable reaches the recycling facility, the sites employ their proprietary processes
to break down the cable. Says one recycler that is part of DuPont’s program, “After
abandoned cable is removed from a building, fiber-optic, electrical cables, and related
hardware are separated from the low-voltage communication cable, which is then
recycled. First, the metal is separated from the non-metal components. Then the non-
metal components-primarily
As far as what happens to each part of a cable, the recycler states, “Usually all the parts of
an unshielded twisted-pair cable can be recycled except polyester wraps or draw strings.
Each of the components is separated by material type. The copper is sent to a copper
refining company, the PVC and polyethylene are sold to secondary converters for a
variety of applications, and the fluoropolymer is cleaned and extruded into pellets for
secondary applications and sold by DuPont in the wire and cable industry.”
Some cable types can present significant challenges to a recycler. Specifically, coaxial
and shielded twisted-pair cable may contain tin-plated copper as a shielding element.
That material is not worth as much as pure copper and is hard to segregate from pure
copper. Additionally, wrapped shields can vary greatly from heavy foils to metalized
polyester. They also pose segregation challenges, which diminish their value.
Taking an interest
interest in reclaiming these materials; it stands to reason the company will make
introduced its new specification guides, Robert Kenny, global business manager of
DuPont Cabling Solutions, stated, “DuPont is committed to making it easier for building
recycling, and to follow best practice recommendations for fire safety on an ongoing
basis.”
But will recycling take hold across the board on cable-removal projects? The
current price of copper suggests there is some chance contractors will find it worthwhile
to recycle cable for that element alone. Copper is the cable component most in demand
today.
Another significant aspect of cable removal and recycling is the fact that many
cables in buildings today contain hazardous substances, particularly lead. The recently
remove lead from its products. California legislation set to go into effect on January 1
contains restrictions similar to that of RoHS. So, by and large, lead and other dangerous
materials have been eliminated from products now reaching the marketplace. But the
entire issue of abandoned cable focuses on products that were manufactured years and
in some cases decades ago, and almost certainly contain hazardous materials.
Bisbee, outspoken about the use of heavy metals and other hazardous materials in
cabling products, comments that while over-the-counter swipe kits can be helpful in
determining the presence of high quantities of lead, a lower and still-dangerous lead level
may not show up on such a test. The Environmental Protection Agency also has
cautioned that tests of these types are not accurate enough to distinguish between high
and low levels. Impossible to verify or quantify without third-party testing, the presence
of lead dust in abandoned cabling systems looms as a possible threat and, at this point, an
unknown.
aimed at household electronics users and not commercial users, it provides a blueprint
that puts the onus for waste-electronics collection and recycling on the manufacturers of
the equipment.
Meanwhile, in the United States, building owners face the task of having unused
cable removed. And where it goes once it leaves the building varies greatly from project
Self-Check 2.1-6
Multiple Choices:
a.) DuPont
c.) Fledgling
c.) Fledgling
a.) Copper
b.) Silver
c.) Aluminum
1. A
2. A
3. B
4. C
5. A
LEARNING EXPERIENCES
LEARNING OUTCOME 2
• Read Information Sheets CO2.2-1 In these Learning outcomes you should be able
• Check Performance Criteria Checklist The output of this Learning Outcome is the
CO2.2-1 following.
CO2.2-2
“Inspect & Diagnose Computer Network” Show your output to your trainer for his
Learning Objectives:
Windows 7, as with many of the different operating systems available, has a number of
straightforward, but the process is a bit different from Windows Vista and XP.
Let’s go through the steps now and configure a static IPv4 address in Windows 7.
The first thing that must be done is to gain access to the Network and Sharing
Center in Windows 7. This can be done in one of two ways; the first way to access it is via
Select the Windows 7 or on the bottom left-hand corner and select the control panel
There are several views which are available for the control panel; by default the
category view is used. When using the category view the option that you need to select is
The second way to gain access to the Network and Sharing Center is to utilize the
network icon which is displayed in the system tray when a network interface has been
enabled.
When this icon is right-clicked the option to open the Network and Sharing Center is
Once the Network and Sharing Center is open there is an option which allows the change
of adapter settings which is shown in the upper left hand corner of the window. This is
Once in the Network Connections window, an interface must be selected which is going
to be configured with the static IP address. In the following example, both a wired and
For the purposes of this article the wired interface will be used as the interface being
By right-clicking on the correct interface a sub-menu is shown; from this menu select the
properties option.
Once the properties option is selected the interface properties windows will be displayed.
This screen gives the option to configure a number of different network parameters.
Since we want to change the interface IPv4 IP address this option must be selected
from the window. Once this option is selected the properties button will be enabled; press
Once the properties button is pressed the IPv4 properties window is displayed which
shows that the interface is currently configured to obtain both its IP address and its DNS
In order to change to a static IP address the option to Use the following IP address must
be selected; once this is done the option to enter the IP address parameters is enabled
and the Use the following DNS server addresses option is selected.
For the purpose of this article the IP address 192.168.1.100 is used with a subnet mask of
255.255.255.0 and a default gateway of 192.168.1.1. The DNS server which will be
configured is 4.2.2.2.
These options are shown in their correct locations in the following figure:
Once these options have been entered on the screen simply press Ok on both property
A new option which was introduced with Windows 7 is HomeGroup. HomeGroup allows
Windows 7 machines to be linked in an easier way which makes the sharing of resources
between machines much simpler to setup. Each machine must become a member of a
The first thing that must be done on the first computer used is the creation of a
HomeGroup. This is done through the Choose HomeGroup and Sharing Options in the
Once this option is selected, the HomeGroup window is displayed. The first computer to
be configured with a HomeGroup will be given the option to Create a homegroup. Once a
HomeGroup is configured on a network it will actively broadcast its existence to the other
Once a HomeGroup has been created on a network, all other participating computers
must join it. In order to join the HomeGroup, the HomeGroup password shown in the
The following figure shows how the HomeGroup window will display when there is an
existing HomeGroup on the network. Once this is shown, simply press theJoin now button
and select the local shared options and enter the HomeGroup password.
Another feature which can be used with Windows 7 is network location. Everytime a new
network connection is established, a prompt will be given to select what type of location
the new network connection is. The three options are Home, Work and Public.
When using the Home location, network discovery and HomeGroup are enabled which
allows the easy networking of Windows machines. The Work location is similar to
the Home location but disables the use of the HomeGroup functionality. The Public
location is the most secure and disables the various sharing functionalities which are
The current location which is selected is shown in the Network and Sharing Center under
View your active networks and can be changed by selecting the current setting.
Once the setting is selected the Set Network Location window is opened which enables
the configuration of a different network location. This window is also the same window
Conclusion
There are a number of different advanced options which can be utilized with Windows 7;
this article shows how to configure some of the most used options.
Windows 7, as with newer operating systems, continues to make better help systems.
Take the time to utilize these systems and learn even more about Windows 7
functionality.
Changing this in XP was extremely simple, but in Windows 7, Windows 8, or Vista it’s
buried behind a few more menus. Here are three routes you can take to open up System
Properties:
• Open Control Panel, and go to System and Maintenance, and then System.
If you chose one of the last two options, then you’ll need to click on
Now you’ll finally be on the right screen, which should say System Properties.
Click on the “Change” button to rename the computer, which will pop up this dialog:
Now you can finally change the name of the computer. You could also change the name
of the workgroup to something more descriptive as well. You’ll have to reboot after you
To share items in your Public folder and its subfolders with other users of your computer,
you don’t need to do a thing. By default, all users with an account on your computer can
log on and create, view, modify, and delete files in the Public folders. The person who
creates a file in a Public folder (or copies an item to a Public folder) is the file’s Owner and
has Full Control access. All others who log on locally have Modify access. For more
To share items in your Public folder with network users, click the Start button ,
click Network, and then click Network and Sharing Center. Turn on Public Folder Sharing
(for information on how to do this, see sharing files with the Public folder). You can’t
select which network users get access, nor can you specify different access levels for
different users. Sharing via the Public folder is quick and easy—but it’s rigidly inflexible.
Whether you plan to share files and folders with other people who share your computer
or with those who connect to your computer over the network (or both), the process for
setting up shared resources is the same as long as the Sharing Wizard is enabled. We
recommend that you use the Sharing Wizard even if you normally disdain wizards. It’s
quick, easy, and almost certain to make all of the correct settings for network shares and
configured shares with the wizard, you can always dive in and make changes manually if
you want.
To make sure the Sharing Wizard is enabled, click the Start button , type “folder” in the
Search box, and then click Folder Options. Click the View tab. In the Advanced
settings box, scroll down the list and make sure the Use Sharing Wizard (Recommended)
The process for setting up shared resources is the same as long as the
With the Sharing Wizard at the ready, follow these steps to share files or folders:
1. In Windows Explorer, select the folders or files you want to share. (You can select
multiple objects.)
2. In the Command bar, click Share. (Alternatively, right-click, and then click Share.)
3. With the Sharing Wizard, it’s quick and easy to share files or folders with other
people
4. In the file sharing box, enter the name of the user with whom you want to share
files or folders, and then click Add. You can type a name in the box or click the arrow to
display a list of available names. Repeat for each person you want to add.
The list includes all of the users who have an account on your computer, plus everyone. If
you want to grant access to someone who doesn’t appear in the list, you need to create a
user account for that person (for information on how to do this, see Create a user
account).
Note:
If you select everyone, and you have password-protected sharing enabled, the user must
still have a valid account on your computer. However, if you have turned off password-
protected sharing, network users can gain access only if you grant permission to
everyone or to Guest.
• Reader Users with this permission level can view shared files and run shared
programs, but cannot change or delete files. Selecting . Reader in the Sharing Wizard is
• Contributor This permission level, which is available only for shared folders (not
shared files), allows the user to view all files, add files, and change or delete files that the
• Co-owner Users who are assigned the Co-owner permission have the same
privileges that you do as the Owner: They can view, change, add, and delete files in a
shared folder. Selecting . Co-owner sets NTFS permissions to Full Control for this user.
Note:
You might see other permission levels if you return to the Sharing Wizard after you set up
sharing. The Custom permission level identifies NTFS permissions other than Read &
Execute, Modify, and Full Control. The Mixed permission level appears if you select
multiple items, and those items have different sharing settings. Owner, of course,
5. Click Share. After a few moments, the wizard displays a page similar to the page
The Sharing Wizard displays the network path for each item you’ve shared
6. In the final step of the wizard, you can do any of the following:
• Send an e-mail message to the people with whom you’re sharing. The message
With the Sharing Wizard, you can send a message that includes a link to the item you
want to share
• Copy the network path to the Clipboard. This is handy if you want to send a link via
• Open a search folder that shows all of the folders or files you’re sharing.
Creating a share requires privilege elevation. But, after a folder has been shared, the
shared folder is available to network users no matter who is logged on to your computer
Confusingly, when you share one of your profile folders (or any other subfolder of
%SystemDrive%\Users), Windows Vista creates a network share for the Users folder—
not for the folder you shared. This isn’t a security problem; NTFS permissions prevent
network users from seeing any folders or files except the ones you explicitly share. But it
For example, if you share the My Received Files subfolder of Documents (as shown after
My Received Files. If this same folder had been anywhere on your computer outside of
the Users folder, no matter how deeply nested, the network path would instead be \\
CARL-PC\My Received Files. Other people to whom you’ve granted access wouldn’t
need to click through a series of folders to find the files in the intended target folder.
Network users, of course, can map a network drive or save a shortcut to your target
folder to avoid this problem. But you can work around it from the sharing side, too: Use
advanced sharing to share the folder directly. (Do this after you’ve used the Sharing
Note:
Make sure the share name you create doesn’t have spaces. Eliminating spaces makes it
If you want to stop sharing a particular shared file or folder, select it in Windows Explorer,
and then click Share. The Sharing Wizard appears, as shown in the following illustration.
file or folder
If you click Change sharing permissions, the wizard continues as when you created the
share, except that all existing permissions are shown. You can add or remove names and
change permissions.
The Stop sharing option removes access control entries that are not inherited. In
addition, the network share is removed; the folder will no longer be visible in another
If you disable the Sharing Wizard, Windows Vista reverts to a process similar to that
Simple File Sharing—nothing before or after is similar to that). Without the Sharing
Wizard, you configure network shares independently of NTFS permissions. (For more
information about this distinction, see How share permissions and NTFS permissions
With the Sharing Wizard disabled, when you select a folder, and then click Share, rather
than the wizard appearing, Windows opens the folder’s properties dialog box and displays
the Sharing tab, as shown in the next illustration. Even with the Sharing Wizard enabled,
you can get to the same place; right-click the folder, and then choose Properties.
Note:
The Sharing tab is part of the properties dialog box for a folder, but not for files. Also,
when the Sharing Wizard is disabled, the Share button appears on the Command bar only
when you select a single folder. Only the Sharing Wizard is capable of making share
The Share button summons the Sharing Wizard, but it’s available only when the Sharing
Wizard is enabled
To create or modify a network share using advanced settings, follow these steps:
Note:
If the folder is already shared, and you want to add another share name (perhaps with
different permissions), click Add, and then type the name for the new share. The share
name is the name that other users will see in their own Network folders. Windows initially
proposes to use the folder’s name as its share name. That’s usually a good choice, but
you’re not obligated to accept it. If you already have a shared folder with that name, you’ll
4. Type a description of the folder’s contents in the Comments box. Other users will
see this description when they inspect the folder’s properties dialog box in their Network
5. To limit the number of users who can connect to the shared folder concurrently,
specify a number in the Limit the number of simultaneous users to box. Windows Vista
permits up to 10 concurrent users. (If you need to share a folder with more than 10 users
6. Click Permissions.
The default share permission associated with a new share is Read access to everyone.
Caution:
When you share a folder, you also make that folder’s subfolders available on the network.
If the access permissions you set for the folder aren’t appropriate for any of its
7. In the Group or user names box, select the name of the user or group you want to
manage. The share permissions for the selected user or group appear in the permissions
box.
• Full Control Allows users to create, read, write, rename, and delete files in the
folder and its subfolders. In addition, users can change permissions and take ownership
• Change Allows users to read, write, rename, and delete files in the folder and its
• Read Allows users to read files but not write to them or delete them. If you select
neither . allow nor Deny, it is still possible that the user or group can inherit the
permission through membership in another group that has the permission. If the user or
group doesn’t belong to another such group, the user or group is implicitly denied
permission.
Note:
To remove a name from the Group or user names box, select the name, and then click
Remove. To add a name to the list, click Add. Enter the names of the users and groups
but it’s important to recognize that these are two separate levels of access control. Only
connections that successfully pass through both gates are granted access.
not affect users who log on locally. You set share permissions in the Advanced Sharing
dialog box, which you access from the Sharing tab of a folder’s properties dialog box.
NTFS permissions apply to folders and files on an NTFS-formatted drive. They provide
extremely granular control over an object. For each user to whom you want to grant
access, you can specify exactly what they’re allowed to do: run programs, view folder
contents, create new files, change existing files, and so on. You set NTFS permissions on
the Security tab of the properties dialog box for a folder or file.
It’s important to recognize that the two types of permissions are combined in the most
restrictive way. If, for example, a user is granted Read permission on the network share, it
doesn’t matter whether or not the account has Full Control NTFS permissions on the
same folder; the user gets only Read access when connecting over the network.
In effect, the two sets of permissions act in tandem as gatekeepers that winnow out
incoming network connections. An account that attempts to connect over the network
is examined first by the share permissions gatekeeper. The account is either bounced
out on its caboodle or allowed to enter with certain permissions. It’s then confronted by
the NTFS permissions gatekeeper, which might strip away (but not add to) some or all of
In determining the effective permission for a particular account, you must also consider
member of one or more groups is granted all of the permissions that are granted
explicitly to the account as well as all of the permissions that are granted to each group of
which it’s a member. The only exception to this rule is Deny permissions, which take
Task-Sheet CO2.2-1
(configure network and share files) following (network configuration and sharing
steps).
Steps/Procedure:
3. Configure HOMEGROUP.
Assessment Method:
• Demonstration
• Interview
Learning Objectives:
When a user experiences a networking problem, NDF provides the ability to diagnose and
repair it by presenting the person with diagnostic assessments and resolution steps. NDF
simplifies and automates many of the common troubleshooting steps and solution
You can easily launch network troubleshooting by right-clicking on the network icon in
the notification area of the Windows 7 desktop and selecting Troubleshoot problems.
Windows Network Diagnostics will launch and attempt to detect and correct what’s
wrong.
With Windows 7, you don’t have to wait for an error to occur to use the built-in
diagnostics. You can launch a troubleshooting session anytime from the new
Troubleshooting item in Control Panel. When you do, the screen shown in Figure 1
appears. In this case, the tool has found that the computer has no Internet connection.
The page displays a boxed message that informs you of the problem and offers a Try to
Figure 1 Opening the Troubleshooting item in Control Panel produces this screen.
If you click on the Network and Internet selection, you’ll get the dialog box shown in
Figure 2. There you can choose from seven options that start sessions for
Choosing any of the seven options launches a wizard that steps you through diagnosis of
the problem, and if possible, automated or manual correction. The troubleshooter also
records an Event Tracing Log (ETL). If the problem can’t be resolved, you can examine
and even forward the log. Just click on View History from the Troubleshooting dialog.
To view the details of the detection, click the Detection details link, and you’ll see a
Near the top of the dialog, you’ll see the name of the ETL file that contains the
information from the troubleshooting session. If you want to send a copy to support staff
or Microsoft for analysis, you can save the file by clicking on its name, which will bring up
You can view and analyze ETL files with Network Monitor 3.3. You can also view the files
with Event Viewer and the Tracerpt.exe tool as well as by converting them to XML or text
files with the netsh trace convert command. You can save the details of the
History window and then selecting Save As. Just as with ETL files, you can send the CAB
Windows 7 includes a new Netsh.exe context, netsh trace, for network tracing.
Commands in the netsh trace context allow you to selectively enable tracing for
protocol stack, such as Winsock, TCP/IP, wireless LAN services, or NDIS. A tracing
scenario is a predefined collection of providers for a specific function, such as file sharing
or wireless LAN access. To exclude irrelevant details and reduce the size of the ETL file
your helpdesk staff or Microsoft’s Customer Service and Support organization with both
internal component tracing information and a capture of the network traffic at the time of
the problem. Prior to Windows 7, you had to carry out two different procedures to obtain
this information: Use Netsh.exe commands to enable and disable tracing and a packet-
sniffer program, such as Network Monitor to capture the network traffic. And then you
faced the difficult task of tying together the information from these two sources to
determine when network traffic was sent relative to the events in the tracing logs.
In Windows 7, when you perform network tracing with commands in the netsh trace
context, ETL files can contain both network traffic and component tracing in sequence.
And you can display the ETL files with Network Monitor 3.3, which provides much more
Figure 6 Using Network Monitor 3.3 to view the network traffic recorded in an ETL file.
With this new capability, capturing network traffic requires neither end users nor
helpdesk staff to install and use Network Monitor on the computer having the problem.
Note that by default the ETL files generated for troubleshooting sessions from
To capture both tracing and network traffic information sequentially for multiple
components in the network stack (such as Winsock, DNS, TCP, NDIS, WFP and so forth),
the tracing and traffic information in the ETL file. Grouping within the ETL file allows you
For more information about the Netsh.exe commands for a tracing session, see the
When you enable tracing with Netsh.exe, Windows 7 can create two files. An ETL file
contains trace events for Windows components, and if specified, network traffic. By
default, the ETL file is named Nettrace.etl and stored in the %TEMP%\NetTraces
folder. You can specify a different name and storage location with the trace file=
parameter. An optional CAB file can contain several types of files including text, Windows
Registry, XML and others that store additional troubleshooting information. The CAB file
also includes a copy of the ETL file. By default, the CAB file is named Nettrace.cab and
You can also use Netsh.exe tracing in conjunction with Control Panel | Troubleshooting.
First, use the appropriate Netsh.exe command to enable tracing for the scenario. For
example, use the netsh trace scenario=internetclient report=yes command. Use Control
When complete, run the netsh trace stop command. Now, when you view the history of
To start a network trace with Netsh.exe, first run an elevated command prompt. To
display the list of trace providers, type netsh trace show providers. To produce the list of
trace scenarios, type netsh trace show scenarios. To show the list of trace providers
You can start a trace for one or multiple providers or scenarios. For example, to do so for
To start tracing for more than one scenario, you can specify all of the appropriate
scenarios, such as netsh trace start scenario=File Sharing scenario=Direct Access. You
can create a CAB file with a formatted report by including the report=yes parameter. Use
trace file=parameter to specify a name and location for the ETL and CAB files. If you
want to record network traffic in the ETL file, include the capture=yes parameter.
For example, here’s the command that will start a trace for the WLAN scenario, create a
CAB file with a formatted report, capture network traffic, and store the files with the
name WLAN Test in the C:\Tshoot folder: netsh trace start scenario=WLAN capture=yes
For more information, see Netsh Commands for Network Trace in Windows Server 2008
R2.
Before Network Monitor 3.3 can fully display the ETL files generated by Windows 7, you
3.3 uses stub Windows parsers. To configure full Windows parsers, click Tools | Options |
Parsers. In the list of parsers, click Windows | Stubs to disable stub parsers and enable full
Job-Sheet CO2.2-2
Steps/Procedure:
Assessment Method:
• Demonstration
• Interview
CONTENTS:
ASSESSMENT CRITERIA:
1. Client Device systems settings are configured in accordance with manufacturers’ instructions and
end user preferences.
2. Local area network (LAN) port is configured in accordance with manufacturers’ instructions and
network design.
3. Wide area network (WAN) port is configured in accordance with manufacturers’ instructions and
network design.
4. Wireless settings are configured in accordance manufacturers’ instructions, network design and
end-user preferences.
5. Security/Firewall/Advance settings are configured in accordance with manufacturers’ instructions
and end user preferences.
CONDITION:
Student/ trainee must be provided with the following:
● Protective eyewear
● Digital multi-meter
● Wire stripper with bolt cutter
● Pliers (assorted)
● Screw drivers (assorted)
● LAN Tester
● Crimping tools Crimping tools
● Laptop
● Desktop
● Network storage
● Network storage
● Network printer
● Wireless Router
● Switch or Hub
ASSESSMENT METHOD:
1. Demonstration
2. Interview
Your wireless router has a variety of useful options you can configure. These are
practically hidden you wouldn’t know these features exist unless you were digging
through your router’s configuration pages. Bear in mind that different routers have
different options. You may not have all the options listed here on your own router. The
options will also be in different places with different names.
Click the Details button to view more information about the connection.
Look for the IPv4 Default Gateway IP address in the details window. Plug this IP
address into your web browser’s address bar.
You’ll need to log in with your username and password combination. If you don’t
know these, your router is probably using its default combination — check your router’s
manual or perform a web search for its model number and “default password.” If you’ve
previously changed the password and can’t remember it, you can reset your router’s
password to the default. Once you’ve logged in, you can now browser your router’s
configuration pages and configure its settings.
as dictated in the instructions for the router model) to restore factory defaults
and try again.
Open the Wireless Settings. When you log in to your router, you will be taken to the
router’s main menu or status screen. There will be several options to choose from. The
Internet section can usually be left at default settings, unless Page 100 of 118 you
received specific instructions from your internet service provider. The Wireless section
will allow you to set up your wireless network.
In the Wireless section, you should see a field labeled SSID or Name. Enter a
unique name for your wireless network. This is what other devices will see when
scanning for networks.
Check the box to enable SSID broadcast. This will essentially “turn on” the wireless
network so that it may be readily seen by anyone in range of the signal. *See the Tips
section below for additional information on the SSID setting.
Choose a security method. Choose from the list of available security options. For the
best security, choose WPA2-PSK as the encryption method. This is the most difficult
security to crack, and will give you the most protection from hackers and intruders.
letters, numbers, and symbols. Don’t use any passwords that could be easily deduced
from your network name or from knowing you.
Save your settings. Once you are finished naming and securing your wireless
network, click the Apply or Save button. The changes will be applied to your router,
which may take a few moments. Once the router has finished resetting, your wireless
network will be enabled.
CRITERIA YES NO
Did you……..
1. Make sure that you’re working area is ready.
4. Change SSID.
What is an IP Address?
Let’s take an example: suppose you want to send an email to your friend. Though
your email may be broken down into millions of data packets before it’s transmitted,
right now for simplicity’s sake consider it a single information packet. The IP addresses
are embedded on each packet that is transmitted over the network and are used to
identify the machine.
Note: It’s totally possible for your computer to have two IP addresses at the same
time. One may be for the Internet and another one for the local area network.
These IP addresses are further divided into two main types: Static and Dynamic
IP address. Let’s have a good look at both for better understanding.
Static IP Address
As the name speaks, the static IP addresses are those types of IP address that
never change once they are assigned to a device on a network. No doubt this type of
addressing is cost effective but could have a high security risk. Static IP addresses are
mostly used by web, email and gaming servers who don’t care much about hiding their
locations.
Dynamic IP Address
On the other hand, a Dynamic IP address changes each time the device logs in to
a network. This kind of IP address is very tough to trace and are thus used by companies
and business firms. You must be thinking as to who or what allocates this Dynamic IP
address every time the device logs in. Well, these IP address are assigned using DHCP
(Dynamic Host Configuration Protocol). Talking about DHCP in detail is beyond the
scope of this article and we will take it up in a future post.
LAN (Local Area Network) card will automatically install when you setup windows
7. LAN connection is required when you want to share your pc with others in your Home
Group. Supposes you have two Laptop/Pc and you want to connect them for some
purpose say playing multiplayer games (Cod 1, Cod 2, Cod4, Cod5 etc.) or to access
another Pc, just setup Local Area Connection. You can also connect your Pc to your
friends Pc no meter how far the distance, connect them with cable connection.
12.Now setup your IP. Right click on Local Area Connection go to properties.
13. Double click Internet protocol version 4 (TCP/IPv4) Or click properties
14. Click Use the following IP address
15. IP address: Give your IP address
16. Subnet mask: Just press tab it will automatically generate (Default255.255.255.0)
17.Click use the following DNS server address.
18. Click ok.
TCP/IP is in most companies now the standard protocol, especially when multiple
locations (Offices and/or factories) are connected via a Wide-AreaNetwork (WAN).
In the headquarter, there will be most probably some servers, which need to be
Page 110 of 118 accessed from Remote offices and/ or factories (like a mail-server
and/or a company internal web server) and/or a main-frame or mini-computer, running a
common accounting system or an Enterprise Resource Planning System ( ERP ), which
usually are accessed from the client-computers via TCP/IP.
The head quarter could be connected via fixed lines (provided by WAN providers)
to the remote offices and/ or factories. Once the routers are setup properly by the WAN
provider, you as a user will not need to worry about the WAN; you have access to the
servers and main-frame, as long as in all locations the systems are properly configured
for the router/Gateway.
In this example, you would need to define in the remote location the Gateway (=
Router) address, either manually or using DHCP when IP-addresses are obtained
automatically (for example from a DHCP-service on an NT4-server) Just verify the
values using ipconfig on windows 7.
Test the connection from the remote location to the headquarter by making the
PING test to the systems located in the headquarter.
For File-Access to an NT-server in the head quarter via the WAN, you will either
to setup a WINS server or use LMHOSTS.
But there is also a special item to watch out for in the remote location when connecting
via a modem and a dial-up connection to the Internet.
Once you connect to the Internet, you will lose the connection via the WAN to all
the systems in the Headquarter, you will not be able to PING them. What Happened?
Use in the START-menu the RUN-command to start "ipconfig" and check your IP-
values of the dial-up connection (via the modem) to the Internet, which is the "PPP
Adapter": Usually, you get an additional Gateway address assigned to you for the
Internet connection. All network traffic, also for the internal communications, will now be
send to the Internet gateway!
While you are connected, you have now a configuration with multiple
routers/gateways, and you will have to give Windows a "helping hand" to tell it, which
router/gateway to be used for Internet network traffic and which one for company
internal network traffic: you need to use the "ROUTE" command to inform Windows,
which gateway to use to access the systems in the headquarter (more details on ROUTE
in the next section below):
Your system knows now to use the gateway address at 192.168.1.1 for internal
communication with the Headquarter, while all other communications will use the
gateway defined by the Internet connection.
1) Define one of them as the Default gateway (usually the Internet Gateway) and
program this gateway to pass any network traffic for the headquarter on to the WAN
router/gateway. But very often, you as a user or even network administrator do not have
access to the internal routing tables of your router, requiring you to use the 2nd
possibility.
2) Define the gateway with the widest range of IP-addresses (usually the Internet
Gateway) as your Default gateway and then program your own system to send all other
network traffic (for internal communication) to the WAN router by using the "ROUTE" -
command:
We need to use the "ROUTE ADD" command to program the system to send all
network traffic for the address range 192.168.2.0 (applying the subnet-mask of
255.255.255.0) to the gateway/ router at 192.168.1.1
CRITERIA YES NO
Did you……..
1. Make sure that you’re working area is ready.
A wireless network is any type of computer network that uses wireless data
connections for connecting network nodes.
Wireless networking is a method by which homes, telecommunications networks and
enterprise (business) installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations. Wireless
telecommunications networks are generally implemented and administered using radio
communication. This implementation takes place at the physical level (layer) of the OSI
model network structure.
Examples of wireless networks include cell phone networks, Wi-Fi local networks
and terrestrial microwave networks.
Wireless Devices
- Wireless Router
- Wireless Accesspoint
- Wireless Network Adapter