You are on page 1of 130

Republic of the Philippines

Technical Education and Skills Development Authority


Philippine International Technological School
Jose Abad Santos St., Digos City

Competency – Based Learning Materials


Computer Hardware Servicing NC II

Unit of Competency : Configure Computer Systems and Networks


Module Title : Configuring Computer Systems and Networks
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

TABLE OF CONTENTS
Page
Table of content ...........................................1
How to use CBLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Introduction ...........................................3
Technical Terms ...........................................4
Learning Outcome 1: Plan and prepare for configuration . . . . . . . . 5
• Learning Experience / Activities ......................... 6
• Information Sheet 1.1 ......................... 7
• Information Sheet 1.2 . . . . . . . . . . . . . . . . . . . . . . . . . 10
• Self-Check 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . 12
• Activity Sheet 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . 13
Learning Outcome 2: Configure computer systems and networks. 14
• Learning Experience / Activities . . . . . . . . . . . . . . . . . . . . . . . . . 15
• Operation Sheet 2.1 . . . . . . . . . . . . . . . . . . . . . . . . . 16
• Operation Sheet 2.2 . . . . . . . . . . . . . . . . . . . . . . . . . 55
• Operation Sheet 2.3 . . . . . . . . . . . . . . . . . . . . . . . . . 83
• Information Sheet 2.1 . . . . . . . . . . . . . . . . . . . . . . . . . 86
• Operation Sheet 2.4 . . . . . . . . . . . . . . . . . . . . . . . . . 109
• Self Check . . . . . . . . . . . . . . . . . . . . . . . . . 111
• Activity Sheet 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . 112
Learning Outcome 3: Inspect and test configured computer systems and
networks . . . . . . . . . . . . . . . . . . . . . . . . . 113
• Learning Experience / Activities . . . . . . . . . . . . . . . . . . . . . . . . . 114
• Operation Sheet 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . 115
• Operation Sheet 3.2 . . . . . . . . . . . . . . . . . . . . . . . . . 117
• Self Check . . . . . . . . . . . . . . . . . . . . . . . . . 118
• Activity Sheet 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . 119
Assessment Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Observation Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Observation and Questioning Checklist . . . . . . . . . . . . . . . . . . . . . . . . . 122
Demonstration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Written Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Performance Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Answer key 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Answer key 2.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Answer key 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

2
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

How to use this CBLM

Welcome to the Module “Configuring Computer Systems and Networks”.


This module contains training materials and activities for you to complete.

The unit of competency “Configure Computer Systems and Networks”


contains the knowledge, skills and attitudes required for Computer Hardware
Servicing course required to obtain the National Certificate (NC) level II.

You are required to go through a series of learning activities in order to


compete each of the learning outcomes of the module. In each learning outcome
there are information sheets, information sheets and activity sheets. Do this
activity on your own and answer the Self Check at the end of each learning
activity.

If you have questions, do not hesitate to ask your teacher for assistance.

Recognition of Prior Learning (RPL)

You have already some basic knowledge and skills covered in this
module. If you can demonstrate competence to you teacher in a particular skill,
talk to him/her so you did not have to undergo the same training again. If you
have a qualification or Certificate of Competency from previous trainings show it
to him/her. If the skills you required are consistent with and relevant to this
module, they become part of the evidence. You can present these RPL. If you
are not sure about your competence skills, discuss this with your teacher.

After completing this module, ask your teacher to assess your


competence. Result of your assessment will be recorded in your competency
profile. All the learning activities are designed for you to complete at your own
pace.

In this module, you will find the activities for you to accomplish and
relevant information sheets for each learning outcome. Each learning outcome
may have more than one learning activity.

This module is prepared to help you achieve the required competency in


receiving and relaying information. This will be the source of information that will
enable you to acquire the knowledge and skills in Computer Hardware Servicing
NC II independently at your own pace with minimum supervision from your
trainer.

3
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC II


Unit of Competency : Configure Computer Systems and Networks
Module Title : Configuring Computer Systems and Networks

INTRODUCTION:

This module contains information sheets and suggested learning activities


in installing computer systems and networks. It includes instructions and
procedure on how to install computer systems and networks.

This module consists of three (3) learning outcomes. Each learning


outcome contains learning activities supported by instruction sheets. Before you
perform the instruction, read the information sheets and answer the self check
and activities provided to ascertain to yourself and your teacher that you have
acquired the knowledge necessary to perform the skill portion of the particular
learning outcome.

Upon completing this module, report to your teacher for assessment to


check your achievement of knowledge and skills requirements of this module. If
you pass the assessment, you will be given a certificate of completion.

SUMMARY OF LEARNING OUTCOMES

Upon completion of the module the students shall be able to:

1. Plan and prepare for configuration


2. Configure computer systems and networks
3. Inspect and test configured computer systems and networks

ASSESSMENT CRITERIA:

Refer to assessment criteria of learning outcomes 1-3 of this module.

PREREQUISITES:

None

4
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

TECHNICAL TERMS:

Cable Tester - Tests for shorts, opens, miswires, reversals, split pairs, and shield
continuity

Crimper - To press or pinch into small regular folds or ridges

Disk Formatting - is the process of preparing a hard disk or other storage medium for
use, including setting up an empty file system.

Driver - software driver is a computer program allowing higher-level computer programs


to interact with a hardware device.

FDisk (Fixed Disk) - is a commonly used name for a command-line utility that provides
disk partitioning functions in an operating system. Usually used for deleting and
creating drives or partitions.

Hardware - is a comprehensive term for all of the physical parts of a computer.

Operating System - is an interface between hardware and user which is responsible for
the management and coordination of activities and the sharing of the resources
of a computer that acts as a host for computing applications run on the machine.

Partitioning - is the act or practice of dividing the storage space of a hard disk drive into
separate data areas known as partitions.

RJ 45 - registered jack (RJ) is a standardized physical network interface — both jack


construction and wiring pattern — for connecting telecommunications or data
equipment to a service provided by a local exchange carrier or long distance
carrier.

Software - is a generic term for organized collections of computer data and instructions
specific tasks.

Software Installation - Installation (or setup) of a program (including drivers, plugins, etc.)
is the act of putting the program onto a computer system so that it can be
executed.

UTP - is a type of wiring in which two conductors (the forward and return conductors of a
single circuit) are twisted together for the purposes of canceling out
electromagnetic interference (EMI) from external sources; for instance,
electromagnetic radiation from Unshielded Twisted Pair (UTP) cables, and
crosstalk between neighboring pairs.

5
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC II


Unit of Competency : Configure Computer Systems and Networks
Module Title : Configuring Computer Systems and Networks

Learning Outcome 1: Plan and prepare for configuration

ASSESSMENT CRITERIA:

1. Configured computer systems and networks identified from the


Job/Service Order or instructions.
2. Planned and prepared job requirements.
3. Followed OHS policies and procedures of job requirements.
4. Checked computer systems and networks configuration with specified
requirements.
5. Checked necessary tools, equipment materials

References:

Module Title : Configuring Computer Systems and Networks


Lo1 : Plan and Prepare For Configuration

6
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

LEARNING EXPERIENCES / ACTIVITIES:

Learning Outcome 1: Plan and Prepare For Installation

Learning Activities Special Instruction

1. Read Information Sheet 2 – 1.2about the


plan and prepare for configuration

• Do not write anything on the module


2. Do the Self Check • Prepare a separate sheet of paper on the
Self-Check and Activity.
3. Read activity sheet 1.1 about the tools
and computer equipment.

4. Prepare the Activity Sheet using separate


sheet of paper.

7
INFORMATION SHEET No. 1.1

What is System Requirements?

all computer software needs certain hardware components or


other software resources to be present on a computer. These pre-
requisites are known as (computer) system requirements and are
often used as a guideline as opposed to an absolute rule.

Most software defines two sets of system requirements:


1. Software Requirements

2. Hardware Requirements
lists tested, compatible, and sometimes incompatible
hardware devices for a particular operating system or application

Architecture

All computer operating systems are designed for a particular computer


architecture. Most software applications are limited to particular
operating systems running on particular architectures

Processing power

The power of the central processing unit (CPU) is a fundamental


system requirement for any software.].

Memory

All software, when run, resides in the random access memory (RAM) of
a computer. Memory requirements are defined after considering
demands of the application, operating system, supporting software and
files, and other running processes.

Secondary storage

Hard-disk requirements vary, depending on the size of software


installation, temporary files created and maintained while installing or
running the software, and possible use of swap space (if RAM is
insufficient).

8
Display adapter

Software requiring a better than average computer graphics display,


like graphics editors and high-end games, often define high-end
display adapters in the system requirements.

Peripherals

Some software applications need to make extensive and/or special use


of some peripherals, demanding the higher performance or
functionality of such peripherals. Such peripherals include CD-ROM
drives, keyboards, pointing devices, network devices, etc.

Software requirements

Software Requirements deal with defining software resource


requirements and pre-requisites that need to be installed on a
computer to provide optimal functioning of an application. These
requirements or pre-requisites are generally not included in the
software installation package and need to be installed separately
before the software is installed.

Platform

In computing, a platform describes some sort of framework, either in


hardware or software, which allows software to run. Typical platforms
include a computer's architecture, operating system, or programming
languages and their runtime libraries.

APIs and Drivers

Software making extensive use of special hardware devices, like high-


end display adapters, needs special API or newer device drivers..

Web browser

Most web applications and software depending heavily on Internet


technologies make use of the default browser installed on system.

OPERATING SYSTEM HARDWARE MINIMUM REQUIREMENTS

MINIMUM HARDWARE REQUIREMENTS FOR WINDOWS 98:

• A personal computer with a 486DX 66 megahertz (MHz) or faster


processor (Pentium central processing unit recommended).

9
• 16 megabytes (MB) of memory (24 MB recommended).
• A typical upgrade from Windows 95 requires approximately 195
MB of free hard disk space, but the hard disk space may range
from between 120 MB and 295 MB, depending on your computer
configuration and the options that you choose to install.
• A full install of Windows 98 on a FAT16 drive requires 225 MB of
free hard disk space, but may range from between 165 MB and
355 MB, depending on your computer configuration and that
options that you choose to install.
• A full install of Windows 98 on a FAT32 drive requires 175 MB of
free hard disk space, but may range from between 140 MB and
255 MB, depending on your computer configuration and the
options that you choose to install.
• One 3.5-inch high-density floppy disk drive.
• VGA or higher resolution (16-bit or 24-bit color SVGA
recommended).

WINDOWS 2000 PROFESSIONAL MINIMUM SYSTEM


REQUIREMENTS:

• 133 MHz or more Pentium microprocessor (or equivalent).


Windows 2000 Professional supports up to two processors on a
single computer.
• 64 megabytes (MB) of RAM recommended minimum. 32 MB of
RAM is the minimum supported. 4 gigabytes (GB) of RAM is the
maximum.
• A 2 GB hard disk that has 650 MB of free space. If you are
installing over a network, more free hard disk space is required.
• VGA or higher-resolution monitor.
• Keyboard.
• Mouse or compatible pointing device (optional).

MINIMUM HARDWARE REQUIREMENTS FOR WINDOWS XP


PROFESSIONAL

• Pentium 233-megahertz (MHz) processor or faster (300 MHz is


recommended)
• At least 64 megabytes (MB) of RAM (128 MB is recommended)
• At least 1.5 gigabytes (GB) of available space on the hard disk
• CD-ROM or DVD-ROM drive
• Keyboard and a Microsoft Mouse or some other compatible
pointing device
• Video adapter and monitor with Super VGA (800 x 600) or higher
resolution
• Sound card
• Speakers or headphones

10
INFORMATION SHEET No. 1.2

Tools

Crimping Tool
is a tool designed to crimp or connect a connector to the end of a cable. For
example, network cables and phone cables are created using a crimping tool to connect
the RJ-45 and RJ-11 connectors to the end of the cable.

Wire Cutter
Wire cutters are hand-tools used to cut wire such as sterling silver, copper, and
gold-filled.

Cable Tester
is an electronic device used to verify the electrical connections in a cable or other
wired assembly.

11
Materials

Operating System Installer


is an interface between hardware and user which is responsible for the
management and coordination of activities and the sharing of the resources of the
computer that acts as a host for computing applications run on the machine.

Startup Disk
A boot disk will allow you to boot from the diskette in place of
your hard disk. This diskette can be used to fix problems that may
come during the lifetime of your computer

Device Drivers
is a computer program allowing higher-level computer programs to interact with a
hardware device.

12
Technical Education and Skills Development Authority
Philippine International Technological School

Self – Check 1.1

A. Direction: write your answer on the space provided for:

1. Write the minimum system of the following Operating Systems?


CPU Memory Hard disk Video
Windows 98
Windows 2000
Windows XP professional

B. Direction: Name the following measuring tools and materials:

1. 2. 3.

4. 5.

13
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Activity Sheet 1.1

Identifying Computer Tools and Materials

Supplies and Materials


• Activity Sheet
• Paper and Pencil

Tools and Materials


• Computer Networking tools
• Computer Software Installation Materials

Direction: the following exercises required you to write notes, label and to draw
sketches to describe the Computer Networking tools and materials.

Write your description Draw your illustration on this side


on this side
Crimper

Cable Tester

Motherboard Driver

Module Title : Configuring Computer Systems and Networks


Lo1 : Plan and Prepare For Configuration

14
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC II


Unit of Competency : Configure Systems and Networks
Module Title : Configuring systems and Networks

Learning Outcome 2: Configure computer systems and networks

Assessment Criteria:

1. Appropriate Personal Protective Equipment are used and OHS policies


and procedures followed
2. Normal function of systems and networks checked in accordance with
manufacturer’s instructions
3. Fault or problem in the systems and networks diagnosed in line with the
standard operating procedures.
4. Computer systems and networks configured in line with the standard
operating procedures.

References:

Module Title : Configuring Computer Systems and Networks


LO 2 : Configure computer systems and networks

15
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

LEARNING EXPERIENCES / ACTIVITIES:

Learning Outcome 2: Install Device / System/ Equipments

Learning Activities Special Instructions


1. Read Operation Sheet 2.1 and watch the
video about FDISK
• Do not write anything on the module
2. Do the Self-Check 2.1 • Prepare a separate sheet of paper on the
Self-Check and Activity.
3. Perform operation sheet 2.1 to 2.2 about
installing Operating System Windows XP
and Windows 98.
4. Perform Operation Sheet 2.1 about how
to install Drivers
5. read information Sheet 2.1 about
Computer networking
6. Perform Operation Sheet 2.3 about how
to install Drivers

16
OPERATION SHEET No. 2.1

Microsoft's Windows 98 SE - CD Install on Blank Hard Drive

INTRODUCTION

What you will require to do this walkthrough is

1. A Windows 98 CD
2. A Computer with CD-ROM access

To start this Windows install. First check that the first boot device in your system BIOS is set to the CD-ROM
Drive.

( To find out how to access the BIOS please refer to your motherboard manual or the manufacturer of
your computer. (The system bios can usually be entered on boot, usually by pressing the F1, F2, F8, F10
or DEL key. Make sure you save the settings before exiting))

If you are unsure or don't want to enter the BIOS then just test the computer by putting the CD-ROM in the
drive and rebooting the computer. This is the recommended way to install windows.

You will know that your computer will/has booted of CD-ROM when the following screen appears.

PART 1

To begin the Windows 98 install select Option 2 (Boot from CD-Rom)

17
The following screen will appear next. Select Option 1. (Start Windows 98 Setup from CD-ROM)

18
Your CD-ROM driver will now install, be patient this may take a few moments.

19
Now press Enter to continue, or F3 to exit.

20
Setup will now perform checks on your system, press Enter to continue.

21
Next Scandisk will run, let this complete or setup.

22
Now setup will copy important files for the install.

23
PART 2

Setup has now begun, the mouse should now be active, press Continue to proceed. If you have a change of mind
then press Exit Setup. If the mouse is not active press "ENTER" on the keyboard.

24
The wizard will now start. Be patient this may take a few moments.

25
Now select the directory you wish to install Windows into. By default C:\Windows will be selected. You can
change this, but it is not advised. Click on Next to Continue.

26
Setup will now prepare the directory, be patient this may take a moment.

27
Setup now checks disk space.

28
What do you wish to install. We recommend Typical, which is the default. So click Next to continue.

29
Windows Components to be installed will now be listed. Leave at default and press Next.

30
If a Network card has been detected the following will appear. Fill in the details and click Next.

31
Now your country settings, select as needed and then press Next.

32
Windows will now copy files, this will take sometime. Be patient

33
PART 3

After sometime you will be prompted to restart, Windows will do it itself, you can click on Restart Now to
quicken the process.

34
The CD-ROM boot menu will appear. Select option 1 (Boot from Hard Disk)

35
Booting for first time screen will appear.

36
Now enter your name, company is optional. Click on Next to continue.

37
Now the License Agreement. Read and if you agree click on "I accept the Agreement" and click next. If you
select ""I don't accept the Agreement" then setup will end.

38
Now input your product key or certificate authenticity code. This is 16 digits and is located on the back of your
CD case or on the Windows 98 Book. If you have an OEM computer then it could be on the side or back of
your computer. Click next to continue.

39
Next click on Finish.

40
PART 4

Setup will now finalize the hardware and install settings.

41
Plug and Play Devices.....

42
Your computer will prompt to restart....

43
The CD boot menu will appear. Select option 1 (Boot from Hard Disk) and press enter.

44
Windows is booting.

45
and continuing the install of devices.

46
PART 5

Now select your date/time settings, using the down arrow beside GMT -0800.

47
Once selected click on apply and then OK.

48
Windows will continue to setup Windows items.

49
The computer will now need restarted again.

50
PART 6

The CD-ROM boot menu will appear. Select Option 1 (Boot from Hard Disk) and press enter.

51
Windows will continue to load.

52
and update System Settings.

53
At long last you have arrived at the desktop.

54
If you are lucky you will have no drivers to install, but chances are the next step will be to install them. Check
out device manager for unknown devices, likely items are Network Cards, Sound Cards, Printers, Scanners,
Graphics Cards, Digital Cameras, plus any other item you have.

THE END

55
Operation Sheet 2.2

Windows XP Installation
1. Start the computer from the CD.

2. You can press F6 if you need to install additional SCSI adapters or other mass-
storage devices. If you do you will be asked to supply a floppy disk with the drivers and
you CANNOT browse it (or a CD for that matter). Make sure you have one handy.

3. If you want, you can press F2 to run the ASR sequence. For that you need a good
backup created by the Windows XP backup program, and the ASR floppy disk. If you plan
to install a new copy of XP - don't do anything.

56
4. Setup will load all the needed files and drivers.

5. Select To Setup Windows XP Professional Now. If you want, and if you have a
previous installation of XP, you can try to fix it by pressing R. If not, just press ENTER.

57
6. Read and accept the licensing agreement and press F8 if you accept it.

7. Select or create the partition on which you will install Windows XP Professional.
Depending upon your existing disk configuration choose one of the following:

58
• If the hard disk is unpartitioned, you can create and size the partition on which
you will install Windows XP Professional.

• If the hard disk is already partitioned, but has enough unpartitioned disk space,
you can create an additional partition in the unpartitioned space.
• If the hard disk already has a partition that is large enough, you can install
Windows XP Professional on that partition. If the partition has an existing operating
system, you will overwrite that operating system if you accept the default installation
path. However, files other than the operating system files, such as program files and data
files, will not be overwritten.
• If the hard disk has an existing partition, you can delete it to create more
unpartitioned space for the new partition. Deleting an existing partition erases all data on
that partition.

If you select a new partition during Setup, create and size only the partition on which you
will install Windows XP Professional. After installation, use Disk Management to partition
the remaining space on the hard disk.

8. Select a file system for the installation partition. After you create the partition on
which you will install Windows XP Professional, you can use Setup to select the file
system with which to format the partition. Windows XP Professional supports the NTFS
file system in addition to the file allocation table (FAT) and FAT32 file systems. Windows
Server 2003, Windows XP Professional, Windows 2000, and Windows NT are the only
Microsoft operating systems that you can use to gain access to data on a local hard disk
that is formatted with NTFS. If you plan to gain access to files that are on a local
Windows XP Professional partition with the Microsoft Windows 95 or Windows 98
operating systems, you should format the partition with a FAT or FAT32 file system. We
will use NTFS.

59
9. Setup will then begin copying necessary files from the installation point (CD, local
I386 or network share).
10. Note: If you began the installation process from an MS-DOS floppy, make sure
you have and run SMARTDRV from the floppy, otherwise the copying process will
probably last more than an hour, perhaps even more. With SMARTDRV (or if setup was
run by booting from CD) the copying will probably last a few minutes, no more than 5
max.

11. The computer will restart in graphical mode, and the installation will continue.

60
Step #4: The GUI-based portion of the Setup program

The setup process reboots and loads a GUI mode phase.

It will then begin to load device drivers based upon what it finds on your computer. You
don't need to do anything at this stage.

61
1. Click Customize to change regional settings, if necessary.

• Current System Locale - Affects how programs display dates, times, currency,
and numbers. Choose the locale that matches your location, for example, French
(Canada).
• Current Keyboard Layout - Accommodates the special characters and symbols
used in different languages. Your keyboard layout determines which characters appear
when you press keys on the keyboard.

If you don't need to make any changes just press Next.

62
If you do need to make changes press Customize and add your System Locale etc.

63
Note for Hebrew users: Unlike W2K, it is SAFE and it is OK for you to install Hebrew
language support at this phase.

To install Hebrew support:

After pressing Customize go to the Languages tab and select the "Install files for complex
script and right-to-left languages".

64
A warning message will appear. Press Ok.

65
Warning: You must now press Apply!!!

Setup will copy the necessary files from the installation point.

66
You can now go to the Regional Options tab and select Israel in the Location drop-down
list, and Hebrew in the Standards and Formats drop-down list. Click Ok.

67
2. Type your name and organization.

3. Type the product key.

68
4. Type the computer name and a password for the local Administrator account. The
local Administrator account resides in the SAM of the computer, not in Active Directory. If
you will be installing in a domain, you need either a pre-assigned computer name for
which a domain account has been created, or the right to create a computer account
within the domain.

69
5. Select the date, time, and time zone settings.

70
6. Setup will now install the networking components.

After a few seconds you will receive the Networking Settings window. BTW, if you have a
NIC that is not in the HCL (see the What's the HCL? page) and XP cannot detect it, or if
you don't have a NIC at all, setup will skip this step and you will immediately go to the
final phase of the setup process.

Press Next to accept the Typical settings option if you have one of the following
situations:

• You have a functional DHCP on your network.


• You have a computer running Internet Connection Sharing (ICS).
• You're in a workgroup environment and do not plan to have any other servers or
Active Directory at all, and all other workgroup members are configured in the same
manner.

71
Otherwise select Custom Settings and press Next to customize your network settings.

72
7. One thing you CAN do (you don't have to do it, it's your call - read more about it
on the Increase Internet Connection Speed in Windows XP page) is to uninstall the Qos
Packet Scheduler. Click it and press the Uninstall button. If you want to keep it you can
simply remove the mark from the QoS check-box. In anyway you can later install or
uninstall it if you want.

Keep the TCP/IP, Client for Microsoft Networks and the File and Print Sharing options
selected.

8. Highlight the TCP/IP selection and press Properties.

73
In the General tab enter the required information. You must specify the IP address of the
computer, and if you don't know what the Subnet Mask entry should be - you can simply
place your mouse pointer over the empty area in the Subnet Mask box and click it. The
OS will automatically select the value it thinks is good for the IP address you provided.

74
If you don't know what these values mean, or if you don't know what to write in them,
press cancel and select the Typical Settings option. You can easily change these values
later.

9. In the Workgroup or Domain window enter the name of your workgroup or


domain.

• A workgroup is a small group of computers on a network that enables users to


work together and does not support centralized administration.
• A domain is a logical grouping of computers on a network that has a central
security database for storing security information. Centralized security and administration
are important for computers in a domain because they enable an administrator to easily
manage computers that are geographically distant from each other. A domain is
administered as a unit with common rules and procedures. Each domain has a unique
name, and each computer within a domain has a unique name.

If you're a stand-alone computer, or if you don't know what to enter, or if you don't have
the sufficient rights to join a domain - leave the default entry selected and press Next.

75
If you want to join a domain (NT 4.0 domain of W2K/2003 Active Directory domain) enter
the domain's name in the "Yes, make this computer a member of the following domain"
box.

76
To successfully join a domain you need the following:

• The person performing the installation must have a user account in Active
Directory. This account does not need to be the domain Administrator account.

and

• The computer must have an existing computer account in the Active Directory
database of the domain that the computer is joining, and the computer must be named
exactly as its domain account is named.

or

• The person performing the installation must have appropriate permission to


create a domain account for the computer during installation.

Also, you need to have connectivity to the domain's domain controllers (only to the PDC if
on an NT 4.0 domain) and a fully functional DNS server (only in AD domains). Read the
Joining a Domain in Windows XP Pro and Requirements when Joining a Domain pages for
more on this issue.

Enter the Active Directory domain name (in the form of xxx.yyy, for example:
DPETRI.NET) or the NetBIOS name of the NT 4.0 domain (in the form of xxx, for
example: DPETRI). Press Next.

Note: If you provide a wrong domain name or do not have the correct connectivity to the
domain's DNS server you will get an error message.

A username/password window will appear. Enter the name and password of the domain's
administrator (or your own if you're the administrator on the target domain).

77
Note: Providing a wrong username or password will cause this phase to fail.

10. Next the setup process will finish copying files and configuring the setup. You do
not need to do anything.

78
11. After the copying and configuring phase is finished, if XP finds that you have a
badly configured screen resolution it will advise you to change it and ask you if you see
the new settings right.

79
BTW, the minimum supported screen resolution in XP is 800X600.

12. Setup finishes and boots Windows XP.

80
13. A Welcome screen is the first thing you see. The computer checks your Internet
connectivity (required for the mandatory Activation and voluntary Registration
processes).

81
You will be asked to register your copy of XP. You can decline if you want.

82
14. XP will ask you for the default username that will log onto this computer. You can
enter as many as 5 users, but you can create more after the installation is finished.

BTW, the Administrator is not shown as a valid logon option (read more about it on the
Add the Administrator's Account to the Welcome Screen in XP Pro page).

15. That's it! you're done!

OPERATION SHEET 2.3

83
Installing Driver

Steps:

1. Right click My Computer

2. Click Manage (the Computer management will open)

3. Click Device Manager (devices with “?” indicates that the drivers are not
installed)

84
4. Insert the motherboard driver into CD ROM.

5. Wait until the menu auto runs and presents us with a few options along
the top including drivers and utilities.

6. click the driver you want to install then click next

85
7. if this window appears don’t click, let it disappears after few seconds

8. Click Next until the finest button appears

9. Remove the motherboard Driver and Let it restart.

Republic of the Philippines

86
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

INFORMATION SHEET No. 2.4

Computer Networking
Basics & Troubleshooting

Computer Network

What is meant by the term “Computer Network?”

 Computers linked together.

 To connect two or more computers together with the ability to communicate with each other.

“Computer Network” is an interconnected collection of autonomous computers.

 2 or more computers are said to be interconnected if they are able to exchange information.

Note:-By requiring the computers to be autonomous means ‘there is no master/slave’ relationship. If one computer can
forcibly start, stop or control other, the computers are not autonomous.

 A computer network is a system for communication between computers. These networks may be fixed (cabled,
permanent) or temporary (as via modems).

 In the simplest sense, networking means connecting computers so that they can share files, printers, applications,
and other computer-related resources.

 We connect the computers to share:


• Folders
• Peripheral Devices
• Messages
• Applications
• Database
Other devices give capability for sharing above, but they do not get shared.

87
Goals of computer networking:

 Increased manageability
 Security

 Efficiency
 Cost-effectiveness

Categorizing Computer Networks

 Local Area Networks


 Metropolitan Area Networks

 Wide Area Networks

Network Category
 Client - Server

 Peer To Peer (P2P)

Local Area Network

 A local area network (LAN) is a computer network covering a small local area, like a home, office or small
group of buildings such as a college. Current LANs are most likely to be based on switched Ethernet or Wi-Fi
technology running at from 10 to 1000Mb/s (megabits per second).

Metropolitan Area Network

 Metropolitan Area Networks (MAN) are large computer networks usually spanning a campus or a city. They
typically use wireless infrastructure or optical fiber connections to link their sites.

Wide Area Network

 A wide area network (WAN) is a computer network covering a wide geographical area, involving a vast array
of computers. This is different from personal area networks (PANs), metropolitan area networks (MANs) or
local area networks (LANs) that are usually limited to a room, building or campus. The best example of a WAN
is the Internet.

 WANs are used to connect local area networks (LANs) together, so that users and computers in one location
can communicate with users and computers in other locations.

Client - Server

 The Client/Server is a scalable architecture, whereby each computer or process on the network is either a client or a
server. The no. of client computers is more than the Server Computers in such networks.

88
 Server software generally runs on powerful computers dedicated for running an application.

 Client software generally runs on common PCs or workstations. Clients get most of their information and rely on
the application server for things such as files, business application programs, or to offload compute-intensive
application tasks back to the server in order to keep the client computer free to perform other tasks.

 Properties of a server:
• Passive (Slave)
• Waiting for requests
• On requests serves them and send a reply

 Properties of a client:
• Active (Master)
• Sending requests
• Waits until reply arrives

Client - Server

 A typical example for a Client – Server architecture is an FTP server where the client and server programs are
quite distinct, clients initiate the download/uploads and the servers respond to requests.
 Another example for a Client – Server architecture is Domain trees & forests of active directory.

Peer to Peer ( P2P)

 Peer-to-Peer, or abbreviated P2P, is a type of network in which each workstation has equivalent
capabilities and responsibilities.
 This differs from client/server architectures, in which some computers are dedicated to serving the
others. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance
under heavy loads.

89
 A pure peer-to-peer network does not have the notion of clients or
servers, but only equal peer nodes that simultaneously function as both
"Clients" and "servers" to the other nodes on the network. This model
Of network arrangement differs from the client-server model where
Communication is usually to and from a central server.
 It relies on the computing power and bandwidth of the participants in
the network rather than concentrating it in a relatively few servers.

 P2P networks are typically used for connecting nodes via largely ad hoc connections. Such networks are
useful for many purposes, like haring content files containing audio, video, data or anything in digital
format.
 An example of Peer-to-peer networking is the implementation of a
Workgroup consisting of computers running Microsoft Windows or
any other network operating system.

Comparison

 P-2-P (Workgroup)
• Easy Administration
• No Sys. Admin required
• Low cost
• Group of small
• No or Low Security
• Segregated Resources & Management

 Client-Server
• Difficult administration
• Needs Sys Admin
• High Cost
• Very large
• High Security
• Centralized Resource & management

Domain & Workgroup

 Workgroup: A logical grouping of networked computers that can share resources with each other. Also called
peer-to-peer n/w. A user who wants to log on to a computer must have an account in that computer’s local
security database. A user with an account on one computer doesn’t necessarily have any permissions or rights to
resources on other computers.

 Domain: a collection of computers that share a common domain database and security policy. The domain
database is stored by one or more Servers called “domain controller”. Workstations are members of domain.
Administrator can control users, computers & other resources centrally from DC.

 As the data is stored centrally, a user can use his account name & password to log on to any member computer
(provided he has rights to do so).

90
Network Topology

 A network topology is the pattern of links connecting pairs of nodes of a network. A given node has one
or more links to others, and the links can appear in a variety of different shapes.

Difference b/w LAN & WAN

 The defining characteristics of LANs in contrast to WANs are:

• much higher data rates,


• smaller geographic range, and
• they do not involve leased telecommunication lines.

OSI Reference Model

 Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. OSI
was developed in 1984 by the International Organization for Standardization (ISO), a global federation of national
standards organizations representing approximately 130 countries. The core of this standard is the OSI Reference Model, a
set of seven layers that define the different stages that data must go through to travel from one device to another over a
network.

 Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user
chooses to transfer files, read messages or perform other network-related activities.

91
 Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format
that the other layers can understand.

 Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.

 Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data
between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one
application and integrates each application's data into a single stream for the physical network.

 Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols,
routing and addressing are handled here.

 Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the
packet sequencing is defined.

 Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as
connections, voltage levels and timing.

The OSI Reference Model is really just a guideline. Actual protocol stacks often combine one or more of the OSI layers into a
single layer.
TCP/IP Model

The TCP/IP architectural model has four layers that approximately match six of the seven layers in the OSI Reference Model.
The TCP/IP model does not address the physical layer, which is where hardware devices reside. The next three layers—
network interface, internet and (host-to-host) transport—correspond to layers 2, 3 and 4 of the OSI model. The TCP/IP
application layer conceptually “blurs” the top three OSI layers.

Protocol

A set of rules for sending information over a network. Protocols can include rules concerning any or all of the following
functions:

 Data transmission mechanisms

 Communication session initialization and termination


 Addressing and routing

92
 Authentication and verification
 Encryption and compression

 Error correction

Note:-Protocols are usually classified according to the layer they correspond to in the Open Systems Interconnection (OSI) reference
model for networking.

Protocol Stacks

A protocol stack is a group of protocols that all work together to allow software or hardware to perform a function. The
TCP/IP protocol stack is a good example. It uses four layers that map to the OSI model as follows:

 Layer 1: Network Interface - This layer combines the Physical and Data layers and routes the data between devices on
the same network. It also manages the exchange of data between the network and other devices.

 Layer 2: Internet - This layer corresponds to the Network layer. The Internet Protocol (IP) uses the IP address, consisting
of a Network Identifier and a Host Identifier, to determine the address of the device it is communicating with.

 Layer 3: Transport - Corresponding to the OSI Transport layer, this is the part of the protocol stack where the Transport
Control Protocol (TCP) can be found. TCP works by asking another device on the network if it is willing to accept
information from the local device. Protocols : UDP, TCP.

 Layer 4: Application - Layer 4 combines the Session, Presentation and Application layers of the OSI model. Protocols for
specific functions such as e-mail (Simple Mail Transfer Protocol, SMTP) and file transfer (File Transfer Protocol, FTP) &
HTTP reside at this level.
Protocols

 HTTP

 FTP
 SMTP

 TCP
 UDP

 IP
 ARP

 ICMP Internet Control Message Protocol

IP Address

A 32-bit (for IPv4) logical address for a host on a TCP/IP network. Each host on a TCP/IP network needs a unique IP
address for communication to take place reliably on the network.

93
The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can
be zero to 255 (with some restrictions). For example, 1.160.10.240 could be an IP address.

A Typical IP address looks like this: 216.27.61.137

 To make it easy to remember, IP addresses are normally expressed in decimal format as a "dotted decimal number"
like the one above. But computers communicate in binary form. Look at the same IP address in binary:
11011000.00011011.00111101.10001001

 The four numbers in an IP address are called octets , because they each have eight positions when viewed in
binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit
numbers. Since each of the eight positions can have two different states (1 or 0) the total number of possible
combinations per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine the four octets
and you get 232 or a possible 4,294,967,296 unique values!

Address Resolution Protocol (ARP)

 A TCP/IP network layer protocol responsible for resolving IP addresses into MAC addresses.

 When a TCP/IP-aware application tries to access another TCP/IP host using its IP address, the destination host’s IP
address must first be resolved into a MAC address so that the frame can be addressed and placed on the wire and
then be recognized by the destination host’s network interface card (NIC). This is because network interface cards
operate at the physical layer (layer 1) and data-link layer (layer 2) of the Open Systems Interconnection (OSI)
reference model and must use physical addresses (such as MAC addresses) instead of logical addresses (such as IP
addresses) for network communication.

IP Address

 The IP address of a host is partitioned by the network’s subnet mask into two parts, a network ID and a
host ID.

What is SUBNET MASK?

Subnet Mask

 Subnet masks are used by TCP/IP services and applications to determine whether a given IP address on
an internet work is a local network address or a remote network address. It’s a 32-bit number that is
used to partition IP addresses into a network ID and a host ID.
How Subnet mask Works

A subnet mask consists of 32 binary digits, the first n of which are 1s and the remaining of which are 0s. When the subnet
mask is logically ANDed with a 32-bit IP address of a TCP/IP host, the result is the network ID of the host—the portions of the
host’s IP address that identifies which network the host is on. When the inverse of the subnet mask (for example, NOT mask)
is logically ANDed with the IP address of the host, the result is the host ID of the host—the portion of the host’s IP address
that uniquely identifies the host on its network.

94
IP Address Classes

The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can
be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections:
Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to.
Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last
octet. There are five IP classes plus certain special addresses:

 Default Network - The IP address of 0.0.0.0 is used for the default network.

 Class A - This class is for very large networks, such as a major international company might have. IP addresses
with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This
means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648
(231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A
networks, the high order bit value (the very first binary number) in the first octet is always 0.

Net Host or Node


115. 24.53.107
 Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host
computer to send a message back to itself. It is commonly used for troubleshooting and network testing.

 Class B - Class B is used for medium-sized networks. A good example is a large college campus. IP addresses
with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the
Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B
networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B

95
networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a
second bit value of 0 in the first octet.

Net Host or Node


145.24. 53.107

 Class C - Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first octet
from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net
identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks
each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up
an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a
third bit value of 0 in the first octet.
Net Host or Node
195.24.53. 107

 Class D - Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of 1,
second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of
computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP
addresses.

Net Host or Node


224. 24.53.107

 Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes.
It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are
used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th
(268,435,456 or 228) of the available IP addresses.

Net Host or Node


240. 24.53.107

Broadcast - Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP
address 255.255.255.255.
 Networks that are directly connected to the Internet must have their IP addresses assigned by the Internet Network
Information Center (InterNIC) or some other authority. Businesses usually obtain these addresses through their
local Internet service provider (ISP). However, firewall and proxy server combinations, which are popular on
today’s networks, hide a network’s IP addresses from other hosts on the Internet. These private networks can use
any IP addresses they choose, although InterNIC recommends the following IP address blocks for private networks:

 Class A networks: 10.x.y.z

 Class B networks: 172.16.y.z through 172.31.y.z

 Class C networks: 192.168.0.z through 192.16.255.z

Note the following considerations for valid IP addressing:

 The network ID cannot be 127.

 The network ID and host ID cannot both be 255.

96
 The network ID and host ID cannot both be 0.
 The host ID must be unique for a given network ID.

Computer Names

 Host Name
 NetBIOS Name

(Microsoft Windows 2000 & later do not need the NetBIOS names; however, previous version of Windows require NetBIOS
to support networking capabilities.)

Host Name

An alias given to a computer on a TCP/IP network to identify it on the network.

 Host names are a friendlier way of identifying TCP/IP hosts than IP addresses, and host names can be resolved into
IP addresses by host name resolution using a DNS server or hosts files.
 Host names can include the characters a–z, A–Z, 0–9, period, and dash (-). To ensure full compatibility with the
Domain Name System (DNS), do not use any other special characters in host names.

 TIP: To find out the host name of a computer running Windows NT or Windows 2000, type hostname at the
command prompt.

NetBIOS Name

 NetBIOS: Network Basic Input/Output System, a specification created by IBM and Microsoft that allows distributed
applications to access each other’s network services independent of the transport protocol used.

 NetBIOS Name: A 16-byte name for a networking service or function on a machine running Microsoft Windows NT.
NetBIOS names are a more friendly way of identifying computers on a network than network numbers and are used by
NetBIOS-enabled services and applications. NetBIOS names are used by Windows NT applications such as Windows
Explorer and Network Neighborhood as well as by the Windows NT net commands.
 Each service that is NetBIOS-enabled requires a unique NetBIOS name to identify it on the network. This NetBIOS name
consists of a name assigned to the computer during installation, which can be up to 15 characters, along with a 1-byte
hexadecimal sixteenth character that identifies the type of service or function. The 15-character name can be the computer
name, the domain name, or the name of the user who is logged on.

 TIP: To view the NetBIOS names registered for your computer, use the nbtstat command.

Domain Name System (DNS)

A hierarchical system for identifying hosts on the Internet or on a private, corporate TCP/IP internetwork. The Domain Name
System (DNS) provides

 A method for identifying hosts with friendly names instead of IP addresses

 A distributed mechanism for storing and maintaining lists of names and IP addresses of hosts

97
 A method for locating hosts by resolving their names into their associated IP addresses so that network communication can
be initiated with the host.

 The DNS is implemented as a distributed database using name servers located at various points on the Internet.
Clients called resolvers can perform name lookups by contacting these name servers, which resolve host names into
IP addresses.

 Each name server on the Internet is responsible for a subset of the DNS namespace known as a zone of authority.
Each zone of authority can consist of one or more domains and subdomains.

 The most important name servers on the Internet are the dozen or so root name servers, which are responsible for
maintaining the infrastructure of the domain name system. These root name servers are maintained mostly by the
Internet Network Information Center (InterNIC) and by U.S. military agencies

Although DNS is used mainly for the Internet, large private TCP/IP internetworks can also use DNS internally with their own
name servers. The main advantage of doing this is that host names are friendlier than IP addresses. On smaller TCP/IP
networks, hosts files can be used instead of DNS, while on Windows NT–based networks, Windows Internet Naming Service
(WINS) is often used for NetBIOS name resolution. Windows NT Server has an installable service called the Microsoft DNS
Service, which allows Windows NT servers to function as name servers called DNS servers.

Gateway
 Gateways are essentially devices that direct network traffic in some fashion and translate that information.

 They are commonly used to provide connectivity between two different protocol stacks that might be running on
different systems.
Router
 A networking device that is used to extend or segment networks by forwarding packets from one
logical network to another. Routers are most often used in large internetworks that use the TCP/IP
protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using
dedicated leased lines.

 Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI) reference model
for networking to move packets between networks using their logical addresses (which, in the case of
TCP/IP, are the IP addresses of destination hosts on the network).

Firewall
 Any system or device that allows safe network traffic to pass while restricting or denying unsafe traffic. Firewalls
are usually dedicated machines running at the gateway point between your local network and the outside world,
and are used to control who has access to your private corporate network from the outside—for example, over the
Internet. More generally, a firewall is any system that controls communication between two networks.

 A firewall is essentially a kind of router or computer with two network interface cards that filters incoming network
packets. This device is often called a packet-filtering router.

Patch Cables
 A short cable, usually unshielded twisted-pair (UTP) cabling, that connects a port on a patch panel to a port on a
hub or a switch. Patch cables are usually terminated at both ends with RJ-45 connectors.

 Patch Cables are of two types:


• Parallel Cable: To connect 2 dissimilar devices,
• Cross Cable: To connect 2 similar devices.
Parallel/Straight cables

98
Crossover Cable

99
Cableing

Network Interface Cards


 An adapter card that plugs into the system bus of a computer and allows the computer to send and receive signals
on a network. A network interface card (NIC) is also known as a network adapter card or simply a network card.

 NICs can have one or more connectors for cabling to be attached, such as
• RJ-45 connector for twisted-pair cabling (the most common type)
• BNC connector for thinnet cabling
• DB15 connector for connecting drop cables to thicknet cabling.
Switch

 Any device that can control the flow of electrical signals.


 In the context of controlling data flow within a network, the term “switch” is also used to describe a data-link layer
device that routes frames between connected networks.

 Local area network (LAN) switches: Used to route Ethernet frames over a TCP/IP internetwork; also called
Ethernet switches
Hub
 Also called a repeater hub, the basic networking component used in traditional 10-Mbps Ethernet networks to connect
network stations to form a local area network (LAN). Hubs can be used for
• Connecting about a dozen computers to form a workgroup or departmental LAN
• Connecting other hubs in a cascaded star topology to form a larger LAN of up to roughly a hundred computers

 The hub receives signals from each station and repeats the signals to all other stations connected to the hub.
 Hubs thus perform the function of a repeater and are sometimes called multiport repeaters.

 Work on Physical Layer.


 Stations wired into a hub form a star topology.

Troubleshooting & Commands


Network Components

There are 4 components required in a machine to be in a network:


• Adapter
• Client Service

100
• Protocol
• Service
Adapter is the NIC, needed to physically connect to the network.
Client service is used to access server/resource on the network.Eg: Client for Microsoft Networks, Client for NetWare Networks.
Protocol is a set of rules for sending information over a network. Eg: TCP/IP, NetBEUI, IPX/SPX.
Service is background process in an os that provides some specific functionality. Eg: Server service in Microsoft Windows NT and
Windows 2000 and File and Printer Sharing for Microsoft Networks in Microsoft Windows 95 and Windows 98, both of which enable
sharing of resources over the network.

 A Microsoft Windows 95, Windows 98, and Windows 2000 networking component that makes it possible to access file
and print services on Windows 95, Windows 98, Windows NT, Windows 2000, Windows for Workgroups, and LAN
Manager dedicated servers and peer servers. Client for Microsoft Networks works with any combination of NetBEUI,
IPX/SPX-Compatible Protocol, and TCP/IP protocols. Client for Microsoft Networks cannot be used for accessing non-
Microsoft servers such as Novell NetWare servers. You must install Client for NetWare Networks to access these servers.
Windows 95 and Windows 98 allow you to install more than one client at a time to access different kinds of servers on the
network.
 How It Works: Use the Network utility in Control Panel to install Client for Microsoft Networks on a computer running
Windows 95 or Windows 98. Then use the property sheet of Client for Microsoft Networks to configure the computer to
either participate in a workgroup or log on to a Windows NT or Windows 2000 domain.

Commands

 PING
 IPCONFIG

 NBTSTAT
 REPAIR

 TRACERT
 PING

 Stands for Packet Internet Groper, a TCP/IP utility that verifies the integrity of a network connection with a host
on a TCP/IP network. The ping command is one of the first commands to use to troubleshoot communication
problems on a TCP/IP network.
 The usual procedure for using ping to troubleshoot a TCP/IP network follows:

• Verify that TCP/IP is installed and running by pinging the local loopback address using ping 127.0.0.1.

• Ping your own IP address and host name.


• Ping the IP address of the default gateway for your local network.
• Ping the IP address of a host on a remote network.
 Ipconfig

 Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol
(DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address,
subnet mask, and default gateway for all adapters.
 Syntax: Ipconfig
Parameters:

• /all : Displays the full TCP/IP configuration for all adapters. Without this parameter, ipconfig displays
only the IP address, subnet mask, and default gateway values for each adapter. Adapters can represent
physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections.

• /renew [Adapter] : Renews DHCP configuration for all adapters (if an adapter is not specified) or for a
specific adapter if the Adapter parameter is included. This parameter is available only on computers with
adapters that are configured to obtain an IP address automatically.

101
• /release [Adapter] : Sends a DHCPRELEASE message to the DHCP server to release the current DHCP
configuration and discard the IP address configuration for either all adapters (if an adapter is not
specified) or for a specific adapter

Few Troubleshooting Steps

 Check the IP Address.


 Check the Subnet mask, default gateway, DNS.

 Ping loopback ip, self ip, gateway, then remote machine.


 Disable firewalls & IEEE authentication.

 Drivers & other things like lan cable, port etc.

Network: A collection of computers, display terminals, printers, and other devices linked either by physical or wireless
means.

Computer Networking
• Internet: A world-wide network connecting millions of computer networks for the purpose of exchanging
data and communications using special rules of communication.
• internet: (lower case i) Any network connecting two or more computer networks.
Starting of Networking

• 1966: ARPA (Advanced Research Projects Agency) State Defense Department’s research organization.
– Focused major development effort on computer networking.
– ARPA’s Goal: To promote research in advanced future technologies by funding university and
industry research proposals.

– Result: Thousands of databases became available to the public

Types of connections of computers into networks: Physical versus Wireless connections

The first type: The Physical Connection.


Physically connect computers together.
Use of wires or optical cables.
The connections are called network links.

Three most common physical links:


Twisted pair
Coaxial cable
Fiber-optic cable

1:- Twisted pair


• Two wires twisted together.
– Makes them less susceptible to acting like an antenna and picking up radio frequency
information or appliance noise.

102
• Telephone Company uses twisted-pair copper wires to link telephones.

2:- Coaxial cable


• Also two wires:
– One of the wires is woven of fine strands of copper forming a tube.
– The wire mesh surrounds a solid copper wire that runs down the center.
– Space between has a non-conducting material.
– Makes them more impervious to outside noise.

3:- Fiber-optic cable

• Light is electromagnetic.
• Can transmit more information down a single strand.
– It can send a wider set of frequencies.
• Each cable can send several thousand phone conversations or computer communications.

Second type of connections of computers into networks: Wireless connections

• The link is made using electromagnetic energy that goes through space instead of along wires or cables.
• Three types of wireless communications commonly used in networking:
– Infrared
– Radio frequency

103
– Microwave

1:- Infrared

• Commonly used in TV and VCR remote controls.


• Use infrared frequencies of electromagnetic radiation that behave much like visible light.
• Must be in the line of sight.
• Often used to connect keyboards, mice, and printers.

2:- Radio frequency

• Uses radio frequencies.


– Function even though line of sight is interrupted.
• Not commonly used because of the possible interference from other sources of electromagnetic radiation
such as old electric drills and furnace motors.

3:- Microwave

• Often used to communicate with distant locations.


• Must be line of sight.
• Satellite communications use microwaves.

Properties of Transmission

Five basic properties of both the physical and wireless links:


1. Type of signal communicated (analog or digital).
2. The speed at which the signal is transmitted (how fast the data travels).
3. The type of data movement allowed on the channel (one-way, two-way taking turns, two-way simultaneously).

104
4. The method used to transport the data (asynchronous or synchronous transmission).
5. Single channel (baseband) and multichannel (broadband) transmission.

Type of signal communicated (analog or digital).

• Analog:

Those signals that vary with smooth continuous changes.


– A continuously changing signal similar to that found on the speaker wires of a high-fidelity
stereo system.

• Digital:

Those signals that vary in steps or jumps from value to value. They are usually in the form of pulses of
electrical energy (represent 0s or 1s).

The speed at which the signal is transmitted (how fast the data travels).

• In digital systems: Speed is measured in...

– Bits per second (bps).


• The number of bits (0’s and 1’s) that travel down the channel per second.
– Baud rate
• The number of bits that travel down the channel in a given interval.
• The number is given in signal changes per second, not necessarily bits per second.
MODEM - Modulator Demodulator

• Outgoing: Converts binary data from computer (digital) into telephone compatible signals (analog).

• Incoming: Converts telephone signal (analog) into binary data for the computer (digital).

• Can be an external or internal device (usually a “card”).

105
The type of data movement allowed on the channel.

• Simplex transmission - One way transmission.


• Half-duplex transmission - Flows only one way at a time.
• Full-duplex transmission - Two-way transmission at the same time.

4. The method used to transport the data.

Two types of data transmission, each requiring a different modem.

a:-Asynchronous transmission -

Information is sent byte by byte.


Cheaper and more commonly used.

b:-Synchronous transmission -
Data is sent in large blocks rather than in small pieces.
Preceded by special information, concerning error detection and block size.
These modems are expensive but very fast.

Single channel versus multichannel transmission

• Channel - A path of a signal.

• Single channel - Capable of only sending/receiving one signal at a time.


– Phone line: Single line = single phone call at a time.

106
• Multichannel - Capable of more than one channel at a time.
– Fiber-optic cable, microwaves, Satellite transmissions

How is it possible to measure the capacity of communications links?

• Bandwidth: Digital

– Number of bits per second (bps) that can be sent over a link.
– The wider the bandwidth, the more diverse kinds of information can be sent.
– Simplest is voice, most sophisticated is moving videos.

• Bandwidth: Analog

– The difference between the highest and lowest frequencies that can be sent over an analog link
(like phone lines).
– Measurement is given in hertz (Hz).

• For both: The wider the bandwidth, the more information can flow over the channel.

Node: The generic name given to all devices hooked up to a network.

• Each node must have a unique address assigned to them by the network.
• Networks are either direct-connected or those that are not directly linked.
– Direct-connected network: Those whose nodes have direct connections through either physical
or wireless links.
• Point-to-point: Simplest version of direct-connected network. Connecting two
computing systems.
» Example of point to point: Home to ISP.
– Example of a network that is not directly linked: Internet.

The bus network –

• A continuous coaxial cable to which all the devices are attached.


• All nodes can detect all messages sent along the bus.

The ring network -


• Nodes linked together to form a circle.
• A message sent out from one node is passed along to each node in between until the target node receives
the message.

107
The star network –

• Each node is linked to a central node.


• All messages are routed through the central node, who delivers it to the proper node.

The tree network - (hierarchical network)

• Looks like an upside-down tree where end nodes are linked to interior nodes that allow linking through
to another end node.

LAN (Local Area Network)


• A collection of nodes within a small area.
• The nodes are linked in a bus, ring, star, tree, or fully connected topology network configuration.

• Benefits of LANs:
– Sharing of hardware resources.
– Sharing of software and data.
– Consolidated wiring/cabling.
– Simultaneous distribution of information.
– More efficient person-to-person communication.

108
MAN (Metropolitan Area Network)
• Consists of many local area networks linked together.
• Span the distance of just a few miles.

WAN (Wide Area Network)


• Consists of a number of computer networks including LANs.
• Connected by many types of links.
Security of a Network

• Enterprise and intranet networks: Corporations, government agencies, and other organizations have
created their own internal networks.

– Firewall: A set of programs that monitor all communication passing into and out of a
corporation’s intranet.
• Helps prevent, but doesn’t eliminate, unauthorized access.

General Networking

1. Q: What is an IP Addresses?

IP Stands for Internet Protocol. An IP Address is the identifier where other computers on the network can contact your computer,
when you are connected to the network using the TCP/IP protocols. The format of IP addresses are 32bit numerical addresses in 4
groups of 3. It is ranged from 0-255. For example: 255.255.255.255. This number allows your computer to be unique on the same
network, and able to communicate with other computers on the network.

2. Q: What is Dynamic IP Addressing?

Dynamic IP Addressing is where the computer will automatically be assigned a new IP Address. This IP Address will be unique to
the network that it is working on, and should not be the same as any other computer on the same network.

3. Q: What is Static IP Addressing?


Static IP Addressing is where the computer will have a preconfigured IP Address. This Address will never change, and will always be
the same. This scheme should be used if you want to keep the same settings on each computer all the time. If the subnet of the
network changes (subnet is the first 3 groups of the IP) the subnet of the static computer must also change.

109
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

OPERATION SHEET 2.1


CHANGING OR CONFIGURING
IP ADDRESS, SUBNET MASK, GATE WAY AND DNS SERVER
Steps:
1. Right click Network places icon

2. Click Properties

110
3. Right click local area connection icon then click properties.
4.

5. Click internet protocol (TCP/IP) from the list box.


6.

111
7. Click use the following IP ADDRESS type the following:
IP Address : 192.168.2. # of computer
Subnet mask : ‘just press tab after configuring IP address’
Default gateway : 192.168.2.1 (router IP address)
Preferred DNS Server : ‘ask your ISP’ or you can used your
router IP Address
8. Click ok button

Republic of the Philippines


Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Self – Check 1.1

A. Direction: write your answer on the space provided for:

Fill the blank

1. the act or practice of dividing the storage space of a hard disk


drive into separate data areas
2. Possible number in first octet in class C IP address
3. The recommended type of installation
4. Describe the format of IP Address
5. type of network in which each workstation has equivalent
capabilities and responsibilities.

112
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Activity Sheet 2.1

INSTALLING OPERATING SYSTEM AND DRIVERS

Supplies and materials


• Activity Sheet
• UTP
• RJ45

Materials, tools and Equipment


• Operating System
• Motherboard driver
• Cable tester
• Crimper
• Wire Cutter
• Functional Computer
• Switch Hub

113
Direction: the following exercises required you to install the operating system and
drivers

1. Install operating system using Windows XP or Related operating system


using NTFS as file system with the partition of : 60% for drive C: and
40% for Drive D:
2. Install all driver drivers.
3. Configure TCP\IP address using Class C.
4. Crimp STRAIGHT THROUGH and perform sharing of printer and do
PRINT TEST to functional computer.
5. Crimp Cross Over and perform Sharing of folder.
6. Back up My Documents using Daily Back up.

Module Title : Configuring Computer Systems and Networks


LO 2 : Configure computer systems and networks
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC II


Unit of Competency : Configure Computer Systems and Networks
Module Title : Configuring Computer Systems and Networks

Learning Outcome 3: Inspect and test configured computer systems and


networks.

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the configuration done on


the systems and networks conforms with the manufacture’s
instruction/manual
2. Computer systems and networks are checked to ensure safe operation.
3. Report is prepared and completed according to company requirements.

114
References:

Module Title : Configuring Computer Systems and Networks


Lo3 : Inspect and test configured computer systems and networks.
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

LEARNING EXPERIENCES / ACTIVITIES:

Learning Outcome 3: Inspect and test configured computer systems and


networks.

Learning Activities Special Instruction

1. Read operation Sheet 3.1 to 3.3

2. perform operation sheet 3.1 to 3.3

115
• Do not write anything on the module
3. Do the Self Check • Prepare a separate sheet of paper on the
Self-Check and Activity.

2. Read activity sheet 1.1 and perform

Republic of the Philippines


Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Operation Sheet 3.1

Task manager

Checking OS performance using Task Manage

Steps:
1. Press Ctrl + Alt + Del

116
2. Click Application Tab( you can see the running and not responding
programs)

At the bottom
you can choice to
end the process
to switch the
process to other
program or to
open a new task.

3. Click Process Tab


You can select
process program
and you can end
the process

You can see the


performance of
your system
4. Click Performance Tab

117
5. Click Networking TAB

Republic of the Philippines


Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Operation Sheet 3.2

Testing Patch Cable

Steps:

1. Get the patch cable.

2. insert the patch cable to RJ45 port to cable tester

118
3. Observe the light of cable tester if the 1 to 8 led are lighted equally.
Note: if Straight through the 1 to 8 led of cable tester are lighted concurrently.
If Cross over the light of
No. 1 is No. 3 to the other end
No. 2 is No. 6 to the other end
No. 3 is No. 1 to the other end
No. 2 is No. 6 to the other end
The other end No. is simultaneously.

Republic of the Philippines


Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Self – Check 3.1

A. Direction: write your answer on the space provided for:

Enumeration:
1. Keys to open Task manager
a.
b.
c.
2. Light of cable tester
a. Straight trought
1 to
2 to
3 to
4 to
5 to
6 to

119
7 to
8 to

b. Cross over
1 to
2 to
3 to
4 to
5 to
6 to
7 to
8 to

Republic of the Philippines


Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Activity Sheet 3.1

Checking Operating System And Network

Supplies and materials


• Activity Sheet
• UTP
• RJ45

Materials, tools and Equipment


• Cable tester
• Crimper
• Wire Cutter
• Switch Hub

120
Direction: the following exercises required you to check the OS and Cable

1. Check the processes and terminate the process of the suspicious viruses
2. Check the patch cable ether the patch cable is Cross over or Straight
Trough.

Module Title : Configuring Computer Systems and Networks


Lo3 : Inspect and test configured computer systems and networks.

Republic of the Philippines


Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Assessment Plan

Program / Course : Computer Hardware Servicing NC II


Unit of Competency : Configure Computer Systems and Networks
Module Title : Configuring Computer Systems and Networks
Assessment Methods
Oral Questioning
Demonstration

Work Sample
Observation

Write Test

Assessment Criteria

LO 1. PLAN AND PREPARE FOR CONFIGURATION


1. Configuring computer systems and networks
identified from the Job/Service Order or

121
instructions.
2. Planning and preparing job requirements.
3. Followed OHS policies and procedures of job
requirements.
4. Checking computer systems and networks
configuration with specified requirements.
5. Checking necessary tools, equipment materials as
per job requirements

LO 2. CONFIGURE COMPUTER SYSTEMS AND NETWORKS

1. Appropriate Personal Protective Equipment are


used and OHS policies and procedures followed
2. Checking normal function of systems and
networks in accordance with manufacturer’s
instructions
3. Diagnosing fault or problem in the systems and
networks in line with the standard operating
procedures.
4. Configuring computer systems and networks in
line with the standard operating procedures.
LO 3. INSPECT AND TEST CONFIGURED COMPUTER SYSTEMS AND
NETWORKS
1. undertaking final inspections to ensure that the
configuration done on the systems and networks
conforms with the manufacture’s instruction/manual
2. Checking computer systems and networks to
ensure safe operation as per job requirements.
3. Completing report is prepared according to
company requirements.
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Observation Checklist

Trainees’ Name:
Trainer’s Name:
Name of School:
Competency
Standards:
Unit of Competency:
Instructions for the trainer:
1. Observe the trainee [insert description of activity being observed].
2. Describe the assessment activity and the date of which it was undertaken.
3. Place a tick in the box to show that the student completed each aspect of
the activity to the standard expected in the enterprise.
4. Complete the feedback sections of the form.

122
Date of Observation
Description of
assessment activity
Location of assessment
activity
The Trainee…. If yes, tick the
box
• Can










Did the trainees overall performance meet the standard? Yes No

Feedback to trainee:
Trainer’s Signature: Date:

Module Title : Installing Computer Systems and Networks


Assessment Plan
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Observation and Questioning Checklist

Trainees’ Name:
Trainer’s Name:
Name of School:
Competency
Standards:
Unit of Competency:
Instructions for the trainer:
1. Observe the trainee [insert description of activity being observed].
2. Describe the assessment activity and the date of which it was undertaken.
3. Place a tick in the box to show that the student completed each aspect of
the activity to the standard expected in the enterprise.
4. Ask the student a selection of the questions from the attached list to
confirm his/her underpinning knowledge.

123
5. Place a tick in the box to show that the student answered the questions
correctly.
6. Complete the feedback sections of the form.
Date of Observation
Description of
assessment activity
Location of assessment
activity
The Trainee…. If yes, tick the
box
• Can







Did the trainees overall performance meet the standard? Yes No

Feedback to trainee:
Trainer’s Signature: Date:

Module Title : Installing Computer Systems and Networks


Assessment Plan
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Demonstration

Trainees’ Name:
Trainer’s Name:
Name of School:
Competency
Standards:
Unit of Competency:
Instructions for the trainer:

Given the necessary materials the trainee must be able to:

Materials and Equipment:

124
The Trainee…. √ to show if evidence is
demonstration
During the demonstration of skills, did the student: Yes No N/A








The trainee’s demonstration was:]
Satisfactory Not Satisfactory

Module Title : Installing Computer Systems and Networks


Assessment Plan

125
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Written Report

Trainees’ Name:
Trainer’s Name:
Name of School:
Competency
Standards:
Unit of Competency:
Task
Your Task is to:
• [insert description of task]

Submission date:
Use the checklist before as a basis for judging whether the trainee’s report meets
the required competency standards.
The trainee’s report…. If yes, tick the
box
• Can






Did the trainees overall performance meet the standard? Yes No

Comments:

Trainee’s Signature: Date:


Trainer’s Signature Date:

Module Title : Installing Computer Systems and Networks


Assessment Plan

126
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Performance Test
Trainee’s Name: Date:
Competency : Test Attempt
1st 2nd 3rd

Directions: OVERALL EVALUATION


Level PERFORMANCE LEVEL
CALL TRANEER, ask trainer Achieved
to assess your performance in 4 – Can perform this skills
the following critical task and without supervision and with
performance critical below. initiative and adaptability to
problem situations.
3 – Can perform this skill
You will be rated based on the satisfactorily without assistance
overall evaluation on the right or supervision.
side 2 - Can perform this skill
satisfactorily, but requires some
assistance and / or supervision
1 - Can perform this skill
satisfactorily, but requires
considerable assistance and / or
supervision
Teacher will initial level achieve

Performance Yes No N/A


For acceptable achievement, all items should receive a
“Yes” or “No” response.
Get from performance criteria of the module

Module title Installing Computer Systems and Networks


Assessment

127
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Answer key 1.1

1. Write the minimum system of the following Operating Systems?


CPU Memory Hard disk Video
Windows 98 a 486DX 16 MB 175 MB VGA(16 bit)
66
megahertz
(MHz)
Windows 2000 133 MHz 64 MB 2GB VGA
Windows XP professional 300 64 MB 1.5 GB Super VGA
MHz (800 x 600)

B. Direction: Name the following measuring tools and materials:

1. Crimper 2. Wire Cutter 3. Cable Tester

4. Start up Disk 5. Motherboard Driver

128
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Answer key 2.1

Fill the blank

1. Disk Partitioning the act or practice of dividing the storage space of a hard disk
drive into separate data areas
2. 192- 223 Possible number in first octet in class C IP address
3. Typical Installation The recommended type of installation
4. Compose of 32 bits and 4 octet every octet compose of 8 bits Describe the
format of IP Address
5. Peer to Peer type of network in which each workstation has equivalent
capabilities and responsibilities.

129
Republic of the Philippines
Technical Education and Skills Development Authority
Philippine International Technological School
Jose Abad Santos St., Digos City

Answer key 3.1

Enumeration:
1. Keys to open Task manager
a. CTRL
b. ALT
c. DELETE
2. Light of cable tester
a. Straight thought
1 to 1
2 to 2
3 to 3
4 to 4
5 to 5
6 to 6
7 to 7
8 to 8

b. Cross over
1 to 3
2 to 6
3 to 1
4 to 4
5 to 5
6 to 2
7 to 7
8 to 8

130

You might also like