0% found this document useful (1 vote)
174 views

Lesson Exemplar ICT Q3 LESSON EXEMPLAR ICT-CHS10 - IP CONFIGURATION

The document is a lesson plan for a computer hardware servicing class on configuring IP addresses. It includes the following: 1) Objectives to familiarize students with IP configuration concepts and assigning IP addresses. 2) An overview of internet protocols like TCP/IP and how they establish communication rules. 3) A demonstration of assigning static IP addresses on Windows, which involves opening the control panel, viewing network connections, changing settings of the network card, and inputting the IP address, subnet mask, and default gateway.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
174 views

Lesson Exemplar ICT Q3 LESSON EXEMPLAR ICT-CHS10 - IP CONFIGURATION

The document is a lesson plan for a computer hardware servicing class on configuring IP addresses. It includes the following: 1) Objectives to familiarize students with IP configuration concepts and assigning IP addresses. 2) An overview of internet protocols like TCP/IP and how they establish communication rules. 3) A demonstration of assigning static IP addresses on Windows, which involves opening the control panel, viewing network connections, changing settings of the network card, and inputting the IP address, subnet mask, and default gateway.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

MOLITON NATIONAL HIGH SCHOOL

Moliton, Pres. M.A. Roxas, Zamboanga del Norte

Lesson Exemplar
Computer Hardware Servicing
for Grade 10– ICT/CHS
(Third Quarter – Week 4)
I. OBJECTIVES
A. Content Standards The learner demonstrates understanding of the underlying concepts and
principles in configuring computer systems and networks.
B. Performance Standards The learner independently demonstrates skills in configuring computer systems
and networks as prescribed by TESDA Training Regulations.
C. Learning LEARNING COMPETENCY:
Competencies/Objecti a. Configure Computer Systems and Network.
ves OBJECTIVES:
1. Familiarize the concept of IP configuration.
2. Assign IP Address.

LC Code TLE_ICTCS9-12CC IIg-2


II. CONTENT Assigned IP Address and Configuration
III. LEARNING RESOURCES
A. Reference
1. Teacher’s Guide TG for ICT-CHS Page 30-33
2. Learner’s Grade 10 TLE- ICT /CHS pages98-102
Materials Pages
3. Textbook Pages
B. Other Learning  Multimedia Presentation embedded with Hyperlink
Resources  LCD Projector
 www.professormesser.com
IV. PROCEDURES
A. Reviewing previous lesson Ask:
or presenting the new 1. What is your idea about Internet Protocol?
lesson 2. How would you describe its role in Computer systems
configuration?
B. Establishing a purpose of OBJECTIVES:
the lesson 1. Familiarize the concept Internet Protocol and Configuration.
2. Identify the different IP configuration assigned.
C. Presenting Showing a picture of an IP address sample and ask the following
examples/instances of the questions to the students:
new lesson 1. What have you seen in the picture?
2. What do you think are there use or importance?
3. How would you relate this picture to our lesson this morning?
D. Discussing new concepts Discuss the following through PowerPoint presentation:
and practicing skills #1 Internet Protocols
A protocol is a set of rules. A letter sent through the postal system
also uses protocols. Part of the protocol specifies where on the
envelope the delivery address needs to be written. If the delivery
address is written in the wrong place, the letter cannot be
delivered. Internet protocol works in a similar way. Internet
protocols are sets of rules governing communication within and
between computers on a network. Protocol specifications define
the format of the messages to be exchanged. Timing is crucial to
network operation. Protocols require messages to arrive within a
certain amount of time so that computers do not wait indefinitely
for messages that may have been lost. Therefore, systems maintain
one or more times during transmission of data. Protocols also
initiate alternative actions if the network does not meet the timing
rules. Many protocols consist of a suite of other protocols that are
stacked in layers. These layers depend on the operation of the
other layers in the suite to function properly.
The main functions of protocols are:

 Identifying errors
 Compressing the data
 Deciding how the data should be sent
 Addressing the data
 Deciding how to announce sent and received data

To understand how networks and the Internet work, you must be


familiar with the commonly used protocols. These protocols are
used to browse the web, send and receive e-mail, and transfer data
files. You will encounter other protocols as your experience in IT
grows, but they are not used as often as the common protocols
described here:

TCP/IP: The Transmission Control Protocol /Internet Protocol


(TCP/IP) suite of protocols has become the dominant standard for
internetworking. TCP/IP represents a set of public standards that
specify how packets of information are exchanged between
computers over one or more networks.
IPX/SPX: Internetwork Packet Exchange/Sequenced Packet
Exchange is the protocol suite originally employed by Novell
Corporation’s network operating system, NetWare. It delivers
functions similar to those included in TCP/IP. Novell in its current
releases supports the TCP/IP suite. A large installed base of
NetWare networks continues to use IPX/SPX.

NetBEUI: NetBIOS Extended User Interface is a protocol used


primarily on small Windows NT networks. NetBEUI cannot be
routed or used by routers to talk to each other on a large network.
NetBEUI is suitable for small peer-to-peer networks, involving a
few computers directly connected to each other. It can be used in
conjunction with another routable protocol such as TCP/IP. This
gives the network administrator the advantages of the high
performance of NetBEUI within the local network and the ability to
communicate beyond the LAN over TCP/IP.

AppleTalk: AppleTalk is a protocol suite used to network


Macintosh computers. It is composed of a comprehensive set of
protocols that span the seven layers of the Open Systems
Interconnection (OSI) reference model. The AppleTalk protocol
was designed to run over LocalTalk, which is the Apple LAN
physical topology. This protocol is also designed to run over major
LAN types, notably Ethernet and Token Ring.
HTTP: Hypertext Transfer Protocol governs how files such as text,
graphics, sound, and video are exchanged on the World Wide Web
(WWW). The Internet Engineering Task Force (IETF) developed
the standards for HTTP. FTP: File Transfer Protocol provides
services for file transfer and manipulation. FTP allows multiple
simultaneous connections to remote file systems.
SSH: Secure Shell is used to securely connect to a remote
computer.  Telnet: It is an application used to connect to a
remote computer that lacks security features.
POP3: Post Office Protocol is used to download e-mail from a
remote mail server.
IMAP: Internet Message Access Protocol is also used to download
e-mail from a remote mail server.
SMTP: Simple Mail Transfer Protocol is used to send e-mail to a
remote e-mail server. The more you understand about each of
these protocols, the more you will understand how networks and
the Internet work.
E. Discussing new concepts The teacher will demonstrate the following and let the students to
and practicing skills #2 watch a video:
To deepen their understanding with regard to the Internet Protocols, IP
Address and subneting, utilize the Internet and the website
www.professormesser.com,
watch and learn from the video presentations. Use the URLs below:
http://www.professormesser.com/n10-005/binary-math-2/
http://www.professormesser.com/n10-005/ip-classes/
http://www.professormesser.com/n10-005/networkingprotocols/
http://www.professormesser.com/n10-005/subnetting/

A. Introducing the IP Addressing


B. The five classes of IP Address
C. Subnet Mask
D. IP Configuration and it Process
The process of using the ipconfiguration command:
1) Click on Start Button, then type cmd (command prompt) on the
search box. 2) A black screen will appear as shown in the figure
below.

Figure 51. Command Prompt Window


3. Type ipconfig and press enter. The figure below shows the IP
configuration window using the ipconfig command. The
information from this window will be useful because it shows the
IP address, subnet mask and default gateway of a network you are
connected to.

Assigning a static IP Address


Here are the procedures in assigning an IP Address on a windows base
computer system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP)
5. Click the Properties button. The Internet Protocol (TCP/IP)
Properties dialog box appears.
6. Type the IP address for your computer. Enter the appropriate IP
Address in the IP address section.
7. Type a subnet mask. The value used on a local network is
commonly 255.255.255.0, but it can be different, such as
255.255.255.127.
8. Type the default gateway address. The default gateway is the
router, so type the router’s address. Figure 54 shows an example
of assigning an IP Address, Subnet mask and default gateway
9. Type the address for the preferred DNS server. The address should
be obtained from your Internet Service Protocol. It is used to help
your computer find web pages and other addresses on the internet.
10. Type the address for the alternate DNS server. The alternate
Domain Name System (DNS) server’s IP address is something
that your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.

Assigning a Dynamic IP Address

Dynamic Host Configuration Protocol (DHCP) is a software utility


used to dynamically assign IP addresses to network devices. This dynamic
process eliminates the need to manually assign IP addresses. A DHCP
server can be set up and the hosts can be configured to automatically
obtain an IP address. When a computer is set to obtain an IP address
automatically, the other entire IP addressing configuration boxes are
dimmed or disabled. The server maintains a list of IP
addresses to assign, and it manages the process so that every device on the
network receives a unique IP address. Each address is held for a
predetermined amount of time. When the time expires, the DHCP server
can use this address for any computer that joins the network.
These are the IP address information that a DHCP server can assign to
hosts:
 IP address  Subnet mask
 Default gateway
 Optional values, such as a Domain Name System (DNS) server
address

1. Developing Mastery Task 1. Identifying IP Address Classes


Directions: In this worksheet, your teacher will write several IP addresses
with their appropriate subnet masks. You will copy the IP address and
Subnet Mask. You will write which IP Address Class is appropriate in the
IP Address Class column in the chart below. An example has been
provided for you.

Be prepared to discuss the IP Address Class you select.


IP Address Subnet Mask IP Address Class
10.0.0.0 255.0.0.0 A

Task 2 – Group Task (Hands-on activity)


1. Have a group of 5 members.
2. Each group will proceed to their assigned PC.
3. Follow the given direction:

Configure an Ethernet NIC to use DHCP


Directions: Configure an Ethernet NIC to use DHCP to obtain an IP
address. You need to follow the procedures given below and apply safety
precautions in accomplishing this task. While doing the activity, you have
to answer activity questions written after every step. Write your answer in
a clean sheet of paper. Your performance will be rated based on the
performance rubrics.
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance

Recommended Equipment
 Linksys 300N router
 A computer running Window XP Professional
 Ethernet patch cable
Procedures:
Step 1
 Plug one end of the Ethernet patch cable into “Port 1” at the back
of the router.
 Plug the other end of the Ethernet patch cable into the network
port on the NIC in your computer.
 Plug in the power cable of the router if it is not already plugged in.
 Turn on your computer and log on to Windows as an
administrator.
 Click Start.
 Right-click My Network Places, and then choose Properties.
 The “Network Connections” window appears.
Step 2
 Right-click Local Area Connection, and then choose Properties.
 The “Local Area Connection Properties” window appears.

Figure 60. Local Area Connection Properties

Activity Questions:
1. What is the name and model number of the NIC in the “Connect
using:” field?
2. What are the items listed in the “This connection uses the following
items:” field?

Step 3
 Choose Internet Protocol (TCP/IP).
 Click Properties.
 The “Internet Protocol (TCP/IP) Properties” window appears.
 Click OK.
 Restart your computer.

Step 4
 Log on to Windows as an administrator.
 Check the lights at the back of the NIC. These lights will blink
when there is network activity.
 Choose Start > Run.
 Type cmd and click OK.

Figure 63. Run Window

 Type ipconfig/all, and then press the Enter key


Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter
Local Area Network Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?

Task 3
Direction. In the puzzle below, look for the fifteen (15) hidden words
(horizontal, vertical, diagonal and reversed).
Reveal the terms for IP Address and Configuration

I M U P A R H P R O C E S S J C
Z N B Q W E T R Y U I O P L K O
L S T A G H J K L A R E O A M M
A T A E Q I P A D D R E S S N M
P C D C R A D O L P D S G S B A
P P Y F B N A S D F N P H I V N
L I N O H Z E V B N J O E G C D
E P A C T H U T D F F O N N X P
T A M R T G H O P F D I T O Z R
A A I T P K L L R A C T E A O
L D C H O A C U T R O I E R S M
K E C O N F I G U R A T I O N P
T R U O L P L O B U N A O S D T
D H C P D I M A P D U T F C H E
C U T R U M P E S S N S C V O R
C O N T R O L P R O T O C O L L
2. Finding Practical Ask:
applications of concepts As ICT/CHS student, how would you apply your learning on IP
and skills in daily living Configuration?

VALUES INTEGRATION:(EdukasyonsaPagpapakatao)
1. In what real life situation you can apply the word “configuration”?
Give instances.
2. How would value the things that are related to you?
3. Making generalizations and Ask:
abstractions about the 1. W hat are the classes of IP Address?
lesson 2. How to configure and assign IP Address?
3. Why is there a need to configure IP address?
4. Evaluating Learning NOTE:
The hands on activity serves as evaluation of the day guided with
criteria/rubrics.
5. Additional activities for
application or remediation
V. Remarks:
VI. Reflection:
A. No. of learners who earned
80% in the evaluation.
B. No. of learners who require
additional activities for
remediation who scored
below 80%.
C. Did the remedial lesson
work? No. of learners who
caught up with the lesson.
D. No. of learners who
continue to require
remediation.
E. Which of my teaching
strategies worked well?
Why did these work?
F. What difficulties encounter
which my principal or
supervisor can help me
solve?
G. What innovation or
localized materials did I
use/ discover which I wish
to share with other
teachers?

Prepared by:

QUEENIE GRACE A. BARTONICO


Moliton National High School

Corroborated by:

SANNY JOY C. ANGCON CLAUDIA E. TAGBAC


Bulawan Integrated School Sitog National High School

JUNIFER C. MALAQUE JAKE ANDREW J. GONZALEZ REICH P. JANOLINO


Bartolome Aripal Memorial NHS Rizal National High School Polanco National High School

LOURMA I. POCULAN, CESE


Assistant Schools Division Superintendent

You might also like