TLE10 - Q2 - Mod1 - Configuring-Computer-System-and-Network - v3 Edited
TLE10 - Q2 - Mod1 - Configuring-Computer-System-and-Network - v3 Edited
This lesson is intended to develop your skills in planning and preparing for
configuration of computer system and networks.
This module was designed and written with you in mind. It is here to help you
master configuring computer systems and networks. The scope of this module permits
it to be used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.
The module is designed to give you the proper procedures used in configuring
computer systems and networks.
What’s In
When you install a new device or program, you sometimes need to configure, which
means that you need to set various switches and jumpers (for hardware) and to
define values of parameters (for software). Thanks to technological advancements,
such as plug-and-play, much of this configuration is now performed automatically.
11
What’s New
You are now ready to explore configuring computer system and networks but
first you need to bear in mind the safety procedures related to networks. Your
understanding on the basic safety procedures below will help you better understand
the safety precautions in configuring computer system and network.
Mark asterisk * is the statement suggest a safety measures and if does not.
___1. Wear safety googles while working on computer cables and wire.
___2. Do not bring any food inside the workplace.
___3. Do not follow safety guidelines inside the working area.
What is It
Safety Precautions Related to Networks
Installation of network cables, whether copper or fiber-optic, can be dangerous.
You should wear clothing such as long pants, a long-sleeved shirt, sturdy shoes that
cover your feet, and gloves to protect you from those toxic materials. Most importantly,
wear safety glasses. If possible, ask building management, or someone responsible
for the building, if there are any dangerous materials or obstacles that you need to be
aware of before entering the ceiling area.
• Read the labels on the ladder, and follow any safety instructions written on it.
• Never stand on the top rung of the ladder. You could easily lose your balance
and fall.
• Make sure that people in the area know you will be working there. Cordon off
the area with caution tape or safety cones.
• When you are using a ladder that leans up against a wall, follow the instructions
written on the ladder, and have someone hold the ladder to help keep it steady.
The tools required to install copper and fiber-optic cable may cause danger
through improper use. When working with cables, strictly follow these safety rules:
✓ Make sure that the tools you are using are in good working condition.
✓ Watch what you are doing, and take your time.
✓ Make sure that you do not cut yourself or place anyone in danger.
✓ Always wear safety glasses when cutting, stripping, or splicing cables of any
kind. Tiny fragments can injure your eyes.
✓ Wear gloves whenever possible, and dispose any waste properly.
✓ Use common sense when installing cables and fixing network problems. Call
for assistance for tasks that you cannot do on your own.
2
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain
hazards:
• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm
Chemicals
The solvents and glues used with fiber optics are dangerous. You should
handle them with extreme care. Read the instructions on the label, and follow them
carefully. Also, read the material safety data sheet (MSDS) that accompanies the
chemicals to know how to treat someone in case of emergency.
Tools
When working with any tool, safety should always be your first priority. Any
compromise in safety could result in serious injury or even death. The tools used for
working with fiber optics have sharp cutting surfaces that are used to scribe glass.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can
produce tiny fragments of glass or plastic that can penetrate your eyes or skin and
cause severe irritation. The fibers can be extremely difficult to see on your skin
because they are clear and small.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands.
The light is a color that humans cannot see. It can damage your eyes before you can
feel it.
3
What’s More
4
What I Have Learned
1. Installing network cables, whether copper or fiber optic, can be dangerous.
2. A safe work space is clean, organized and well-lit.
3. Follow basic safety guidelines to prevent cuts, burns, electrical shock and
damage to eyesight.
4. Follow safety guidelines to protect equipment and lives.
What I Can Do
Directions: Cite of a scenario that an accident will likely to happened in a workplace.
Prepare action plan on how to prevent the occurrence of such accident .
1. ______________________________________
2. ______________________________________
3. ______________________________________
4. ______________________________________
5. ______________________________________
Additional Activities.
Directions: List down activities at home that needs safety precautions.
1. ______________________________________
2. ______________________________________
3. ______________________________________
4. ______________________________________
5. ______________________________________
5
Lesson
Networking Devices, Media
2 and Connector
What’s In
You have already discussed in your Grade 9 CHS class the different devices
used in networking and which provides you the knowledge on the common networking
cables that are essential in putting up a network. You are now ready to proceed. Good
luck and enjoy!
What’s New
To make data transmission more extensible and efficient than a simple peer-
to-peer network, network designers use specialized network devices such as hubs,
switches, routers, and wireless access points to send data between devices.
What is It
Common Network Cables
A wide variety of networking cables are available. Coaxial and twisted-pair
cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit
data.
6
Twisted pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a circuit that
transmit data.
Source: https://medium.com/@bilby_yang/compasion-between-utp-and-stp-27f7ac1d61aa
Figure 1. UTP and STP cable
Two basic types of twisted pair cables:
• Unshielded twisted pair (UTP) is the cable that has two or four pairs of
wires. This type of cable relies solely on the cancellation effect produced
by the twisted-wire pairs that limits signal degradation caused by
electromagnetic interface (EMI) and radio frequency interference (RFI).
• Shielded twisted pair (STP), each pair of wire is wrapped in metallic
foil to better shield the wires from noise. Four pairs of wires are then
wrapped in an overall metallic braid or foil. STP reduces electrical noise
from within the cable
Category Rating
7
Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet
Source: https://ph.rs-online.com/mobile/p/coaxial-cable/0822901/
Figure 2. Coaxial Cable
NeillConcelman” connectors, at the ends of the cables to make the connection.
Several types of coaxial cable exist:
Fiber optic cable has one or more optical fibers enclosed in a sheath or jacket.
Because it is made of glass, fiber-optic cable is not affected by EMI or RFI.
Source: www.indiamart.com
Figure 3. Fiber Optic cable
These are the two types of glass fiber-optic cable:
1. Multimode is the cable that has a thicker core than single-mode
cable. It is easier to make, can use simpler light sources such as Light
Emitting Diodes (LEDs), and works well over distances of a few
kilometers or less.
2. Single-mode is the cable that has a very thin core. It is harder to
make, uses lasers as a light source, and can transmit signals dozens
of kilometers with ease.
What’s More
8
Activity 1.1 Cable Wire Grouping
Direction: Complete the diagram of various type of cable wire
Twisted Pair Coaxial Cable Fiber Optic Cable
1. ____________ 1._______________
1. ____________
2. ____________ 2. ____________ 2._______________
3. ____________
4. ____________
1. ____________
2. ____________
3. ____________
4. ____________
Direction: Match the cable type in column A with their meaning in column B.
Write the letter of the correct answer on separate sheet of paper.
A B
metallic foil.
___3. Fiber optic cable c. A copper-cored cable surrounded
by a heavy shielding.
9
What I Can Do
Direction: List down equipment’s/materials made of cable in your house and identify
its type.
1.
2.
3.
4.
5.
Additional Activities
1. What are the different types of fiber connectors? Cite their advantages and
disadvantages.
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________.
10
14
13
Lesson
3 Internet Protocols
What I Know
Direction: Determine the type of internet protocol is being described below. Write
your answer in a separate sheet of paper
1
10 2
9 3
Internet
Protocol
8 4
7 5
6
11
1. It is a protocol used primarily on small windows NT networks.
2. The protocol used suit originally developed by Novell Corporations network
operating system.
3. Governs how files such as text, graphics, sound and video are echanged on
the World Wide Web.
4. Used securely connect to a remote computer
5. Suite of protocols has become the dominant standard for internetworking.
6. Is used to send email to a remote e-mail-server
7. It is an application used to connect to a remote computer that lacks security
features.
8. Is used to download e-mail from a remote mail server.
9. Is also used to download email from a mail server.
10.Provides services for file transfer and manipulation.
What’s In
To understand how networks and the Internet work, you must be familiar with
the commonly used protocols. These protocols are used to browse the web, send and
receive e-mails, and transfer data files.
What’s New
A protocol is a set of rules. A letter sent through the postal system also uses
protocols. Part of the protocol specifies where on the envelope the deliver address
needs to be written. If the delivery address is written in the wrong place, the letter
cannot be delivered. Internet protocol works in the similar way.
12
What is It
You will encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described below:
TCP/IP
HTTP IPX/SPX
Apple
NetBEUI
Talk
Internet
Protocol
IMAP FTP
SSH TelNet
SMTP
13
• SSH: Secure Shell is used to securely connect to a remote computer. Telnet:
It is an application used to connect to a remote computer that lacks security
features.
• POP3: Post Office Protocol is used to download e-mail from a remote mail
server.
• IMAP: Internet Message Access Protocol is also used to download e-mail from
a remote mail server.
• SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail
server.
What’s More
Direction: Write the name of the protocol for each protocol define on the table below.
Protocol Definition Protocol
1 Provides connections to computers over a
TCP/IP network
2.Sends e-mail over a TCP/IP network
3.Translates URLs to IP address
4. Automates assignment of IP address on a
network
5.Securely transports Web pages over a
TCP/IP network
6.Transport files over a TCP/IP network
14
What I Can Do
ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. HTTP 6.POP
2. TCP/IP 7.WWW
3. FTP 8.IPX/SPX
4. IMAP 9. NetBEUI
5. SSH 10.LAN
Assessment
Direction: Determine the type of internet protocol is being described below.
1
10 2
9 3
Internet
Protocol
8 4
7 5
6
15
7. It is an application used to connect to a remote computer that lacks security
features.
8. Is used to download e-mail from a remote mail server.
9. Is also used to download email from a mail server.
10.Provides services for file transfer and manipulation.
Additional Activities
To deepen your understanding with regard to the Internet Protocols, IP Address
and subnetting, utilize the Internet and the website www.professormesser.com,
watch and learn from the video presentations. Use the URLs below:
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
Reflection on the video presentations
Direction: Answer the essential questions below based on the video presentations
you watched. Write your answer on a clean sheet of paper.
1. What are the procedures involved in calculating IP address and the procedures
in converting IP address to binary and vice versa?
________________________________________________________
________________________________________________________
________________________________________________________
2. What are the different IP Classes? Discuss each briefly and give examples.
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
16
Lesson
4 PEER-TO-PEER NETWORK
What’s In
Now that you have completed your lesson in internet protocols, you are ready
to proceed on the next lesson on peer to peer network, This will help you understand
the types of network.
What’s New
17
What is It
Peer-to-Peer-Network
In a peer-to-peer network, devices are connected directly to each other
without any additional networking devices between them. In this type of network, each
device has equivalent capabilities and responsibilities. Individual users are
responsible for their own resources and can decide which data and devices to share.
Because of that, the network has no central point of control or administration
Source: www.itrelease.com
Figure 4. Peer-to-Peer Network
1. Make sure both systems have Network Interface Cards (NICs) installed and
are using the proper cables.
NOTE: For a direct network cable connection between two PCs (not with a
hub, switch or router), you need to have a cross-over cable.
2. For PCs with Windows XP, the home networking wizard can be used to set
18
up Windows for your network.
a. Click Start, and then Control Panel.
b. Select Network and internet connections.
c. Double-click Network setup wizard and follow the on-screen
instructions.
NOTE: If the Network setup wizard is unsuccessful, continue with the steps
below.
3.Click Start, Control Panel, Network and Internet Connections, and then
Network Connections. At Network Connection Windows, you will see the Local Area
Connection Icon, Right click it and select Properties. Local Area Connection window
appears.
NOTE: If any of the above component is not installed, install them by selecting
Add or Install, and then selecting the missing component, and clicking Add.
6. In the Subnet mask field enter: 255.255.255.0 All PCs on the same
19
network use the same subnet mask. Click the Ok button to finish configuration
and to close the Local Area Connection Properties windows.
NOTE: The Domain Name System (DNS) is optional. If you have a DNS system
and your connected to ISP you can input an IP address which came from the
DNS server
7. Click the Computer Name tab and click the Change button.
8. Enter a name that describes the PC in the Computer Description field.
For example, KIDSPC1, MOMSPC2, or WORKPC3.
9. Enter the workgroup name for your network. Use the same workgroup
name for all PCs on the network. Spelling is important in this step.
10. Repeat these steps for each PC on the network.
11. Wait two minutes after Windows opens on all PCs, and then double-click
the Network Neighborhood icon on the desktop. If all went well, you
should see all the PC names on the network when files and folders are
being shared. If you do not see them, press F5 to refresh the screen.
12. If after refreshing the network window, the other PCs still do not appear,
check the firewall settings that may be interfering with the
communication.
20
Client-Server Network
In a client/server network, the server provides the requested information or
service to the client. Servers on a client/server network commonly perform some of
the processing work for client machines, such as sorting through a database before
delivering specific the records requested by the client
What’s More
Direction: Using the table below, cite the features of peer-to-peer and client-server
network.
Peer-to-peer Network Client/Server Network
1.
2.
3.
4.
5.
6.
21
What I Have Learned
1. In a peer-to-peer network, devices are connected directly to each
other without any additional networking devices between them. It
allows certain files and folders to be shared with everyone or with
selected users. Peer-to-peer networks are quite common in small
offices that do not use a dedicated file server.
2. In a client/server network, the server provides the requested
information or service to the client. Servers on a client/server
network commonly perform some of the processing work for client
machines, such as sorting through a database before delivering only
the records requested by the client.
What I Can Do
Peer-to-Peer Study
Direction: Using different references available such as articles, books, internet and
publications, investigate and search for the advantages and
disadvantages of peer-to-peer network.
Advantages Disadvantages
1
5.
22
Additional Activities
Comparison
Direction: Using table below, cite the features of peer-to-peer and client/server
network in the table below.
2.
3.
4.
5.
23