Académique Documents
Professionnel Documents
Culture Documents
Sector:
Qualification Title:
COM PUTER SYSTEM S SERVICING NCII
Unit of Competency:
SET UP COMPUTER NETWORK
Module Title:
SETTING UP COMPUTER NETWORK
List of Competencies
in an accounting journal.
and activities related to configuring Client Device Setting, LAN, WAN, Wireless
Sheets. Follow and perform the activities on your own. If you have questions,
Remember to:
Work through all the information and complete the activities in each
section.
module.
He is there to support you and show you the correct way of doing
things.
practice on the job. Make sure you practice your new skills during
end of each section to test your own progress. Use the Performance
performance.
When you feel confident that you have had sufficient practice, ask
You need to complete this module before you can perform the next
Introduction:
This module covers the outcomes required in setting-up computers networks for
LANs and small-office home-office (SOHO) systems. It consists of competencies to install
Internet cables, set network configuration, set router/Wi-Fi/ wireless access point/repeater
configuration as well as to inspect and test the configured computer networks.
Learning Outcome:
Assessment Criteria:
systems requirements.
3. Tools, equipment and testing de vice s needed to carry out the installation
requirements
network design.
11. Any fault or problem in the network system is diagnosed and remedied in
12. Network interface card (NIC) settings are configured in accordance with
network design.
established procedures
20. Final inspections are undertaken to ensure that the configuration done on
instruction/manual
CONTENTS:
1. Configure Client Device Systems
2. Configure LAN (Local Area Network)
3. Configure WAN (Wide Area Network)
4. Configure Wireless Settings
5. Setting Up Firewall with Advanced Security
ASSESSMENT CRITERIA:
CONDITIONS:
Students/trainees must provide with the following
WORKPLACE LOCATION
COMPUTER MATERIALS:
UTPCABLE
RJ45
ROUTER/HUB
MODEM
PERSONAL COMPUTER
ASSESSMENT METHOD:
1. Written Works
2. Actual Application
3. Performance Criteria
Answer Self- Check 3.1-1 on Configure Compare your answer to the answer
Client Device Systems Key 3.1-1. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information
sheet and go over the self-check
again.
Read information sheet 3.1-2 on Configure If you have some problem on the content of
Local Area Network the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.
Answer Self- Check 3.1-2 on Configure Compare your answer to the answer
Local Area Network Key 3.1-2. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information
sheet and go over the self-check again.
Perform Task Sheet 3.1-2 on How to evaluates the performance and makes
Configure LAN (Local Area Network) recommendations.
Answer Self- Check 3.1-3 on Configure Compare your answer to the answer
WAN (Wide Area Network) Key 3.1-3. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information
sheet and go over the self-check
again.
Read information sheet 3.1-4 on Configure If you have some problem on the content of
Wireless Settings the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.
Answer Self- Check 3.1-4 on Configure Compare your answer to the answer
Wireless Settings Key 3.1-4. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information sheet
and go over the self-check
again.
Read information sheet 3.1-5 Setting up If you have some problem on the content of
Firewall with Advanced Security the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.
Date Developed: Document No.
Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Date Developed: Document No.
Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Answer Self- Check 3.1-5 on Setting up Compare your answer to the answer
Firewall with Advanced Security key 3.1-5. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not revie w the information
sheet and go over the self-check again.
Learning Objectives:
Client Device Settings is a way of configuring your client device by which you can specify
client settings at a collection level, allowing you to define different settings as necessary. It
has the characteristics of being flexible to create multiple client device or client user settings
and apply it to different collections as per requirement. It is a set of default settings. But
always take note that those Client De vice systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences. In this module, we will show the steps
on setting up your client de vice on Windows 7, 8 & 10 which are configured manually.
a. On windows 10 OS, to set up the time and date go to the right bottom of the task bar.
b. Right click on the area of time and date then choose “adjust date/time”. Then the
date/time setting will appear.
c. If you wish to set your date/time automatically just click “ON” at “Set time
automatically”. If not, you can turn off and be the one to set date/time
d. You can also set “Time zone” it is located below change date and time. You could
choose Beijing, Kuala Lumpur or Taipei, Philippines is none of the choices just
choose a Time zone that much on our time “UTC+8”
a. In setting up your Computer Name, go to start menu and search for “My Pc” and
other windows OS version you can find it on desktop a computer icon with a name of
“My Computer”.
b. Then “control panel” will appear. Click on “Change Settings”
Note: Setting up your Computer Name is important. This will serve as the identity of
your computer. It will be useful when it comes on setting up your computer network. The
server/Netwrok will identify what PC is being connected or configured.
Open the Internet Protocol Version 4 properties on the next computer. Follow the steps
above on the second computer to open the Internet Protocol Version 4 (TCP/IPv4)
Properties window.
TRUE OR FALSE: Write the word TRUE in the space provider if the statements
______2. On Windows 10 OS, to set up the Time and Date go to the upper left
of your taskbar.
______3. Setting up your Computer Name is important. This will serve as the
______8. In setting up the Time Zone, you could use "Philippines" for the
setting.
consider.
Learning Objective:
A Local Area Network (LAN) is a group of computers and associated devices that
share a common communications line or wireless link to a server. Typically, a
LAN encompasses computers and peripherals connected to a server within a distinct
geographic area such as an office or a commercial establishment. Computers
and other mobile devices use a LAN connection to share resources such as a printer or
network storage.
Internet Cable - are networking hardware used to connect one network device to other
network de vice s or to connect two or more computers to share printers, scanners etc.
Different types of network cables, such as coaxial cable, optical fiber cable, and twisted pair
cables, are used depending on the network's physical layer, topology, and size. The de vice s
can be separated by a few meters (e.g. via Ethernet) or nearly unlimited distances.
Modem - is a device that send, receives, and translates information from the internet and
makes it available within the Local Area Network
When Equipments and Peripherals are all ready, we will now proceed on
Installing and Configuring Local Area Network. Below are steps in configuring
Local Area Network.
5. Plug the other end of the cable into an open LAN port.
This can be any open LAN port on either the router or the switch, depending on your
LAN setup.
6. Reset the Router.
In resetting your Router just click the small button on the back of your router using a
Pin or Ballpen and wait until all the icons in front of the Router will Lights on. See figure
below.
7. Go to browser either “Google Chrome” or “I explorer”. And type in the default IP Address.
Depends on Manufacturer. For this module, we will use 192.168.0.1.
8. Router Login will appear. Type on default username and password. “admin” is most
default username and password, still depends on manufacturer.
9. After encoding the default IP Address and entering the default username and password, the
Router User Interface will appear. We will now ready for Router Setting Up.
10. Click the Network Tab. And change your IP Address. Take note on the Sequence of your
IP Address. S ave and it will reboot.
11. Go to DHCP Tab, just click the Disable Button. And the browser will reboot.
Learning Objective:
As we gather all the peripherals and equipment needed we will proceed on Configuring Wide
Area Network. Same process with Router but this time we will use Modem or the Access
Point. See steps listed below:
1.Gather your Modem, Ethernet Cable and Personal Computer. Connect each peripheral
using the Ethernet Cable. Directly connect Modem to your Personal Computer using the
Ethernet Cable. This will just be use for the setting up processes
3. Go to browser either “Google Chrome” or “I explorer”. And type in the default IP Address
of your Modem. Depends on Manufacturer. For this module, we will use 192.168.0.254. And
a Dialog box will pop up and you will need to enter the default username and password. Use
“admin” for both username and password
Rearrange the given steps on how to configure W AN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.
______1. Gather your Modem, Ethernet Cable and Personal Computer. Connect
each peripheral using the Ethernet Cable.
______3. Go to Network Tab. Change your IP address. Click S ave then it wil l
reboot.
______4. Reset the Modem. In resetting your Modem just click the small button
at the back and wait until all the icons in front of the Modem will Lights on.
______7. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and password.
Learning Objectives:
A wireless network is a computer network that uses wireless data connections between
network nodes. Wireless networking is a method by which homes, telecommunications
networks and business installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations. Wireless
telecommunications networks are generally implemented and administered using radio
communication. A wireless local area network (WLAN) links two or more de vice s over a
short distance using a wireless distribution method, usually providing a connection through
an access point for internet access. The use of spread- spectrum or OFDM technologies may
allow users to move around within a local coverage area, and still remain connected to the
network. Products using the IEEE 802.11 WLAN standards are marketed under the Wi-Fi
brand name. Fixed wireless technology implements point-to- point links between computers
or networks at two distant locations, often using dedicated microwave or modulated laser
light beams over line of sight paths. It is often used in cities to connect networks in two or
more buildings without installing a wired link.
After configuring the Router and Modem we will now proceed on setting up the
wireless network.
a. Select the Start button, type De vice Manager in the search box, and then select De vice
Manager.
b. Expand Network adapters.
c. Look for a network adapter that might h ave wireless in the name
Put your wireless router somewhere where it will receive the strongest signal with the least
amount of interference. For better results, follow these tips:
Place the routeras close to the center of your home as possible to increase thestrength
of the wireless signal throughout your home.
b. Position the wireless router off the floor and away from walls and metal
objects,
such as metal file cabinets. The fewer physical obstructions between your PC and the
router's signal, the more likely that you'll be using the router's full signal strength.
Security is always important; with a wireless network, it's even more important because your
network's signal could be broadcast outside your home. If you don't help secure your
network, people with PCs nearby could access info stored on your network PCs and use your
Internet connection.
Change the default user name and password. This helps protect your router. Most router
manufacturers have a default user name and password on the router and a default network
name (also known as the SSID). Someone could use this info to access your router without
you knowing it. To help avoid that, change the default user name and password for your
router. See the documentation for your device for instructions.
Set up a security key (password) for your network. Wireless networks have a network
security key to help protect them from unauthorized access. We recommend using Wi-Fi
Protected Access 2 (WPA2) security if your router supports it. See the documentation for
your router for more detailed info, including what type of security is supported and how to set
it up.
Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and its
connected to the network, follow these steps to set up a network security key:
1. Select the Start button, look for Control Panel and click Network and Internet. Then
look for Network and Sharing Center.
The wizard will walk you through creating a network name and a security key. If your router
supports it, the wizard will default to Wi-Fi Protected Access (WPA or WPA2) security. We
recommend that you use WPA2, because it offers better security than WPA or Wired
Equivalent Privacy (WEP) security. With WPA2 or WPA you can also use a passphrase, so
you don’t have to remember a cryptic sequence of letters and numbers.
You can also save your security key on a USB flash drive by following the instructions in the
wizard. (Saving your security key to a USB flash drive is available in Windows 8 and
Windows 7, but not in Windows 10.)
2. In the list of networks, choose the network that you want to connect to,
Rearrange the given steps on how to configure W AN. Put the correct
_____5. Select the Start button, look for Control Panel and click Network and
Internet.
Learning Objective:
The Windows Firewall with Advanced Security is a tool which gives you detailed
control over the rules that are applied by the Windows Firewall. You can view all
the rules that are used by the Windows Firewall, change their properties, create
new rules or disable existing ones. In this tutorial we will share how to open the
Windows Firewall with Advanced Security, how to find your way around it and talk
about the types of rules that are available and what kind of traffic they filter.
A firewall is hardware or software that can help protect your PC from unauthorized
users or malicious software (malware). Running a firewall on each PC on your network can
help control the spread of malicious software on your network, and help protect your PCs
when you're accessing the Internet. Windows Firewall is included with this version of
Windows.
You have several alternatives to operating the Windows Firewall with Advance security:
1. One is to open the standard Windows Firewall window, by going to "Control Panel ->
System and Security -> Windows Firewall". Then, click or tap Advanced settings.
2. In Windows 7, another method is to search for the word firewall in the Start Menu
search box and click the "Windows Firewall with Advanced Security" result.
3. In Windows 8.1, Windows Firewall with Advanced Security is not returned in search
results and you need to use the first methodshared above for opening it.
4. The Windows Firewall with Advanced Security looks and works the same both in
Windows 7 and Windows 8.1. To continue our tutorial, we will use screenshots that were
made in Windows 8.1.
a. In order to provide the security you need, the Windows Firewall has a standard set
of inbound and outbound rules, which are enabled
c. These rules can be configured so that they are specific to: computers,users,
programs, services, ports or protocols. You can also specify to which type of network
adapter (e.g. wireless, cable, virtual private network) or user profile it is applied to.
d. In the Windows Firewall with Advanced Security, you can access all rules and edit
their properties. All you have to do is click or tap the appropriate section in the left-
side panel.
6. The rules used by the Windows Firewall can be enabled or disabled. The ones which are
enabled or active are marked with a green check-box in the Name column. The ones that are
disabled are marked with a gray check-box.
7. If you want to know more about a specific rule and learn its properties, right click on it and
select Properties or select it and press Properties in the column on right, which lists the
actions that are available for your selection.
8. In the Properties window, you will find complete information about the selected rule, what
it does and in when it is applied. You will also be able to edit its properties and change any of
the available parameters.
a. Connection security rules are used to secure traffic between two computers while it
crosses the network. One example would be a rule which defines that connections
between two specific computers must be encrypted.
b. Unlike the inbound or outbound rules, which are applied only to one
c. If you want to see if there are any such rules on your computer, click or tap
"Connection Security Rules"on the panel on the left. By default, there are no such
rules defined on Windows computers and devices. They are generally used in
business environments and such rules are set by the network administrator.
10. What Does the Windows Firewall with Advanced Security Monitor?
The Windows Firewall with Advanced Security includes some monitoring features as
well. In the Monitoring section you can find the following information: the firewall
rules that are active (both inbound and outbound), the connection security rules that
are active and whether there are any active security associations
TRUE OR FALSE: Write the word TRUE in the space provider if the statements
________1. A firewall is hardware or software that can help protect your PC from
________3. In order to provide the security you need, the Windows Firewall has
________4. These rules can't be configured so that they are specific to:
________5. In the Windows Firewall with Advanced Security, you can access all
________6. Connection security rules are used to secure traffic between two
________7. Monitoring section shows only the active rules for the current
network location.
________8. Unlike the inbound or outbound rules, which are applied only to one
computer, connection security rules require that both computers have the
________9. Windows Firewall with Advanced Security is a tool which gives you
detailed control over the rules that are applied by the Windows Firewall.
________10. Inbound rules are applied to the traffic that is coming from the
1 COVER PAGE
2 Qualification Title
4 Table of Contents
5 Module content
6 Learning experience
11 Self-check No.3.1-2
24 Self-check No 3.1-5
26 References
TRUE OR FALSE
1. False
2. False
3. True
4. True
5. True
6. True
7. False
8. False
9. False
10. True
IDENTIFICATION:
1. Personal Computer
2. Modem
3. Ethernet Cable
4. Router
5. LAN
6. 192.168.0.1
7. Admin
8. Network Tab
9. Reset
REARRANGE:
1. 2
2. 5
3. 7
4. 4
5. 3
6. 8
7. 6
8. 1
9. 5
10. 10
REARRANGE:
1. 5
2. 6
3. 9
4. 4
5. 7
6. 8
7. 3
8. 10
9. 2
10. 1
TRUE OR FALSE:
1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE
6. TRUE
7. TRUE
8. TRUE
9. TRUE
10. TRUE
INTERNET
1) http://www.tesda.gov.ph
a. CSS NCII TR
c. CSS SAG
2) http://wikihow.com
3) http://www.slideshare.net
Performance Objective: Given a Network Materials (Router and Internet Cable) together
with a Personal Computer you should Configure Local Area Network with allotted time of
40 minutes.
Personal Computer
Router and Internet Cable
Personal Protective Equipment(If necessary)
Pins/Ballpens(for reseting the router)
Steps/ Procedure:
2. Start
Assessment method:
CRITERIA YES NO
Performance Objective: Given a Network Materials (Router and Internet Cable) together
with a Personal Computer you should Configure Wide Area Network with allotted time of
40 minutes.
Personal Computer
Modem and Ethernet Cable
Personal Protective equipment(if necessary)
Pins/Ballpens(use for resetting the router)
Steps/ Procedure:
4. Start
Assessment Method: