Vous êtes sur la page 1sur 42

COMPETENCY-BASED LEARNING MATERIAL

Sector:

Qualification Title:
COM PUTER SYSTEM S SERVICING NCII

Unit of Competency:
SET UP COMPUTER NETWORK

Module Title:
SETTING UP COMPUTER NETWORK

SOUTHERN LUZON STATE UNIVERSITY


Lucena Campus
Brgy. IbabangDupay Lucena City

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
QUALIFICATION TITLE
COM PUTER SYSTEM S SERVICING NCII

COMPETENCY BASED LEARNING MATERIALS

List of Competencies

No. Unit of Comptency Module Title Code

1. Install and configure Installing and Configuring


computer systems computer systems ELC724331

2. Set-up Computer Setting-up computer networks


Networks ELC724332

3. Set-up Computer Setting-up Computer Servers


Servers ELC724333

4. Maintain and Repair Maintaining and repairing


Computer Systems and computer systems and networks ELC724334
Networks

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIALS

Welcome to the unit of competency, “Setting up Computer Networks”, is one of the

competencies of Computer Systems Servicing NCII, a course which comprises

the knowledge, skills and attitudes in logging/recording business transactions

in an accounting journal.

The module, setting up computer networks, contains training materials

and activities related to configuring Client Device Setting, LAN, WAN, Wireless

Settings and Configuring Firewall with Advance Settings.

In this module, you are required to go through a series of learning

activities in order to complete each learning outcome. In each learning outcome

are Information Sheets, Self-Checks, Operation Sheets and Task/Job

Sheets. Follow and perform the activities on your own. If you have questions,

do not hesitate to ask for assistance from your facilitator.

Remember to:

Work through all the information and complete the activities in each

section.

Read information sheets and complete the self-check. Suggested

references are included to supplement the materials provided in this

module.

Most probably, your trainer will also be your supervisor or manager.

He is there to support you and show you the correct way of doing

things.

You will be given plenty of opportunities to ask questions and

practice on the job. Make sure you practice your new skills during

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
regular work shifts. This way you will improve you speed, memory

and your confidence.

Use the Self-Checks, Operation Sheets or Task or Job Sheets at the

end of each section to test your own progress. Use the Performance

Criteria Checklist located after the sheet to check your own

performance.

When you feel confident that you have had sufficient practice, ask

your Trainer to evaluate you. The results of your assessment will be

recorded in your Progress Chart and Accomplishment Chart.

You need to complete this module before you can perform the next

module, Inspect and test the configured computer networks.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
TABLE OF CONTENTS

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
MODULE CONTENT

Qualification Title: COM PUTER SYSTEM S SERVICING NCII

Unit of Competency: SET UP COMPUTER NETWORKS

Module Title: SETTING-UP COMPUTER NETWORKS

Introduction:

This module covers the outcomes required in setting-up computers networks for
LANs and small-office home-office (SOHO) systems. It consists of competencies to install
Internet cables, set network configuration, set router/Wi-Fi/ wireless access point/repeater
configuration as well as to inspect and test the configured computer networks.

Learning Outcome:

Upon completion of this module, you must be able to:

1. Install internet cables


2. Set network configuration
3. Set router/Wi-Fi/wireless access point/repeater configuration
4. Inspect and test the configure computer networks

Assessment Criteria:

1. Cable routes are determined and planned in accordance with network

design and actual installation site.

2. Network materials necessary to complete the work are identified and

obtained in accordance with established procedures and checked against

systems requirements.

3. Tools, equipment and testing de vice s needed to carry out the installation

work is obtained in accordance with established procedures and checked

for correct operation and safety

4. Appropriate personal protective equipment is used and OHS policies and

procedures are followed

5. Copper cable splicing is performed based on Electronic Industries

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Alliance/Telecommunications Industry Association (EIA/TIA) standards

6. Internet cables and cable raceway are installed in accordance with

established procedures and installation requirements

7. Installation work is performed and is checked to ensure no unnecessary

damage has occurred and complies with requirements

8. OHS standards and 5S principles are followed according to enterprise

requirements

9. Excess components and materials are disposed of based on WEEE

directives and 3Rs waste management program.

10. Network connectivity of each terminal is checked in accordance with

network design.

11. Any fault or problem in the network system is diagnosed and remedied in

line with the standard operating procedures.

12. Network interface card (NIC) settings are configured in accordance with

network design.

13. Communication checking between terminals are carried out in accordance

with OS network configuration guides

14. Unplanned events or conditions are responded to in accordance with

established procedures

15. Client Device systems settings are configured in accordance with

manufacturers’ instructions and end-user preferences

16. Local area network (LAN) port is configured in accordance with

manufacturers’ instructions and network design

17. Wide area network (WAN) port is configured in accordance with

manufacturers’ instructions and network design

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
18. Wireless settings are configured in accordance manufacturers’

instructions, network design and end-user preferences

19. Security/Firewall/Advance settings are configured in accordance with

manufacturers’ instructions and end-user preferences

20. Final inspections are undertaken to ensure that the configuration done on

the computer networks conform with the manufacturer’s

instruction/manual

21. Computer networks are checked to ensure safe operation.

22. Reports are prepared/completed according to company requirements.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
LEARNING OUTCOME NO. 3 SET-UP COMPUTER NETWORKS

CONTENTS:
1. Configure Client Device Systems
2. Configure LAN (Local Area Network)
3. Configure WAN (Wide Area Network)
4. Configure Wireless Settings
5. Setting Up Firewall with Advanced Security

ASSESSMENT CRITERIA:

1.1 Client Device systems settings are configured in accordance with


manufacturers’ instructions and end-user preferences.

1.2 Local area network (LAN) port is configured in accordance with


manufacturers’ instructions and network design.

1.3 Wide area network (WAN) port is configured in accordance with


manufacturers’ instructions and network design.

1.4 Wireless settings are configured in accordance manufacturers’


instructions, network design and end-user preferences.

1.5 Security/Firewall/Advance settings are configured in accordance with


manufacturers’ instructions and end-user preferences.

CONDITIONS:
Students/trainees must provide with the following

WORKPLACE LOCATION
COMPUTER MATERIALS:
UTPCABLE
RJ45
ROUTER/HUB
MODEM
PERSONAL COMPUTER

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
TRAINING MATERIALS:
Learning Packages
Bond Papers
Ball pens
Whiteboard Marker
Manuals
Competency Standard
Training Regulations

ASSESSMENT METHOD:

1. Written Works

2. Actual Application

3. Performance Criteria

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
LEARNING EXPERIENCES

Learning Outcome No. 3: Set-up Computer Networks

Learning Activities Special Instruction


Read information sheet 3.1-1 Configure If you have some problem on the
Client Device Systems Configure Client Device Systems
content of the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.

Answer Self- Check 3.1-1 on Configure Compare your answer to the answer
Client Device Systems Key 3.1-1. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information
sheet and go over the self-check
again.

Read information sheet 3.1-2 on Configure If you have some problem on the content of
Local Area Network the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.

Answer Self- Check 3.1-2 on Configure Compare your answer to the answer
Local Area Network Key 3.1-2. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information
sheet and go over the self-check again.

Perform Task Sheet 3.1-2 on How to evaluates the performance and makes
Configure LAN (Local Area Network) recommendations.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Read information sheet 3.1-3 on Configure If you have some problem on the content of
WAN (Wide Area Network) the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.

Answer Self- Check 3.1-3 on Configure Compare your answer to the answer
WAN (Wide Area Network) Key 3.1-3. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information
sheet and go over the self-check
again.

Perform Task Sheet 3.1-3 on How to Trainer evaluates the performance


Configure WAN (Wide Area Network) and makes recommendations.

Read information sheet 3.1-4 on Configure If you have some problem on the content of
Wireless Settings the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.

Answer Self- Check 3.1-4 on Configure Compare your answer to the answer
Wireless Settings Key 3.1-4. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not review the information sheet
and go over the self-check
again.

Read information sheet 3.1-5 Setting up If you have some problem on the content of
Firewall with Advanced Security the information sheet don’t
hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self-check provided in the
module.
Date Developed: Document No.
Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Date Developed: Document No.
Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Answer Self- Check 3.1-5 on Setting up Compare your answer to the answer
Firewall with Advanced Security key 3.1-5. If you got 100% correct
answer in this self-check, you can
now move to the next information
sheet. If not revie w the information
sheet and go over the self-check again.

After doing all the activities for this


LO, you are ready to proceed to the next LO:
Inspect and test the configured computer
networks

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
INFORMATION SHEET 3.1-1

Learning Objectives:

After reading the Information Sheet, you should able to:

1. Identify what is Client device systems


2. Configuring device systems

Client Device Settings is a way of configuring your client device by which you can specify
client settings at a collection level, allowing you to define different settings as necessary. It
has the characteristics of being flexible to create multiple client device or client user settings
and apply it to different collections as per requirement. It is a set of default settings. But
always take note that those Client De vice systems settings are configured in accordance with
manufacturers’ instructions and end-user preferences. In this module, we will show the steps
on setting up your client de vice on Windows 7, 8 & 10 which are configured manually.

Always take note on the following area’s to be configured:

1. Set up time and date


2. Set up computer name
3. Install and configure network driver
4. Install necessary software application e.i MS Office and Antivirus

Configure Device system

Steps on how to configure Client device systems

a. On windows 10 OS, to set up the time and date go to the right bottom of the task bar.
b. Right click on the area of time and date then choose “adjust date/time”. Then the
date/time setting will appear.
c. If you wish to set your date/time automatically just click “ON” at “Set time
automatically”. If not, you can turn off and be the one to set date/time
d. You can also set “Time zone” it is located below change date and time. You could
choose Beijing, Kuala Lumpur or Taipei, Philippines is none of the choices just
choose a Time zone that much on our time “UTC+8”

Set up Computer Name

a. In setting up your Computer Name, go to start menu and search for “My Pc” and
other windows OS version you can find it on desktop a computer icon with a name of
“My Computer”.
b. Then “control panel” will appear. Click on “Change Settings”

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
c. After clicking “Change settings”, another set up will appear. You can now change the
“Computer Description” and “Computer Name”

Note: Setting up your Computer Name is important. This will serve as the identity of
your computer. It will be useful when it comes on setting up your computer network. The
server/Netwrok will identify what PC is being connected or configured.

Install and Configure Network driver

a. In every personal computer, is necessary to install a network driver so that your


computer will have access on every network connection it may need. The first step to
do is select a Compatible driver’s pack for your PC. Depends on your OS.

There are different versions of Drivers Pack Solution 15,14,13,12,11,10,9&8. You


should be careful on choosing a driver pack: it should be compatible with your PC
specification.
b. After the installation of your network driver, you are ready to configure your network.
To configure the network of your PC, Right-click on your network connection. You'll
see this in your System Tray. If you are connecting your computers through a switch
with no router, you'll need to assign each computer on the network its own individual
IP address. This process is handled automatically if you're using a router. Think of an
IP address as a mailing address. Each computer on the network needs a unique IP
address so that information sent across the network reaches the correct destination.
c. Click Open Network and Sharing Center.
d. Click the internet link at the top of the window. You’ll see next is connections click
properties
e. Click the Internet Protocol version 4 (TCP/IPv4). Make sure you don’t unchecked it
just highlight it.
f. Click properties
g. Click the used following IP address ratio button
h. Type 192.168.1.50 into the IP address field and type 255.255.0.0 into subnet mask
field and type 192.168.0.0 into the gateway field
i. Click “OK”. This will save the setting for that computer. This computer is now
configure on the your network with unique IP address

Open the Internet Protocol Version 4 properties on the next computer. Follow the steps
above on the second computer to open the Internet Protocol Version 4 (TCP/IPv4)
Properties window.

Install necessary software application e.i MS office and antivirus


a. You may install necessary software applications for your PC like MS Office and
antivirus.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
SELF-CHECK. 1.3-1

TRUE OR FALSE: Write the word TRUE in the space provider if the statements

are correct and FALSE if it is not.

______1. Client Device Settings is a way of configuring your client device by

which you cannot specify client settings at a collection level.

______2. On Windows 10 OS, to set up the Time and Date go to the upper left

of your taskbar.

______3. Setting up your Computer Name is important. This will serve as the

Identity of your computer.

______4. In every personal computer, it is necessary to install a network driver.

______5. Assigning an IP Address must be unique.

______6. The default subnet mask is, 255.255.0.0

______7. In setting up Time, you cannot set time automatically.

______8. In setting up the Time Zone, you could use "Philippines" for the

setting.

______9. Client setting on different OS are just the same.

______10. In installing a network drivers, it compatibility on PC must be

consider.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
INFORMATION SHEET 3.1-2

Configure Local Area Network

Learning Objective:

After reading the information sheet, you should able to:

1. To identify what is Local Area Network


2. To acquire knowledge in Configuring Local Area Network

A Local Area Network (LAN) is a group of computers and associated devices that
share a common communications line or wireless link to a server. Typically, a
LAN encompasses computers and peripherals connected to a server within a distinct
geographic area such as an office or a commercial establishment. Computers
and other mobile devices use a LAN connection to share resources such as a printer or
network storage.

Equipment and peripherals needed for configuring LAN:

Personal Computer - is a multi-purpose electronic compute r whose size, capabilities, and


price make it feasible for individual use. PCs are intended to be operated directly by an end
user, rather than by a computer expert or technician.

Internet Cable - are networking hardware used to connect one network device to other
network de vice s or to connect two or more computers to share printers, scanners etc.
Different types of network cables, such as coaxial cable, optical fiber cable, and twisted pair
cables, are used depending on the network's physical layer, topology, and size. The de vice s
can be separated by a few meters (e.g. via Ethernet) or nearly unlimited distances.

Router/Hub/Switch - is a way stations that control the traffic of data within a


network, assigns a unique IP Address to each computer.

Modem - is a device that send, receives, and translates information from the internet and
makes it available within the Local Area Network

When Equipments and Peripherals are all ready, we will now proceed on
Installing and Configuring Local Area Network. Below are steps in configuring
Local Area Network.

1. Prepare your Workplace


It must be clean and dry. Work on a spacious table. If necessary work with your PPE.
Do not forget to apply the OHS policies and procedures.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
2. Determine the number of computers you want to connect.
The number of computers you're connecting will determine the type of network
hardware you'll need.

3. Determine your network layout.


If you’re installing a permanent LAN solution, you'll want to keep cable length in
mind. CAT5 Ethernet cables should not run longer than 250 feet. If you need to
cover larger distances, you'll need switches at regular intervals, or you'll need to use
CAT6 cables.

4. Plug one end of an Ethernet cable into your computer.


Make sure you're using an Ethernet cable (RJ45), not a telephone cable.

5. Plug the other end of the cable into an open LAN port.
This can be any open LAN port on either the router or the switch, depending on your
LAN setup.
6. Reset the Router.
In resetting your Router just click the small button on the back of your router using a
Pin or Ballpen and wait until all the icons in front of the Router will Lights on. See figure
below.
7. Go to browser either “Google Chrome” or “I explorer”. And type in the default IP Address.
Depends on Manufacturer. For this module, we will use 192.168.0.1.
8. Router Login will appear. Type on default username and password. “admin” is most
default username and password, still depends on manufacturer.
9. After encoding the default IP Address and entering the default username and password, the
Router User Interface will appear. We will now ready for Router Setting Up.
10. Click the Network Tab. And change your IP Address. Take note on the Sequence of your
IP Address. S ave and it will reboot.
11. Go to DHCP Tab, just click the Disable Button. And the browser will reboot.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
SELF-CHECK. 3.1-2

IDENTIFICATION: Identify what is being ask, write on the space provided.

__________1. A multi-purpose electronic computer whose size, capabilities, and


price make it feasible for individual use.
__________2. Is a device that sends, receives, and translates information from
the internet and makes it available within the Local Area Network
__________3. Are networking hardware used to connect one network device to
other network de vice s or to connect two or more computers to share printers,
scanners etc.
__________4. Is a way stations that control the traffic of data within a network,
assigns a unique IP Address to each computer.
__________5. Is a group of computers and associated de vice s that share a
common communications line or wireless link to a server.
__________6. Default IP address of a Router
__________7. Default Username and Password use for Logging in on your Router
Portal.
__________8. A tab on your Router Portal that can be used to change your IP
Address.
__________9. It is the first step before configuring your Router.
__________10. Indicator that your Router are already reset.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
INFORMATION SHEET 3.1-3

Configure Wide Area Network

Learning Objective:

After reading the information sheet, you should able to:

1. To identify what is Wide Area Network


2. To acquire knowledge in Wide Area Network

A wide area network (WAN) is a telecommunications network or computer network


that extends over a large geographical distance. Wide area networks are often
established with leased telecommunication circuits. Business, education and
government entities use wide area networks to relay data to staff, students,
clients, buyers, and suppliers from various locations across the world. In essence,
this mode of telecommunication allows a business to effectively carry out its daily
function regardless of location. The Internet may be considered a WAN.

Configure W ide Area Network

As we gather all the peripherals and equipment needed we will proceed on Configuring Wide
Area Network. Same process with Router but this time we will use Modem or the Access
Point. See steps listed below:

1.Gather your Modem, Ethernet Cable and Personal Computer. Connect each peripheral
using the Ethernet Cable. Directly connect Modem to your Personal Computer using the
Ethernet Cable. This will just be use for the setting up processes

2. Reset the Modem.


In resetting your Modem just click the small button at the back and wait until all the icons in
front of the Modem will Lights on. See figure below.

3. Go to browser either “Google Chrome” or “I explorer”. And type in the default IP Address
of your Modem. Depends on Manufacturer. For this module, we will use 192.168.0.254. And
a Dialog box will pop up and you will need to enter the default username and password. Use
“admin” for both username and password

4. Repeat the step shown on Configuring your Router.

a. Go to Network Tab. Change your IP address. Click S ave then it will


reboot.
b. Go to DHCP tab and click Disable Button.
c. Unlike on Router we need to set up Wireless Tab on Modem. Click
Wireless Tab. Click on WPA/WPA2 – Personal (Recommended) then enter your desired PSK
Password. It must consist of alphanumeric characters. The browser will reboot.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
SELF-CHECK. 3.1-3

Rearrange the given steps on how to configure W AN. Put the correct
sequence of steps by using numbers 1-10 in the space provided, 1 is the
First Step and 10 is the Last Step.

______1. Gather your Modem, Ethernet Cable and Personal Computer. Connect
each peripheral using the Ethernet Cable.

______2. Go to browser either “Google Chrome” or “I explorer”.

______3. Go to Network Tab. Change your IP address. Click S ave then it wil l
reboot.

______4. Reset the Modem. In resetting your Modem just click the small button
at the back and wait until all the icons in front of the Modem will Lights on.

______5. Directly connect Modem to your Personal Computer using the


Ethernet Cable. This will just be use for the setting up processes.

______6. Go to DHCP tab and click Disable Button.

______7. And a Dialog box will pop up and you will need to enter the default
username and password. Use “admin” for both username and password.

______8. Prepare your Workplace, clean and Dry.

______9 And type in the default IP Address of your Modem.

______10. Click Wireless Tab. Click on WPA/WPA2 – Personal (Recommended)


then enter your desired PSK Password.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
INFORMATION SHEET 3.1-4

Configure Wireless Setting

Learning Objectives:

After reading the Information Sheet you should able to:

1. To identify what is Wireless Network?


2. To enumerate steps in Configuring Wireless Settings

A wireless network is a computer network that uses wireless data connections between
network nodes. Wireless networking is a method by which homes, telecommunications
networks and business installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations. Wireless
telecommunications networks are generally implemented and administered using radio
communication. A wireless local area network (WLAN) links two or more de vice s over a
short distance using a wireless distribution method, usually providing a connection through
an access point for internet access. The use of spread- spectrum or OFDM technologies may
allow users to move around within a local coverage area, and still remain connected to the
network. Products using the IEEE 802.11 WLAN standards are marketed under the Wi-Fi
brand name. Fixed wireless technology implements point-to- point links between computers
or networks at two distant locations, often using dedicated microwave or modulated laser
light beams over line of sight paths. It is often used in cities to connect networks in two or
more buildings without installing a wired link.

Configure Wireless Setting

After configuring the Router and Modem we will now proceed on setting up the
wireless network.

1. First, we need to check whether you h ave a wireless adapter.

a. Select the Start button, type De vice Manager in the search box, and then select De vice
Manager.
b. Expand Network adapters.
c. Look for a network adapter that might h ave wireless in the name

2. Setting up the modem and Internet connection

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
After you have all the equipment, you'll need to set up your modem and Internet connection.
If your modem wasn't set up for you by your Internet service provider (ISP), follow the
instructions that came with your modem to connect it to your PC and the Internet. If you're
using Digital Subscriber Line (DSL), connect your modem to a phone jack. If you’re using
cable, connect your modem to a cable jack.

3. Positioning the wireless router

Put your wireless router somewhere where it will receive the strongest signal with the least
amount of interference. For better results, follow these tips:

a. P lace your wireless router in a central location.

Place the routeras close to the center of your home as possible to increase thestrength
of the wireless signal throughout your home.

b. Position the wireless router off the floor and away from walls and metal
objects,

such as metal file cabinets. The fewer physical obstructions between your PC and the
router's signal, the more likely that you'll be using the router's full signal strength.

Securing your Wireless Network

Security is always important; with a wireless network, it's even more important because your
network's signal could be broadcast outside your home. If you don't help secure your
network, people with PCs nearby could access info stored on your network PCs and use your
Internet connection.

To help make your network more secure:

Change the default user name and password. This helps protect your router. Most router
manufacturers have a default user name and password on the router and a default network
name (also known as the SSID). Someone could use this info to access your router without
you knowing it. To help avoid that, change the default user name and password for your
router. See the documentation for your device for instructions.

Set up a security key (password) for your network. Wireless networks have a network
security key to help protect them from unauthorized access. We recommend using Wi-Fi
Protected Access 2 (WPA2) security if your router supports it. See the documentation for
your router for more detailed info, including what type of security is supported and how to set
it up.

Some routers support Wi-Fi Protected Setup (WPS). If your router supports WPS and its
connected to the network, follow these steps to set up a network security key:

1. Select the Start button, look for Control Panel and click Network and Internet. Then
look for Network and Sharing Center.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
2. Select Set up a new connection or network.

3. Select Set up a new network, and then choose Next.

The wizard will walk you through creating a network name and a security key. If your router
supports it, the wizard will default to Wi-Fi Protected Access (WPA or WPA2) security. We
recommend that you use WPA2, because it offers better security than WPA or Wired
Equivalent Privacy (WEP) security. With WPA2 or WPA you can also use a passphrase, so
you don’t have to remember a cryptic sequence of letters and numbers.

Write down your security key and keep it in a safe place.

You can also save your security key on a USB flash drive by following the instructions in the
wizard. (Saving your security key to a USB flash drive is available in Windows 8 and
Windows 7, but not in Windows 10.)

Connect a PC to your wireless network

1. Select the Network or icon in the notification area.

2. In the list of networks, choose the network that you want to connect to,

and then select Connect.

3. Type the security key (often called the password).

4. Follow additional instructions if there are any.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
SELF-CHECK. 1.3-4

Rearrange the given steps on how to configure W AN. Put the correct

sequence of steps by using numbers 1-10 in the space provided, 1 is the

First Step and 10 is the Last Step.

_____1. Change the default user name and password

_____2. Set up a security key (password) for your network

_____3. Select Set up a new connection or network.

_____4. Securing your wireless network

_____5. Select the Start button, look for Control Panel and click Network and

Internet.

_____6. Look for Network and Sharing Center.

_____7. Positioning the wireless router

_____8. Select Set up a new network, and then choose Next.

_____9. Setting up the modem and Internet connection.

_____10. We Need To Check Whether You Have A Wireless Adapter

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
INFORMATION SHEET 3.1-5

Setting Up Firewall with Advance security

Learning Objective:

After reading the Information Sheet, you should be able to:

1. To identify what is Firewall with Advance Security


2. To enumerate steps in configuring Firewall with Advance security

The Windows Firewall with Advanced Security is a tool which gives you detailed
control over the rules that are applied by the Windows Firewall. You can view all
the rules that are used by the Windows Firewall, change their properties, create
new rules or disable existing ones. In this tutorial we will share how to open the
Windows Firewall with Advanced Security, how to find your way around it and talk
about the types of rules that are available and what kind of traffic they filter.
A firewall is hardware or software that can help protect your PC from unauthorized
users or malicious software (malware). Running a firewall on each PC on your network can
help control the spread of malicious software on your network, and help protect your PCs
when you're accessing the Internet. Windows Firewall is included with this version of
Windows.

Setting Up Firewall with Advance security

You have several alternatives to operating the Windows Firewall with Advance security:

1. One is to open the standard Windows Firewall window, by going to "Control Panel ->
System and Security -> Windows Firewall". Then, click or tap Advanced settings.

2. In Windows 7, another method is to search for the word firewall in the Start Menu
search box and click the "Windows Firewall with Advanced Security" result.
3. In Windows 8.1, Windows Firewall with Advanced Security is not returned in search
results and you need to use the first methodshared above for opening it.

4. The Windows Firewall with Advanced Security looks and works the same both in
Windows 7 and Windows 8.1. To continue our tutorial, we will use screenshots that were
made in Windows 8.1.

5. What are the Inbound & Outbound Rules?

a. In order to provide the security you need, the Windows Firewall has a standard set
of inbound and outbound rules, which are enabled

depending on the location of the network you are connected to.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
b. Inbound rules are applied to the traffic that is coming from the network and the
Internet to your computer or device. Outbound rules apply to the traffic from your
computer to the network or the Internet.

c. These rules can be configured so that they are specific to: computers,users,
programs, services, ports or protocols. You can also specify to which type of network
adapter (e.g. wireless, cable, virtual private network) or user profile it is applied to.

d. In the Windows Firewall with Advanced Security, you can access all rules and edit
their properties. All you have to do is click or tap the appropriate section in the left-
side panel.

6. The rules used by the Windows Firewall can be enabled or disabled. The ones which are
enabled or active are marked with a green check-box in the Name column. The ones that are
disabled are marked with a gray check-box.

7. If you want to know more about a specific rule and learn its properties, right click on it and
select Properties or select it and press Properties in the column on right, which lists the
actions that are available for your selection.

8. In the Properties window, you will find complete information about the selected rule, what
it does and in when it is applied. You will also be able to edit its properties and change any of
the available parameters.

9. What Are The Connection Security Rules?

a. Connection security rules are used to secure traffic between two computers while it
crosses the network. One example would be a rule which defines that connections
between two specific computers must be encrypted.

b. Unlike the inbound or outbound rules, which are applied only to one

computer, connection security rules require that both computers h ave

the same rules defined and enabled.

c. If you want to see if there are any such rules on your computer, click or tap
"Connection Security Rules"on the panel on the left. By default, there are no such
rules defined on Windows computers and devices. They are generally used in
business environments and such rules are set by the network administrator.

10. What Does the Windows Firewall with Advanced Security Monitor?

The Windows Firewall with Advanced Security includes some monitoring features as
well. In the Monitoring section you can find the following information: the firewall
rules that are active (both inbound and outbound), the connection security rules that
are active and whether there are any active security associations

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
11. You should note that the Monitoring section shows only the active rules for the current
network location. If there are rules which get enabled for other network locations, you will
not see them in this section.

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
SELF-CHECK. 3.1-5

TRUE OR FALSE: Write the word TRUE in the space provider if the statements

are correct and FALSE if it is not.

________1. A firewall is hardware or software that can help protect your PC from

unauthorized users or malicious software (malware).

________2. Running a firewall on each PC on your network won't help control

the spread of malicious software on your network.

________3. In order to provide the security you need, the Windows Firewall has

a standard set of inbound and outbound rules.

________4. These rules can't be configured so that they are specific to:

computers, users, programs, services, ports or protocols.

________5. In the Windows Firewall with Advanced Security, you can access all

rules and edit their properties.

________6. Connection security rules are used to secure traffic between two

computers while it crosses the network.

________7. Monitoring section shows only the active rules for the current

network location.

________8. Unlike the inbound or outbound rules, which are applied only to one

computer, connection security rules require that both computers have the

same rules defined and enabled.

________9. Windows Firewall with Advanced Security is a tool which gives you

detailed control over the rules that are applied by the Windows Firewall.

________10. Inbound rules are applied to the traffic that is coming from the

network and the Internet to your computer or device

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
TABLE OF CONTENTS

No. TITLE PAGE

1 COVER PAGE

2 Qualification Title

3 How to use this Competency-based Learning materials

4 Table of Contents

5 Module content

6 Learning experience

7 Information Sheet 3.1-1

8 Self-checked no. 3.1-1

9 Answer key for self-checked No. 3.1-1

10 Information sheet 3.1-2

11 Self-check No.3.1-2

12 Answer key for Self-checked 3.1-2

13 Task Sheet 3.1-2

14 Performance Criteria checklist 3.1-2

15 Information Sheet No. 3.1-3

16 Self-check NO. 3.1-3

17 Answer key for self-check No. 3.1-3

18 Task Sheet 3.1-3

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
19 Performance Criteria checklist 3.1-3

20 Information Sheet 3.1-4

21 Self-check No. 3.1-4

22 Answer key for self-check No. 3.1-4

23 Information Sheet 3.1-5

24 Self-check No 3.1-5

25 Answer key for self-check No. 3.1-5

26 References

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Answer Key to 3.1-1

TRUE OR FALSE

1. False

2. False

3. True

4. True

5. True

6. True

7. False

8. False

9. False

10. True

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Answer Key to 3.1-2

IDENTIFICATION:

1. Personal Computer

2. Modem

3. Ethernet Cable

4. Router

5. LAN

6. 192.168.0.1

7. Admin

8. Network Tab

9. Reset

10. Lights On (Icons in front)

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Answer Key to 3.1-3

REARRANGE:

1. 2

2. 5

3. 7

4. 4

5. 3

6. 8

7. 6

8. 1

9. 5

10. 10

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Answer Key to 3.1-4

REARRANGE:

1. 5

2. 6

3. 9

4. 4

5. 7

6. 8

7. 3

8. 10

9. 2

10. 1

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
Answer Key to 3.1-5

TRUE OR FALSE:

1. TRUE

2. FALSE

3. TRUE

4. FALSE

5. TRUE

6. TRUE

7. TRUE

8. TRUE

9. TRUE

10. TRUE

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
REFERENCES:

INTERNET

1) http://www.tesda.gov.ph

a. CSS NCII TR

b. CSS NCII CBC

c. CSS SAG

2) http://wikihow.com

a. Configure Local Area Network

b. Configure Wide Area Network

3) http://www.slideshare.net

a. Configure Client Device Settings

b. Configure Wireless Settings

c. Setting up Firewall with Advance Security

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
TASK SHEET 1.3-2

Configure Local Area Network

Performance Objective: Given a Network Materials (Router and Internet Cable) together
with a Personal Computer you should Configure Local Area Network with allotted time of
40 minutes.

Supplies/Materials and Equipments:

 Personal Computer
 Router and Internet Cable
 Personal Protective Equipment(If necessary)
 Pins/Ballpens(for reseting the router)

Steps/ Procedure:

1. Prepare your Workplace

a. Make sure that you have the necessary Materials/Peripherals

b. Make sure that the workplace is clean and dry.

2. Start

a. Connect Router and Personal Computer using your Ethernet Cable

b. Reset your Router using Pins/Ballpen

c. Go to your Browser (Google Chrome or Iexplorer

d. Type in the Default IP Address

e. Type in the default username and password

f. Set up Network Tab

g. Set up DHCP Tab

Assessment method:

Performance Criteria checklist

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
PERFORMANCE CRITERIA CHECKLIST 3.1-2

CRITERIA YES NO

1. Did the trainee configure the router correctly?

2. Did the trainee configure the Local Area Network?

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
TASK SHEET 3.1-3

Configure Wide Area Network

Performance Objective: Given a Network Materials (Router and Internet Cable) together
with a Personal Computer you should Configure Wide Area Network with allotted time of
40 minutes.

Supplies/Materials and Equipments

 Personal Computer
 Modem and Ethernet Cable
 Personal Protective equipment(if necessary)
 Pins/Ballpens(use for resetting the router)

Steps/ Procedure:

3. Prepare your W orkplace

a. Make sure that you have the necessary Materials/Peripherals

b. Make sure that the workplace is clean and dry.

4. Start

a. Connect Modem and Personal Computer using your Ethernet Cable

b. Reset your Modem using Pins/Ballpen

c. Go to your Browser (Google Chrome or Iexplorer)

d. Type in the Default IP Address

e. Type in the default username and password

f. Set up Network Tab

g. Set up DHCP Tab

h. Set up Wireless Tab

Assessment Method:

Performance Criteria checklist

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #
CRITERIA YES NO

1. Did the trainee configure the modem correctly?

2. Did the trainee configure the Wide Area Network?

Date Developed: Document No.


Planning Training
November 29, 2019 Issued by:
Session
SLSU LUCENA Page
Computer System Developed by: CAMPUS
Servicing NC II Lester Neil N. Canlas Revision #

Vous aimerez peut-être aussi