Nothing Special   »   [go: up one dir, main page]

Cblmcss Module 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 113

Table of Contents

INTRODUCTION ................................................................................... 3
HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL ..................... 4
LIST OF COMPETENCIES ..................................................................................... 6
MODULE CONTENT ........................................................................................ 7
LEARNING OUTCOME 1 INSTALL NETWORK CABLES ........................................ 9
LEARNING EXPERIENCE 1................................................................................... 11
INFORMATION SHEET 1.1-1 COMPUTER NETWORK, DIAGRAM, & DEVICES ..... 12
SELF CHECK 2.1-1............................................................................................... 49
LEARNING OUTCOME 2 SETUP NETWORK CONFIGURATION ........................ 51
LEARNING EXPERIENCE 2................................................................................... 53
TASK SHEET 2.2-1 CREATE LOCAL AREA CONNECTION .................................... 60
LEARNING OUTCOME 3 SETUP ROUTER / WIFI / WIRELESS ACCESSPOINT /
REPEATER CONFIGURATION ....................................................................... 62
LEARNING EXPERIENCE 3................................................................................... 64
INFORMATION SHEET 2.3-1 IP ADDRESSING ..................................................... 65
SELF CHECK 2.3-1............................................................................................... 80
INFORMATION SHEET 2.3-2 WIRELESS NETWORK DEVICES CONFIGURATION 82
TASK SHEET 2.3-2 ............................................................................................... 99
LEARNING OUTCOME 4 INSPECT & TEST CONFIGURED COMPUTER NETWORKS
.................................................................................................................... 94
LEARNING EXPERIENCE 4.................................................................................103
INFORMATION SHEET 2.4-1 TESTING & TROUBLESHOOTING NETWORK........104
TASK SHEET 2.4-1 TROUBLESHOOTING NETWORK CONNECTIVITY ................111
BIBLIOGRAPHY .......................................................................................... 112

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 2 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Introduction
This module is designed to develop & enhance
the knowledge, skills, & attitudes of a Computer
Systems Service Technician, in accordance with
industry standards. It covers the basic and common
competencies in addition to the core competencies
such as to install and configure computers systems,
set-up computer networks and servers and to
maintain and repair computer systems and
networks.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 3 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
HOW TO USE THIS COMPETENCY BASED LEARNING
MATERIAL

Welcome to the module in Computer Systems Servicing NC II. This


module contains training materials and activities for you to complete.

The units of competency are as follows: “Install and Configure


Computer Systems” contains knowledge, skills and attitudes required for
Computer Systems Servicing level (NCII).

You are required to go through a series of learning activities in order to


complete each learning outcome of the module. In each learning outcome are
Information Sheets and Resources Sheets (Reference Materials for further
reading to help you better understand the required activities). Follow these
activities on your own and answer the self-check at the end of each learning
outcome. You may remove a blank answer sheet at the end of each module
(or get one from your facilitator/trainer) to write your answers for each self-
check. If you have questions, don’t hesitate to ask your facilitator for
assistance.

Recognition of Prior Learning (RPL)

You may already have some or most of the knowledge and skills covered in
this learner's guide because you have:
been working for some time
already completed training in this area.

If you can demonstrate to your trainer that you are competent in a


particular skill or skills, talk to him/her about having them formally
recognized so you don't have to do the same training again. If you have a
qualification or Certificate of Competency from previous trainings, show it to
your trainer. If the skills you acquired are still current and relevant to the
unit/s of competency they may become part of the evidence you can present
for RPL. If you are not sure about the currency of your skills, discuss this with
your trainer.

At the end of this module is a Learner’s Diary. Use this diary to record
important dates, jobs undertaken and other workplace events that will assist
you in providing further details to your trainer or assessor. A Record of
Achievement is also provided for your trainer to complete once you complete
the module.

This module was prepared to help you achieve the required competency,
in Constructing Aquaculture Facilities. This will be the source of information
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 4 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
for you to acquire knowledge and skills in this particular trade independently
and at your own pace, with minimum supervision or help from your
instructor.

 Talk to your trainer and agree on how you will both organize the
Training of this unit. Read through the module carefully. It is divided
into sections, which cover all the skills, and knowledge you need to
successfully complete this module.

 Work through all the information and complete the activities in each
section. Read information sheets and complete the self-check.
Suggested references are included to supplement the materials
provided in this module.

 Most probably your trainer will also be your supervisor or manager.


He/she is there to support you and show you the correct way to do
things.

 Your trainer will tell you about the important things you need to
consider when you are completing activities and it is important that you
listen and take notes.

 You will be given plenty of opportunity to ask questions and practice on


the job. Make sure you practice your new skills during regular work
shifts. This way you will improve both your speed and memory and also
your confidence.

 Talk to more experience workmates and ask for their guidance.

 Use the self-check questions at the end of each section to test your own
progress.

 When you are ready, ask your trainer to watch you perform the
activities outlined in this module.

 As you work through the activities, ask for written feedback on your
progress. Your trainer keeps feedback/ pre-assessment reports for this
reason. When you have successfully completed each element, ask your
trainer to mark on the reports that you are ready for assessment.

 When you have completed this module (or several modules), and feel
confident that you have had sufficient practice, your trainer will arrange
an appointment with registered assessor to assess you. The results of
your assessment will be recorded in your competency Achievement
Record.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 5 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
COMPUTER HARDWARE SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Install and Configure Installing and Configuring ELC724331


1.
Computer Systems Computer Systems

Set-up Computer Setting – up Computer ELC724332


2.
Networks Networks

Setting – up Computer ELC724333


3. Set-up Computer Servers
Servers

Maintain and Repair Maintaining and Repairing


4. Computer Systems and computer systems and ELC724334
Networks networks

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 6 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
MODULE CONTENT

QUALIFICATION TITLE: Computer Systems Servicing NC II

UNIT OF COMPETENCY: Set-up Computer Networks

MODULE TITLE: Setting up Computer Networks

MODULE DESCRIPTOR:

This unit covers the knowledge, skills and attitudes needed to


diagnose computer systems and networks

NOMINAL DURATION: 40 Hours

LEARNING OUTCOMES:
At the end of this module you MUST be able to:

1. Install network cables


2. Set up network configuration

3. Set up router / wi-fi / wireless access points / repeater configuration


4. Inspect and test the configured computer networks.

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with network design
and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 7 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program.
10. Network connectivity of each terminal is checked in accordance with network
design.
11. Any fault or problem in the network system is diagnosed and remedied in line
with the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance with
network design.
13. Communication checking between terminals are carried out in accordance
with OS network configuration guides
14. Unplanned events or conditions are responded to in accordance with
established procedures
15. Final inspections are undertaken to ensure that the configuration done on
the computer networks conforms with the manufacturer’s
instruction/manual
16. Computer networks are checked to ensure safe operation.
17. Reports are prepared/completed according to company requirements.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 8 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 1 INSTALL NETWORK CABLES

CONTENTS:

 Safety Procedures
 Network Diagram
 Identification and familiarization of different network materials, tools,
equipment and testing devices
 Wire splicing
 Standard color coding and crimping of network cables
 5s and 3Rs implementation
 Types of network configuration

ASSESSMENT CRITERIA:

1. Cable routes are determined and planned in accordance with network


design and actual installation site.
2. Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked against
systems requirements
3. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked
for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies
and procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary
damage has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise
requirements
9. Excess components and materials are disposed of based on WEEE directives
and 3Rs waste management program.

CONDITIONS:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 9 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
The students/trainees must be provided with the following:

 Desktop Computer / 1 set computer system


 Network switch
 Materials:
- RJ45
- UTP Cable

 Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
- Utility software
- Computer system
- Crimping tool
- LAN Tester

 Policies and procedures:


- Procedures and guidelines
- Safety precautions

METHODOLOGIES:

 Lecture
 Discussion
 Demonstration
 Viewing multimedia

ASSESSMENT METHODS:

 Written examination
 Practical examination

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 10 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 1

INSTALL NETWORK CABLES

Learning Activities Special Instructions

Read the Information Sheet 2.1- Read, understand the information


1(Computer Network, diagrams sheet and evaluate yourself using Self
and devices) . Check 2.1-1

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 11 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 2.1-1
COMPUTER NETWORK, DIAGRAM AND DEVICES

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Identify computer network symbols.


2. Identify network devices, tools, testing devices and its functions.
3. Create network diagrams.

Introduction

To understand how networks function, you need to become familiar with the
basic elements of a network. This module explains networks by introducing
fundamental computer and network concepts and the characteristics, functions,
benefits, metrics, and attributes used to describe network features and performance.
This chapter also introduces the Open System Interconnection (OSI) reference model,
data communications terms and concepts, and the TCP/IP protocol, which serves as
the de facto standard for most of today's computer networks. Finally, this chapter
provides you with an opportunity to connect two PCs in a point-to-point serial
network.

What is a Network?

The first task in understanding how to build a computer network is defining what a
network is and understanding how it is used to help a business meet its objectives.
A network is a connected collection of devices and end systems, such as computers
and servers that can communicate with each other.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 12 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Networks carry data in many types of environments, including homes, small
businesses, and large enterprises. In a large enterprise, a number of locations might
need to communicate with each other, and you can describe those locations as
follows:

 Main office: A main office is a site where everyone is connected via a network
and where the bulk of corporate information is located. A main office can have
hundreds or even thousands of people who depend on network access to do
their jobs. A main office might use several connected networks, which can
span many floors in an office building or cover a campus that contains several
buildings.
 Remote locations: A variety of remote access locations use networks to
connect to the main office or to each other.
 Branch offices: In branch offices, smaller groups of people work and
communicate with each other via a network. Although some corporate
information might be stored at a branch office, it is more likely that branch
offices have local network resources, such as printers, but must access
information directly from the main office.
 Home offices: When individuals work from home, the location is called a
home office. Home office workers often require on-demand connections to the
main or branch offices to access information or to use network resources such
as file servers.
 Mobile users: Mobile users connect to the main office network while at the
main office, at the branch office, or traveling. The network access needs of
mobile users are based on where the mobile users are located.

Figure 1-1 shows some of the common locations of networks that can be used
to connect users to business applications.

Network Locations

Many different types and locations of networks exist. You might use a network in
your home or home office to communicate via the Internet, to locate information, to

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 13 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
place orders for merchandise, and to send messages to friends. You might have work
in a small office that is set up with a network that connects other computers and
printers in the office. You might work in a large enterprise in which many computers,
printers, storage devices, and servers communicate and store information from many
departments over large geographic areas. All of these networks share many common
components.

Common Network Components

These are the four major categories of physical components in a computer network:

 Personal computers (PCs): The PCs serve as endpoints in the network,


sending and receiving data.

 Interconnections: The interconnections consist of components that provide


a means for data to travel from one point to another point in the network. This
category includes components such as the following:
o Network interface cards (NICs) that translate the data produced by the
computer into a format that can be transmitted over the local network

o Network media, such as cables or wireless media, that provide the


means by which the signals are transmitted from one networked device
to another

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 14 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
o Connectors that provide the connection points for the media

Straight – through Cross - over

Serial Connection

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 15 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Fiber Optic Connection

 Switches: Switches are devices that provide network attachment to the end
systems and intelligent switching of the data within the local network.

Switch Symbol

 Routers: Routers interconnect networks and choose the best paths between
networks.

Router Symbol

 Servers operate within a client-server architecture where "servers" are


computer programs running to serve the requests of other programs, the
"clients". This may be to share data, information or hardware and software
resources

Servers

 Patch Panel a board in a switchboard, computer, or other device with a


number of electric sockets that can be connected in various combinations.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 16 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Resource-Sharing Functions and Benefits
The main functions of computer networks in business today are to simplify and
streamline business processes through the use of data and application sharing.
Networks enable end users to share both information and hardware resources. By
providing this interconnection between the users and common sets of data,
businesses can make more efficient use of their resources. The major resources that
are shared in a computer network include the following:

 Data and applications: When users are connected through a network, they
can share files and even software application programs, making data more
easily available and promoting more efficient collaboration on work projects.
 Physical resources: The resources that can be shared include both input
devices, such as cameras, and output devices, such as printers.
 Network storage: Today the network makes storage available to users in
several ways. Direct attached storage (DAS) directly connects physical storage
to a PC or a shared server. Network attached storage (NAS) makes storage
available through a special network appliance. Finally, storage area networks
(SAN) provide a network of storage devices.
 Backup devices: A network can also include backup devices, such as tape
drives, that provide a central means to save files from multiple computers.
Network storage is also used to provide archive capability, business
continuance, and disaster recovery.

Figure 1-4 shows some common shared resources

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 17 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Shared Resources

The overall benefit to users who are connected by a network is an efficiency of


operation through commonly available components used in everyday tasks, sharing
files, printing, and storing data. This efficiency results in reduced expenditures and
increased productivity.

In recent years, the open access to devices that was once pervasive in networking
has been replaced with a need for caution. There have been many well-advertised
acts of "cyber vandalism," in which both end systems and network devices have been
broken into; therefore, the need for network security has to be balanced with the
need for connectivity.

Network User Applications


The key to utilizing multiple resources on a data network is having applications that
are aware of these communication mechanisms. Although many applications are
available for users in a network environment, some applications are common to
nearly all users.

The most common network user applications include the following:

 E-mail: E-mail is a valuable application for most network users. Users can
communicate information (messages and files) electronically in a timely
manner, to not only other users in the same network but also other users
outside the network (suppliers, information resources, and customers, for
example). Examples of e-mail programs include Microsoft Outlook and Eudora
by Qualcomm.
 Web browser: A web browser enables access to the Internet through a
common interface. The Internet provides a wealth of information and has
become vital to the productivity of both home and business users.
Communicating with suppliers and customers, handling orders and
fulfillment, and locating information are now routinely done electronically over
the Internet, which saves time and increases overall productivity. The most
commonly used browsers are Microsoft Internet Explorer, Netscape Navigator,
Mozilla, and Firefox.
 Instant messaging: Instant messaging started in the personal user-to-user
space; however, it soon provided considerable benefit in the corporate world.
Now many instant messaging applications, such as those provided by AOL
and Yahoo!, provide data encryption and logging, features essential for
corporate use.
 Collaboration: Working together as individuals or groups is greatly facilitated
when the collaborators are on a network. Individuals creating separate parts
of an annual report or a business plan, for example, can either transmit their
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 18 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
data files to a central resource for compilation or use a workgroup software
application to create and modify the entire document, without any exchange
of paper. One of the best-known traditional collaboration software programs
is Lotus Notes. A more modern web-based collaboration application is a wiki.
 Database: This type of application enables users on a network to store
information in central locations (such as storage devices) so that others on the
network can easily retrieve selected information in the formats that are most
useful to them. Some of the most common databases used in enterprises today
are Oracle and Microsoft SQL Server.

STANDARD ETHERNET CABLE COLOR CODING

T-568A Straight-Through Ethernet Cable

The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the
TIA/EIA 568-B standard in 2002 and has been updated since. Both standards
define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair
cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-
out specification appear to be related and interchangeable, but are not the
same and should not be used interchangeably.

T-568B Straight-Through Ethernet Cable

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 19 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Both the T-568A and the T-568B standard Straight-Through cables are used
most often as patch cords for your Ethernet connections. If you require a cable
to connect two Ethernet devices directly together without a hub or when you
connect two hubs together, you will need to use a Crossover cable instead.

RJ-45 Crossover Ethernet Cable

A good way of remembering how to wire a Crossover Ethernet cable is to wire


one end using the T-568A standard and the other end using the T-568B
standard. Another way of remembering the color coding is to simply switch
the Green set of wires in place with the Orange set of wires. Specifically, switch
the solid Green (G) with the solid Orange, and switch the green/white with
the orange/white.

Ethernet Cable Instructions:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 20 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
 Pull the cable off the reel to the desired length and cut. If you are pulling
cables through holes, its easier to attach the RJ-45 plugs after the cable
is pulled. The total length of wire segments between a PC and a hub or
between two PC’s cannot exceed 100 Meters (328 feet) for 100BASE-TX
and 300 Meters for 10BASE-T.
 Start on one end and strip the cable jacket off (about 1″) using a stripper
or a knife. Be extra careful not to nick the wires, otherwise you will need
to start over.
 Spread, untwist the pairs, and arrange the wires in the order of the
desired cable end. Flatten the end between your thumb and forefinger.
Trim the ends of the wires so they are even with one another, leaving
only 1/2″ in wire length. If it is longer than 1/2″ it will be out-of-spec
and susceptible to crosstalk. Flatten and insure there are no spaces
between wires.
 Hold the RJ-45 plug with the clip facing down or away from you. Push
the wires firmly into the plug. Inspect each wire is flat even at the front
of the plug. Check the order of the wires. Double check again. Check
that the jacket is fitted right against the stop of the plug. Carefully hold
the wire and firmly crimp the RJ-45 with the crimper.
 Check the color orientation, check that the crimped connection is not
about to come apart, and check to see if the wires are flat against the
front of the plug. If even one of these are incorrect, you will have to start
over. Test the Ethernet cable.

Ethernet Cable Tips:

 A straight-thru cable has identical ends.


 A crossover cable has different ends.
 A straight-thru is used as a patch cord in Ethernet connections.
 A crossover is used to connect two Ethernet devices without a hub or for
connecting two hubs.
 A crossover has one end with the Orange set of wires switched with the
Green set.
 Odd numbered pins are always striped, even numbered pins are always
solid colored.
 Looking at the RJ-45 with the clip facing away from you, Brown is always
on the right, and pin 1 is on the left.
 No more than 1/2″ of the Ethernet cable should be untwisted otherwise
it will be susceptible to crosstalk.
 Do not deform, do not bend, do not stretch, do not staple, do not run
parallel with power cables, and do not run Ethernet cables near noise
inducing components.

Basic Theory:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 21 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet
crossover cable with a T-568B end, we see that the TX (transmitter) pins are
connected to the corresponding RX (receiver) pins, plus to plus and minus to
minus. You can also see that both the blue and brown wire pairs on pins 4,
5, 7, and 8 are not used in either standard. What you may not realize is that,
these same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as
well. So why bother using these wires, well for one thing its simply easier to
make a connection with all the wires grouped together. Otherwise you’ll be
spending time trying to fit those tiny little wires into each of the corresponding
holes in the RJ-45 connector

Types of Network Configuration

This section covers basic network configuration set up and testing. Also covered are
basic concepts and operations, including the difference between LAN and WAN
networks and how IP Addressing is used.

In a networked environment, such as a company, typically there are many computers


connected together using a router or a switch ( for more information, see router or
switch in the definitions section). In larger companies, there may be several different
routers distributed in buildings and plant locations. A router allows any LAN-side
computer communicate with computers and devices outside the LAN (local area
network). Routers send data packets from one place to another place on a network.
Routers use network addresses to route packets to the correct destination. For
example, in a TCP/IP network, the IP (internet protocol) address of the network
interface is used to direct router destinations.

Because routers help computers inside the LAN “talk” with computers outside of the
LAN. The security of a company’s LAN may be compromised by gaps of open ports
in the router. Security measures may have been instituted to compensate for these
vulnerabilities. Consult your network administrator to learn about the security
measures taken to protect your network. VPN, or virtual private network, is one

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 22 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
such security measure to protect the intelligence of the LAN. A computer outside the
LAN must have an address or key known by the VPN to allow access to the LAN.
Many companies use a VPN to connect two different LANs, thus allowing the transfer
of data between the two networks.

LAN (local area network) vs WAN (wide area network)


Local Area Network

Simply put, a LAN is a computer network that connects a relatively small area (a
single building or group of buildings). Most LANs connect workstations and
computers to each other. Each computer (also known as a “node”), has its own
processing unit and executes its own programs; however, it can also access data and
devices anywhere on the LAN. This means that many users can access and share
the same information and devices. A good example of a LAN device is a network
printer. Most companies cannot afford the budgetary or hardware expense of
providing printers for each of its users. Therefore, one printer (i.e., device) is placed
on the LAN where every user can access the same printer.

The LAN uses IP addresses to route data to different destinations on the network.
An IP Address is a 32-bit numeric address written as four numbers separated by
periods (For example, 1.160.10.240.

Note: For more information on IP Addresses, see your local network administrator.

Figure 1. Local Area Network Diagram

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 23 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting Up
Date Revised:
Computer Networks March 2015 Page 24 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Wide Area Network

A wide area network connects two or more LANs and can span a relatively large
geographical area. For example, Telex Headquarters in Burnsville, MN is connected
to several of its branch offices in Nebraska and Arkansas over the wide area network.
The largest WAN in existence is the Internet.

Figure 2. Wide Area Network Diagram.


Accessing the Wide Area Network (WAN)

Figure 3 shows LAN IP addresses using a common IP address, 10.2.100.x


(192.168.x.x is another common address). Most devices are shipped with these
addresses as its default. It is recommended to use these addresses for LANs.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 25 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Network Address Translation (NAT)

Using the initial IP address, then converting it to a valid WAN IP address is how the
network address translation works in theory. Once the IP address is changed, it is
up to the network interface device (such as a router, gateway, switch, etc.) to keep
track of which computers are talking on which ports. For example, if two local
devices (PC1 and PC2 in Figure 3) both wanted to talk via port 1031, then the network
interface device would have to change one of the port requests to the next available
port, 1032.

Ports
In general, a network port is an endpoint to a logical connection. The port number
identifies what type of port it is. For example, port 80 is used for HTTP traffic.
When you type an address into the address bar of a web browser, your computer
goes to find an IP address for the url you are requesting (http:// www.telex.com).
To obtain this address, the computer contacts a DNS server (Domain Name
Server). Once the IP address is found, it tries to connect to the http port of the
network device (port 80). See Table 1 for a list of the more well-known Port
numbers.

Each network device can be set up to respond or not respond to the various ports.
The function of responding or “hosting a service” is called “serving”.

Packet before translation Packet after translation

Source Destination Source Destination

Port Port Port Port


IP Address Number IP Address Number IP Address Number IP Address Number

To 10.2.100.2 1031 192.156.136.22 80 99.5.1.30 1031 192.156.136.22 80


Internet

From 192.156.136.22 80 99.5.1.30 1031 192.156.136.22 80 10.2.100.2 1031


Internet

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 26 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Table 1 Packet Translation
If a second work station on the LAN wants to communicate to the same server, and
happens to use the same source port number, then the LAN Modem will translate
the source port number as well as the source IP address. In Table 2, a second LAN
computer wants to access a web page. The NAT device now uses port 1032 for this
connection where it used port 1031 in Table 1.

Packet before translation Packet after translation

Source Destination Source Destination

Port Port Port Port


IP Address IP Address IP Address IP Address
Number Number Number Number

To
10.2.100.1 1031 192.156.136.22 80 99.5.1.30 1032 192.156.136.22 80
Internet

From 192.156.136.22 80 99.5.1.30 1032 192.156.136.22 80 10.2.100.1 1031


Internet

Table 2. Packet Translation


Amazingly, all the address translation that occurs takes place automatically in order
to make web browsing and other functions easier. This is also a way for large web
hosting services to speed up the network by having different devices perform different
functions.

Port Port
Description Description
Number Number
1 TCP Port Service Multiplexer 118 SQL Services
(TCPMUX)
5 Remote Job Entry (RJE) 119 Newsgroup (NNTP)
7 ECHO 137 NetBIOS Name Service
18 Message Send Protocol (MSP) 139 NetBIOS Datagram Service
20 FTP – Data 143 Interim Mail Access Protocol
(IMAP)
21 FTP – Control 150 NetBIOS Session Service
23 Telnet 156 SQL Server
25 Simple Mail Transfer 161 SNMP
Protocol (SMTP)

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 27 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
29 MSG ICP 179 Border Gateway Protocol
(BGP)
37 Time 190 Gateway Access Control
Protocol (GACP
42 Host Name Server 194 Internet Relay Chat (IRC)
(Nameserv)
43 Whols 197 Directory Location Services
(DLS)
49 Login Host Protocol (Login) 389 Lightweight Directory Access
Protocol (LDAP)
53 Domain Name Server (DNS) 396 Novell Netware over IP
69 Trivial File Transfer Protocol 443 HTTPS
(TFTP)
70 Gopher Service 444 Simple Network Paging
Protocol (SNPP)
79 Finger 445 Microsoft-DS
80 HTTP 458 Apple QuickTime
103 X.400 Standard 546 DHCP Client
108 SNA Gateway Access Server 547 DHCP Server
109 POP2 563 SNEWS
110 POP3 569 MSN
115 Simple File Transfer Protocol 1080 Socks

Table 3. Well-Known TCP Port Numbers

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 28 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
PROPER PROCEDURE ON CRIMPING NETWORK CABLES

RJ-45 connectors are normally used in telephone and network cables.


Occasionally they are used for serial network connections. When the RJ-45
connectors first came into use, they were primarily used for telephones. The great
advances in technology created a need for another size connector and the RJ-45 was
adapted to fit. Today there are 2 different RJ-45 connector sizes available, 1 for Cat
5 cable and 1 for Cat 6 cable. The user has to make sure they have the one suited to
their job. The easiest way to tell them apart is to compare them side by side. The Cat
6 connector is larger than the Cat 5 connector. Below are instructions for crimping
RJ-45 connectors to a cable.

Step 1

Purchase your cable and your RJ-45 connectors. Most Ethernet cable is
sold on spools of varying lengths, so you might have to measure and cut the
amount you need when you get home.

Step 2
Strip 1 to 2 inches (2.5 to 5.1 cm) of the outer skin at the end of the cable
wire by making a shallow cut in the skin with a utility knife. Run the knife
around the cable, and the jacket should slide off easily. There will be 4 pairs of
twisted wires exposed, each of them a different color or color combination.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 29 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Orange-white striped and solid orange Green-white striped and solid green

Blue-white striped and solid blue Brown-white striped and solid


brown

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 30 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 3 Fold each pair of wires backwards to expose the core of the cable.

Step 4 Cut off the core and discard.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 31 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 5 Straighten the twisted wires using 2 pair of tweezers. Grasp a wire beneath
a bend with 1 pair of tweezers, and use the other pair to gently straighten the bend.
The straighter your wires, the easier your job will be.

Step 6 Arrange the untwisted wires in a row, placing them into the
position, running from right to left, in which they will go into the RJ-45
connector:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 32 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 7 Trim the untwisted wires to a suitable length by holding the RJ-45
connector next to the wires. The insulation on the cable should be just
inside the bottom of the RJ-45 connector. The wires should be trimmed so
that they line up evenly with the top of the RJ-45 connector.

Step 8 Trim the wires in small increments, checking frequently to ensure a correct
fit. It's better to cut the untwisted wires a few times than have to go back and start
all over again because you trimmed off too much.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 33 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 9 Insert the wires into the RJ-45 connector, making sure that they
stay aligned and each color goes into its appropriate channel. Make sure
that each wire goes all the way to the top of the RJ-45 connector. If you
don't make these checks, you will find that your newly crimped RJ-45
connector is useless.

Step 10 Use the crimping tool to crimp the RJ-45 connector to the cable by
pressing the jacket and cable into the connector so that the wedge at the bottom of
the connector is pressed into the jacket. Recrimp the cable once more to ensure
proper connection.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 34 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 11 Follow the instructions above to crimp an RJ-45 connector to the
opposite end of the cable.

Step 12 Use a cable tester to assure that your cable is working properly when
both ends are crimped.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 35 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
FIBER OPTIC TECHNOLOGY

How does fiber optic works?

You hear about fiber-optic cables whenever people talk about the telephone
system, the cable TV system or the Internet. Fiber-optic lines are strands of
optically pure glass as thin as a human hair that carry digital information
over long distances. They are also used in medical imaging and mechanical
engineering inspection.

Fiber optics (optical fibers) are long, thin strands of very pure glass about
the diameter of a human hair. They are arranged in bundles called optical
cables and used to transmit light signals over long distances.

If you look closely at a single optical fiber, you will see that it has the
following parts:

 Core - Thin glass center of the fiber where the light travels
 Cladding - Outer optical material surrounding the core that reflects the light
back into the core
 Buffer coating - Plastic coating that protects the fiber from damage and
moisture

Hundreds or thousands of these optical fibers are arranged in bundles in


optical cables. The bundles are protected by the cable's outer covering,
called a jacket.

Optical fibers come in two types:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 36 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
 Single-mode fibers
 Multi-mode fibers

See Tpub.com: Mode Theory for a good explanation.

Single-mode fibers have small cores (about 3.5 x 10-4 inches or 9 microns in
diameter) and transmit infrared laser light (wavelength = 1,300 to 1,550
nanometers). Multi-mode fibers have larger cores (about 2.5 x 10-3 inches or
62.5 microns in diameter) and transmit infrared light (wavelength = 850 to
1,300 nm) from light-emitting diodes (LEDs).

Some optical fibers can be made from plastic. These fibers have a large core
(0.04 inches or 1 mm diameter) and transmit visible red light (wavelength =
650 nm) from LEDs.

How Does an Optical Fiber Transmit Light?


Suppose you want to shine a flashlight beam down a long, straight hallway. Just
point the beam straight down the hallway -- light travels in straight lines, so it is no
problem. What if the hallway has a bend in it? You could place a mirror at the bend
to reflect the light beam around the corner. What if the hallway is very winding with
multiple bends? You might line the walls with mirrors and angle the beam so that it
bounces from side-to-side all along the hallway. This is exactly what happens in an
optical fiber.

The light in a fiber-optic cable travels through the core (hallway) by constantly
bouncing from the cladding (mirror-lined walls), a principle called total internal
reflection. Because the cladding does not absorb any light from the core, the light
wave can travel great distances.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 37 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
However, some of the light signal degrades within the fiber, mostly due to impurities
in the glass. The extent that the signal degrades depends on the purity of the glass
and the wavelength of the transmitted light (for example, 850 nm = 60 to 75
percent/km; 1,300 nm = 50 to 60 percent/km; 1,550 nm is greater than 50
percent/km). Some premium optical fibers show much less signal degradation -- less
than 10 percent/km at 1,550 nm.

A Fiber-Optic Relay System


To understand how optical fibers are used in communications systems, let's look at
an example from a World War II movie or documentary where two naval ships in a
fleet need to communicate with each other while maintaining radio silence or on
stormy seas. One ship pulls up alongside the other. The captain of one ship sends
a message to a sailor on deck. The sailor translates the message into Morse code
(dots and dashes) and uses a signal light (floodlight with a venetian blind type
shutter on it) to send the message to the other ship. A sailor on the deck of the
other ship sees the Morse code message, decodes it into English and sends the
message up to the captain.

Now, imagine doing this when the ships are on either side of the ocean separated
by thousands of miles and you have a fiber-optic communication system in place
between the two ships. Fiber-optic relay systems consist of the following:

 Transmitter - Produces and encodes the light signals


 Optical fiber - Conducts the light signals over a distance
 Optical regenerator - May be necessary to boost the light signal (for long
distances)
 Optical receiver - Receives and decodes the light signals

Transmitter
The transmitter is like the sailor on the deck of the sending ship. It receives and
directs the optical device to turn the light "on" and "off" in the correct sequence,
thereby generating a light signal.

The transmitter is physically close to the optical fiber and may even have a lens to
focus the light into the fiber. Lasers have more power than LEDs, but vary more
with changes in temperature and are more expensive. The most common
wavelengths of light signals are 850 nm, 1,300 nm, and 1,550 nm (infrared, non-
visible portions of the spectrum).

Optical Regenerator

As mentioned above, some signal loss occurs when the light is transmitted through
the fiber, especially over long distances (more than a half mile, or about 1 km) such
as with undersea cables. Therefore, one or more optical regenerators is spliced
along the cable to boost the degraded light signals.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 38 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
An optical regenerator consists of optical fibers with a special coating (doping). The
doped portion is "pumped" with a laser. When the degraded signal comes into the
doped coating, the energy from the laser allows the doped molecules to become
lasers themselves. The doped molecules then emit a new, stronger light signal with
the same characteristics as the incoming weak light signal. Basically, the
regenerator is a laser amplifier for the incoming signal.

Optical Receiver

The optical receiver is like the sailor on the deck of the receiving ship. It takes the
incoming digital light signals, decodes them and sends the electrical signal to the
other user's computer, TV or telephone (receiving ship's captain). The receiver uses
a photocell or photodiode to detect the light.

Advantages of Fiber Optics


Why are fiber-optic systems revolutionizing telecommunications? Compared
to conventional metal wire (copper wire), optical fibers are:

Less expensive - Several miles of optical cable can be made cheaper than
equivalent lengths of copper wire. This saves your provider (cable TV,
Internet) and you money. Thinner - Optical fibers can be drawn to smaller
diameters than copper wire. Higher carrying capacity - Because optical
fibers are thinner than copper wires, more fibers can be bundled into a
given-diameter cable than copper wires. This allows more phone lines to go
over the same cable or more channels to come through the cable into your
cable TV box. Less signal degradation - The loss of signal in optical fiber is
less than in copper wire. Light signals - Unlike electrical signals in copper
wires, light signals from one fiber do not interfere with those of other fibers
in the same cable. This means clearer phone conversations or TV reception.
Low power - Because signals in optical fibers degrade less, lower-power
transmitters can be used instead of the high-voltage electrical transmitters
needed for copper wires. Again, this saves your provider and you money.
Digital signals - Optical fibers are ideally suited for carrying digital
information, which is especially useful in computer networks. Non-
flammable - Because no electricity is passed through optical fibers, there is
no fire hazard. Lightweight - An optical cable weighs less than a
comparable copper wire cable. Fiber-optic cables take up less space in the
ground. Flexible - Because fiber optics are so flexible and can transmit and
receive light, they are used in many flexible digital cameras for the following
purposes:

 Medical imaging - in bronchoscopes, endoscopes, laparoscopes


 Mechanical imaging - inspecting mechanical welds in pipes and engines (in
airplanes, rockets, space shuttles, cars)
 Plumbing - to inspect sewer lines

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 39 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Because of these advantages, you see fiber optics in many industries, most
notably telecommunications and computer networks. For example, if you
telephone Europe from the United States (or vice versa) and the signal is
bounced off a communications satellite, you often hear an echo on the line.
But with transatlantic fiber-optic cables, you have a direct connection with
no echoes.

TERMINATING FIBER OPTIC CABLES


The following steps will guide you through the preparation and termination
process for a no epoxy, no polish fiber optic SC connector. Following these
guidelines will help ensure that you receive the optimum performance from
the fiber optic cable.

There are numerous other methods for terminating fiber optic connectors
that can be found in our Installation Pocket Reference Guide.

Step 1: The tools you will need:

 Fiber stripper
 Ruler
 Marker

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 40 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 2: Measure from the end of the fiber to 40 mm and mark the cable. -

Step 3: Slide the strain-relief boot onto the cable.

Step 4: Make sure the stripper’s cutting face is clean. Use the front, large V-
notch on the cable stripper to remove the 900-micron tight buffer.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 41 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 5: Carefully clamp down on the cable halfway down from the mark you
made

Step 6: Keeping the pressure light, carefully slide the jacket off of the fiber.
Be careful to avoid breaking the fragile glass fiber. Repeat step to remove
the remaining 20 mm of jack.

Step 7: Carefully remove any of the leftover 250-micron coating (notice the
white film on the fiber) using the smaller, back V-notch on the tool.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 42 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 8: Clean the bare fiber with two passes of a fiber wipe dampened with
fiber optic cleaning fluid.

Do not touch the bare fiber after cleaning it.

Step 9: Ensure that both clamps (C) are clean and free of fiber. Squeeze
buttons A and B at the same time to open clamps.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 43 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 10: Place fiber in the slot so the bare fiber is in the V-groove, the buffer
or coating is aligned with the alignment mark, and the fiber rests under the
tab. Fully release button B then button A. Ensure both the bare and coated
fiber is secured by the clamps.

Step 11: Slowly turn the knob 360 degrees to cut the fiber.

Step 12: Squeeze button A, remove the scrap fiber and place it in the scrap
fiber bin.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 44 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 13: While holding onto the fiber, squeeze button B and remove the
cleaved fiber.

Step 14: Measure and mark an additional 11 mm on the fiber jacket.

Step 15: Ensure the components are in the starting position. If not, slide
the VFL coupler back toward the cover hinge until it locks. Verify the load
button is released and the connector cradle is against the travel stop.
Depress the reset button to return the wrench to the start position.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 45 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 16: Ensure the correct ferrule adapter is installed. Switch the power
on. If the power light flashes or does not glow, the batteries need to be
replaced.

Step 17: Remove the dust cap from connector and squeeze the load button
to move the connector cradle away from the wrench.

Step 18: With the connector oriented up, load the connector into the tool by
inserting it (lead-in tube first, into the wrench). Slowly release the load
button while guiding the connector into the connector cradle.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 46 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 19: Slide the VFL coupler down until the ferrule adapter is seated on
the connector. -

Step 20: Close the cover and check for the error light. If the error light
remains off, there are no problems.Insert the cleaved fiber into the back of
the lead-in tube. Insert the fiber until you feel it firmly stop against the fiber
stub. The visual mark should be within 2 mm of the lead-in tube.While
maintaining enough inward pressure, squeeze the CAM button in until it
locks. Check the termination lights. If the green light is illuminated, the
termination was successful. If the red light is illuminated, press the reset
button, remove the fiber and repeat the termination process.

Step 22: Open the cover and slide the VFL coupler back into its starting position.
Slightly squeeze the button to remove the connector. Ensure the clear ferrule dust
cap is installed. Slide the boot up the back of the connector until it reaches the
cam

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 47 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 23: The fiber connector is completed.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 48 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
SELF CHECK 2.1-1

I. Identify the following. Write your answer in the space provided.

______________ 1. Consist of components that provide a means for data to


travel from one point to another point in the network.
______________ 2. Are devices that provide network attachment to the end
systems and intelligent switching of the data within the local network.
______________ 3. A board in a switchboard, computer, or other device with
a number of electric sockets that can be connected in various
combinations.
______________ 4. is a valuable application for most network users. Users
can communicate information (messages and files) electronically in a
timely manner, to not only other users in the same network but also other
users outside the network (suppliers, information resources, and
customers, for example). Examples of e-mail programs include Microsoft
Outlook and Eudora by Qualcomm.
______________ 5. This type of application enables users on a network to
store information in central locations (such as storage devices) so that
others on the network can easily retrieve selected information in the
formats that are most useful to them. Some of the most common
databases used in enterprises today are Oracle and Microsoft SQL Server.
______________ 6. Is a computer network that connects a relatively small
area (a single building or group of buildings).
______________ 7. Connects two or more LANs and can span a relatively
large geographical area.
______________ 8. Is an endpoint to a logical connection.
______________ 9. Started in the personal user-to-user space; however, it
soon provided considerable benefit in the corporate world.
______________ 10. Enables access to the Internet through a common
interface.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 49 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Answer Keys 2.1-1

1. Interconnections
2. Switches
3. Patch panel
4. Email
5. Database
6. LAN
7. WAN
8. Network port
9. Instant messaging
10. Web Browser

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 50 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 2 SET-UP NETWORK CONFIGURATION

CONTENTS:

1. Network checking and configuration


2. Checking of network based on network design
3. Network Interface card setting
4. Connectivity of network components and devices
5. Contingency plans for unplanned events or conditions
6. Types of network configuration

ASSESSMENT CRITERIA:

1. Network connectivity of each terminal is checked in accordance with


network design.
2. Any fault or problem in the network system is diagnosed and remedied
in line with the standard operating procedures.
3. Network interface card (NIC) settings are configured in accordance
with network design.
4. Communication checking between terminals are carried out in
accordance with OS network configuration guides
5. Unplanned events or conditions are responded to in accordance with
established procedures

The students/trainees must be provided with the following:

 Desktop Computer / Laptop Computer


 Server Computer
 Network switch
 Materials
- RJ45
- UTP Cable
 Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
- Utility software
- Computer system
- Crimping tool
- LAN Tester
 Policies and procedures:
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 51 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
- Procedures and guidelines
- Safety precautions
METHODOLOGIES:

 Lecture
 Discussion
 Demonstration
 Viewing multimedia

ASSESSMENT METHODS:

 Written examination
 Practical examination

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 52 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 2

SET-UP NETWORK CONFIGURATION

Learning Activities Special Instructions

Read the Information Sheet 2.2- Read, understand the information


1(Creating Local Area Connection) sheet and evaluate yourself using
Task sheet 2.2-1.
Perform the instructions stated in the
Task Sheet 2.2-1, before proceeding
to the next activity.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 53 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 2.2-1
Creating Basic Local Area Connection

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Create a local area connection.


2. Connect specific devices to a network.
3. Check each terminal for network connectivity.

Introduction

A local-area network (LAN) is a computer network that spans a relatively small


area. Most LANs are confined to a single building or group of buildings,
however, one LAN can be connected to other LANs over any distance via
telephone lines and radio waves

How to Create a Local Area Network (LAN)

A LAN, or local area network, is a great way to share files and devices between
multiple computers. If you have several computers in your home, setting up
a network will allow you to share an Internet connection, data, printers, and
other devices between your computers - all without wires. Fortunately, the
process is simple, and you can learn how to set up a LAN in your home by
following a few easy steps.

Steps 1: Assess your needs in a network. The devices you use to set your
network up will determine your network's capabilities. You should address
your needs in terms of cost, security, connection speed, expandability (adding
more computers or devices later) and distance between computers. In general,
you will need to keep all the computers in the network within 100 yards (91
m) of each other.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 54 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 2 Ensure that your computers have wireless networking cards
installed. In order to communicate wirelessly with other computers in the
network, each computer must have a wireless networking card. If your
computers are only a few years old, you are almost guaranteed to already have
one built-in, as this is a standard feature on all computers being produced
today. If you have an older computer, you may need to purchase and install
a networking card.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 55 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 3 Set up an Internet connection. While LANs can be set up simply to
share files between computers without Internet connectivity, there is little
benefit to doing so considering the cost of wiring the entire network. To share
an Internet connection between computers, you will first need a broadband
Internet connection (such as cable or DSL) set up for your primary computer.
Contact a local Internet service provider (ISP) to establish a connection if you
don't already have one.

Step 4 Purchase a wireless router. You will need to broadcast your Internet
connection wirelessly, and for this, you need a router. When buying a router,
make sure you get one that is designed for your connection type (cable, DSL,
etc.). You should also consider the strength of the router's signal. The
packaging will describe how far you can expect the router's signal to
broadcast. It will need to reach every computer in your network.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 56 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 5 Install the router. To install the router, run your main Ethernet cable
(the one used for connecting your primary computer to the Internet) from your
modem into the router. Plug the router's power cord in, and then install any
software that it came with on each computer in the network. When you are
finished, the router should begin broadcasting your Internet connection
wirelessly.

Step 6 Connect each computer to the wireless network. On each computer,


find the wireless network's name that you assigned during the software
installation. Connect to that network using the password that you created.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 57 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Step 7 Share files over the network. To make files on 1 computer accessible
to users on other computers, you must mark them as shared. In Windows,
you can do this by placing the files in the "Shared Documents" folder or by
right-clicking on each file and checking "Share this file" in the "Properties"
menu. The process will differ slightly for other operating systems.

Step 8 Connect to any devices in the network. To connect to devices such


as printers and scanners, these devices will also need to be able to
communicate wirelessly (this feature is not nearly as common on printers as
on computers). To connect to a device, simply locate the device's icon on the
network drive on each computer. Double-clicking on a printer's icon, for
example, should install the printer and enable it for future use.

Step 9 To check connectivity of the computers in the network run the


command prompt. Type the command ping (ipaddress of the computer to be
checked) –t. Youu will see the figure below if your ping was successful.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 58 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 59 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
TASK SHEET 2.2-1
Title: CREATE A LOCAL AREA CONNECTION

Performance Objective: Given the proper procedure in creating a local area


network, you should be able to create a local area
connection between a laptop and desktop.

Supplies/Materials :

 Ethernet Cables
 Mother Board manual
 Network Drivers

Equipment : 1 set DESKTOP COMPUTER


1 Laptop Computer
1 Wireless Router
Steps/Procedure:

1. Prepare the necessary materials before starting the task.


2. Configure the wireless router using the laptop.
(Refer to wireless router manual for default ip address and default
admin credentials)
3. Change the wireless router name to ICT 2015 and password of
ICT2015
4. If DHCP server is off turn it on.
5. Reboot the wireless router and reconnect the laptop computer.
6. Using the Ethernet cable, connect the desktop computer to the LAN
port of the wireless router.
7. Perform ping test and File sharing.
8. After the task make sure to remove all connections and power off
all devices.
9. Return necessary equipment and materials to the lab in-charge.

Assessment Method:

Performance Criteria Checklist

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 60 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Performance Criteria Checklist 2.2-1

CRITERIA YES NO
Did you….
1. Ensure that safety measures, policies and procedures
followed, and that work is appropriately sequenced in
accordance with the industry standards?
2. Successfully created a local area connection?

3. Successfully connected the laptop to the wireless


router?
4. Successfully connected the desktop computer to the
wireless router?
5. Performed ping test and file sharing?

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 61 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 3 SET UP ROUTER /WIFI/ WIRELESS
ACCESSPOINT/ REPEATER
CONFIGURATION

CONTENTS:

1. Network Diagram / Network Design


2. Hardware Requirements
3. System Requirements
4. IPV4 address and IPV6 address
5. Different types of network configuration
6. Firewall
7. Advance Networking
8. Wireless network device settings and configuration

ASSESSMENT CRITERIA:

1. Client Device systems settings are configured in accordance with


manufacturers’ instructions and end-user preferences
2. Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
3. Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
4. Wireless settings are configured in accordance manufacturers’
instructions, network design and end-user preferences
5. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end-user preferences

CONDITIONS:

The students/trainees must be provided with the following:

 Desktop Computer / Laptop Computer


 Server Computer
 Network switch
 Wireless router / Wirelss access point
 Materials
- RJ45
- UTP Cable
 Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
- Utility software
- Computer system

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 62 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
- Crimping tool
- LAN Tester
 Policies and procedures:
- Procedures and guidelines
- Safety precautions
METHODOLOGIES:

 Lecture
 Discussion
 Demonstration
 Viewing multimedia

ASSESSMENT METHODS:

 Written examination
 Practical examination

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 63 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 3
SET UP ROUTER /WIFI/ WIRELESS ACCESSPOINT/ REPEATER
CONFIGURATION

Learning Activities Special Instructions

Read the Information Sheet 2.3-1(IP Read, understand the information


ADDRESSING) sheet and evaluate yourself using
Self – check 2.3-1.
Evaluate yourself by answering the
Self Check 2.3-1 before proceeding to
the next activity
Read the Information Sheet 2.3- Read, understand the information
2(Wireless Network Devices sheet and evaluate yourself using
Configuration) Task Sheet 2.3-2.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 64 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 2.3-1
IP ADDRESSING

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Identify IPV4 IP Address.


2. Identify IPV6 IP Address.
3. Perform basic subnetting.

Introduction
An Internet Protocol address (IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in a
computer network that uses the Internet Protocol for communication.

IPV4 ADDRESSING
IPv4 supports three different types of addressing modes.:

Unicast Addressing Mode:


In this mode, data is sent only to one destined host. The Destination
Address field contains 32- bit IP address of the destination host. Here the
client sends data to the targeted server:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 65 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Broadcast Addressing Mode:
In this mode, the packet is addressed to all the hosts in a network segment.
The Destination Address field contains a special broadcast address, i.e.
255.255.255.255. When a host sees this packet on the network, it is bound
to process it. Here the client sends a packet, which is entertained by all the
Servers:

Multicast Addressing Mode:


This mode is a mix of the previous two modes, i.e. the packet sent is neither
destined to a single host nor all the hosts on the segment. In this packet, the
Destination Address contains a special address which starts with 224.x.x.x
and can be entertained by more than one host.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 66 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Here a server sends packets which are entertained by more than one
servers. Every network has one IP address reserved for the Network Number
which represents the network and one IP address reserved for the Broadcast
Address, which represents all the hosts in that network.

Hierarchical Addressing Scheme


IPv4 uses hierarchical addressing scheme. An IP address, which is 32-bits in
length, is divided into two or three parts as depicted:

A single IP address can contain information about the network and its sub-
network and ultimately the host. This scheme enables the IP Address to be
hierarchical where a network can have many sub-networks which in turn
can have many hosts.

Subnet Mask
The 32-bit IP address contains information about the host and its network.
It is very necessary to distinguish both. For this, routers use Subnet Mask,
which is as long as the size of the network address in the IP address. Subnet
Mask is also 32 bits long. If the IP address in binary is ANDed with its
Subnet Mask, the result yields the Network address. For example, say the IP
Address is 192.168.1.152 and the Subnet Mask is 255.255.255.0 then:
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 67 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
This way the Subnet Mask helps extract the Network ID and the Host from
an IP Address. It can be identified now that 192.168.1.0 is the Network
number and 192.168.1.152 is the host on that network.

Binary Representation
The positional value method is the simplest form of converting binary from
decimal value. IP address is 32 bit value which is divided into 4 octets. A
binary octet contains 8 bits and the value of each bit can be determined by
the position of bit value '1' in the octet.

Positional value of bits is determined by 2 raised to power (position – 1), that


is the value of a bit 1 at position 6 is 26-1 that is 25 that is 32. The total
value of the octet is determined by adding up the positional value of bits.
The value of 11000000 is 128+64 = 192. Some examples are shown in the
table below:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 68 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 69 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Internet Protocol hierarchy contains several classes of IP Addresses to be
used efficiently in various situations as per the requirement of hosts per
network. Broadly, the IPv4 Addressing system is divided into five classes of
IP Addresses. All the five classes are identified by the first octet of IP
Address.

Internet Corporation for Assigned Names and Numbers is responsible for


assigning IP addresses.

The first octet referred here is the left most of all. The octets numbered as
follows depicting dotted decimal notation of IP Address:

The number of networks and the number of hosts per class can be derived
by this formula:

When calculating hosts' IP addresses, 2 IP addresses are decreased because


they cannot be assigned to hosts, i.e. the first IP of a network is network
number and the last IP is reserved for Broadcast IP.

Class A Address
The first bit of the first octet is always set to 0 (zero). Thus the first octet
ranges from 1 – 127, i.e.

Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The
IP range 127.x.x.x is reserved for loopback IP addresses.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 70 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
The default subnet mask for Class A IP address is 255.0.0.0 which implies
that Class A addressing can have 126 networks (27-2) and 16777214 hosts
(224-2).

Class A IP address format is thus:


0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH

Class B Address
An IP address which belongs to class B has the first two bits in the first
octet set to 10, i.e.

Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default


subnet mask for Class B is 255.255.x.x.

Class B has 16384 (214) Network addresses and 65534 (216-2) Host
addresses.

Class B IP address format is:


10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH

Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is:

Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default


subnet mask for Class C is 255.255.255.x.

Class C gives 2097152 (221) Network addresses and 254 (28-2) Host
addresses.

Class C IP address format is:


110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH

Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110,
giving a range of:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 71 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Class D has IP address rage from 224.0.0.0 to 239.255.255.255. Class D is
reserved for Multicasting. In multicasting data is not destined for a
particular host, that is why there is no need to extract host address from the
IP address, and Class D does not have any subnet mask.

Class E Address
This IP Class is reserved for experimental purposes only for R&D or Study.
IP addresses in this class ranges from 240.0.0.0 to 255.255.255.254. Like
Class D, this class too is not equipped with any subnet mask.

Each IP class is equipped with its own default subnet mask which bounds
that IP class to have prefixed number of Networks and prefixed number of
Hosts per network. Classful IP addressing does not provide any flexibility of
having less number of Hosts per Network or more Networks per IP Class.

CIDR or Classless Inter Domain Routing provides the flexibility of


borrowing bits of Host part of the IP address and using them as Network in
Network, called Subnet. By using subnetting, one single Class A IP address
can be used to have smaller sub-networks which provides better network
management capabilities.

Class A Subnets
In Class A, only the first octet is used as Network identifier and rest of three
octets are used to be assigned to Hosts (i.e. 16777214 Hosts per Network).
To make more subnet in Class A, bits from Host part are borrowed and the
subnet mask is changed accordingly.

For example, if one MSB (Most Significant Bit) is borrowed from host bits of
second octet and added to Network address, it creates two Subnets (21=2)
with (223-2) 8388606 Hosts per Subnet.

The Subnet mask is changed accordingly to reflect subnetting. Given below


is a list of all possible combination of Class A subnets:

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 72 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
In case of subnetting too, the very first and last IP address of every subnet is
used for Subnet Number and Subnet Broadcast IP address respectively.
Because these two IP addresses cannot be assigned to hosts, sub-netting
cannot be implemented by using more than 30 bits as Network Bits, which
provides less than two hosts per subnet.

Class B Subnets
By default, using Classful Networking, 14 bits are used as Network bits
providing (214) 16384 Networks and (216-1) 65534 Hosts. Class B IP
Addresses can be subnetted the same way as Class A addresses, by

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 73 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
borrowing bits from Host bits. Below is given all possible combination of
Class B subnetting:

Class C Subnets
Class C IP addresses are normally assigned to a very small size network
because it can only have 254 hosts in a network. Given below is a list of all
possible combination of subnetted Class B IP address:

Internet Service Providers may face a situation where they need to allocate
IP subnets of different sizes as per the requirement of customer. One
customer may ask Class C subnet of 3 IP addresses and another may ask
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 74 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
for 10 IPs. For an ISP, it is not feasible to divide the IP addresses into fixed
size subnets, rather he may want to subnet the subnets in such a way
which results in minimum wastage of IP addresses.

For example, an administrator have 192.168.1.0/24 network. The suffix /24


(pronounced as "slash 24") tells the number of bits used for network
address. In this example, the administrator has three different departments
with different number of hosts. Sales department has 100 computers,
Purchase department has 50 computers, Accounts has 25 computers and
Management has 5 computers. In CIDR, the subnets are of fixed size. Using
the same methodology the administrator cannot fulfill all the requirements
of the network.

The following procedure shows how VLSM can be used in order to allocate
department-wise IP addresses as mentioned in the example.

Step - 1
Make a list of Subnets possible.

Step - 2
Sort the requirements of IPs in descending order (Highest to Lowest).

 Sales 100
 Purchase 50
 Accounts 25
 Management 5

Step - 3
Allocate the highest range of IPs to the highest requirement, so let's assign
192.168.1.0 /25 (255.255.255.128) to the Sales department. This IP subnet
with Network number 192.168.1.0 has 126 valid Host IP addresses which
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 75 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
satisfy the requirement of the Sales department. The subnet mask used for
this subnet has 10000000 as the last octet.

Step - 4
Allocate the next highest range, so let's assign 192.168.1.128 /26
(255.255.255.192) to the Purchase department. This IP subnet with Network
number 192.168.1.128 has 62 valid Host IP Addresses which can be easily
assigned to all the PCs of the Purchase department. The subnet mask used
has 11000000 in the last octet.

Step - 5
Allocate the next highest range, i.e. Accounts. The requirement of 25 IPs can
be fulfilled with 192.168.1.192 /27 (255.255.255.224) IP subnet, which
contains 30 valid host IPs. The network number of Accounts department will
be 192.168.1.192. The last octet of subnet mask is 11100000.

Step - 6
Allocate the next highest range to Management. The Management
department contains only 5 computers. The subnet 192.168.1.224 /29 with
the Mask 255.255.255.248 has exactly 6 valid host IP addresses. So this
can be assigned to Management. The last octet of the subnet mask will
contain 11111000.

By using VLSM, the administrator can subnet the IP subnet in such a way
that least number of IP addresses are wasted. Even after assigning IPs to
every department, the administrator, in this example, is still left with plenty
of IP addresses which was not possible if he has used CIDR.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 76 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
IPV6 ADDRESSING

Intro

One of the main benefits of Internet Protocol


version 6 (IPv6) over previously used Internet
Protocol version 4 (IPv4) is the large address-
space that contains (addressing) information
to route packets for the next generation
Internet.

IPv6 supports 128-bit address space and can


potentially support 2128 or 3.4W1038 unique
IP addresses (as opposed to 32-bit address
space of IPv4). With this large address-space
scheme, IPv6 has the capability to provide
unique addresses to each and every device or
node attached to the Internet.

Why we need IPv6 Addressing

An escalating demand for IP addresses acted as the driving force behind the
development of the large address space offered by the IPv6. According to
industry estimates, in the wireless domain, more than a billion mobile phones,
Personal Digital Assistants (PDA), and other wireless devices will require
Internet access, and each will need its own unique IP address.

The extended address length offered by IPv6 eliminates the need to use
techniques such as network address translation to avoid running out of the
available address space. IPv6 contains addressing and control information to
route packets for the next generation Internet.

Types of IPv6 Addresses

IPv6 addresses are broadly classified into three categories:

1) Unicast addresses A Unicast address acts as an identifier for a single


interface. An IPv6 packet sent to a Unicast address is delivered to the interface
identified by that address.

2) Multicast addresses A Multicast address acts as an identifier for a group/set


of interfaces that may belong to the different nodes. An IPv6 packet delivered
to a Multicast address is delivered to the multiple interfaces.

3) Anycast addresses Anycast addresses act as identifiers for a set of interfaces


Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 77 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
that may belong to the different nodes. An IPv6 packet destined for an Anycast
address is delivered to one of the interfaces identified by the address.

IPv6 Address Notation

IPv6 addresses are denoted by eight groups of hexadecimal quartets separated


by colons in between them.

Following is an example of a valid IPv6 address:


2001:cdba:0000:0000:0000:0000:3257:9652

Any four-digit group of zeroes within an IPv6 address may be reduced to a


single zero or altogether omitted. Therefore, the following IPv6 addresses are
similar and equally valid:

2001:cdba:0000:0000:0000:0000:3257:9652
2001:cdba:0:0:0:0:3257:9652
2001:cdba::3257:9652

The URL for the above address will be of the form:

http://[2001:cdba:0000:0000:0000:0000:3257:9652]/

Network Notation in IPv6

The IPv6 networks are denoted by Classless Inter Domain Routing (CIDR)
notation. A network or subnet using the IPv6 protocol is denoted as a
contiguous group of IPv6 addresses whose size must be a power of two. The
initial bits of an IPv6 address (these are identical for all hosts in a network)
form the networks prefix. The size of bits in a network prefix are separated
with a /. For example, 2001:cdba:9abc:5678::/64 denotes the network address
2001:cdba:9abc:5678. This network comprises of addresses rearranging from
2001:cdba:9abc:5678:: up to 2001:cdba:9abc:5678:ffff:ffff:ffff:ffff. In a similar
fashion, a single host may be denoted as a network with a 128-bit prefix. In
this way, IPv6 allows a network to comprise of a single host and above.

Special Addresses in IPv6

::/96 The zero prefix denotes addresses that are compatible with the
previously used IPv4 protocol.

::/128 An IPv6 address with all zeroes in it is referred to as an


unspecified address and is used for addressing purposes within a
software.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 78 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
::1/128 This is called the loop back address and is used to refer to the
local host. An application sending a packet to this address will get the
packet back after it is looped back by the IPv6 stack. The local host
address in the IPv4 was 127.0.0.1.

2001:db8::/32 This is a documentation prefix allowed in the IPv6. All


the examples of IPv6 addresses should ideally use this prefix to indicate
that it is an example.

fec0::/10 This is a site-local prefix offered by IPv6. This address prefix


signifies that the address is valid only within the local organization.
Subsequently, the usage of this prefix has been discouraged by the RFC.

fc00::/7 This is called the Unique Local Address (ULA). These addresses
are routed only within a set of cooperating sites. These were introduced
in the IPv6 to replace the site-local addresses. These addresses also
provide a 40-bit pseudorandom number that reduces the risk of address
conflicts.

ff00::/8 This prefix is offered by IPv6 to denote the multicast addresses.


Any address carrying this prefix is automatically understood to be a
multicast address.

fe80::/10 This is a link-local prefix offered by IPv6. This address prefix


signifies that the address is valid only in the local physical link.

Reference: Please see RFC 1884 - IP Version 6 Addressing Architecture for


more information.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 79 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
SELF CHECK 2.3-1

Instructions: Answer the following questions, write the computation and


answer in the space provided.

1. Calculate the minimum subnets required for 500 users. (Indicate


the starting and ending ip address, default gateway and broadcast
id)

2. Calculate the minimum subnets required for 150 users. (Indicate


the starting and ending ip address, default gateway and broadcast
id)

3. Calculate the minimum subnets required for 800 users. (Indicate


the starting and ending ip address, default gateway and broadcast
id)

4. Calculate the minimum subnets required for 1500 users. (Indicate


the starting and ending ip address, default gateway and broadcast
id)

5. Calculate the minimum subnets required for 2000 users. (Indicate


the starting and ending ip address, default gateway and broadcast
id)

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 80 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 81 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 2.3-2
WIRELESS NETWORK DEVICES CONFIGURATION

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Configure wireless router.


2. Configure wireless access point.
3. Configure wireless repeater.
Introduction
An Internet Protocol address (IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in a computer
network that uses the Internet Protocol for communication

HOW TO SET UP WIRELESS ROUTER

STEP 1 Purchase a wireless router. Routers come in all shapes and sizes.
Compare features to find the router that is right for you. If you have more
area that you need to cover, or have lots of walls in your home, you’ll need a
router that offers the option of upgrading antenna(s) with high gain types - if
not supplied in the box. If more than one wireless device will be connecting
at the same time at different speeds, a MiMo type router is recommended,
otherwise the speed for all devices will drop the highest supported by all at
that time.

 All modern routers should support 802.11n, or Wireless-N). This is


the most stable, offers the fastest speeds and is backwards compatible
with older standards such as 802.11g.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 82 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 2 Connect your router to your modem. Routers and wireless routers
enable you to share your broadband internet connection with multiple
devices. To do so, you will need to connect your broadband modem to the
router. For best results, place your router near your modem.

 Connect the router and the modem with an Ethernet cable. Most
routers come packaged with a short Ethernet cable that you can use for
this.
 Connect the modem to the WAN/Internet port on your router. It is
usually offset, and may be a different color from the LAN ports

STEP 3 Connect any devices you want to hard wire with CAT 5 (or better)
Ethernet cables. If you have computers that are close, or a video game
console or TV, you can connect them to the router via Ethernet. This will
result in a more stable and faster connection, and doesn’t require any extra
configuration.

STEP 4 Connect at least one computer via Ethernet. You will need at least
one computer connecting via Ethernet cable in order to adjust your router
settings. You can disconnect this computer afterwards if you want to connect
wirelessly

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 83 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 5 Find the IP address of the router. If this is a new installation or
new router, determine the default IP address that may be printed on a label
affixed to the router or in the documentation. If you can’t find the router’s IP
address anywhere, you can do a web search for the router model to see what
the default address is.

 IP addresses are formatted as four groups of up to three digits,


separated by periods.
 Most default IP addresses are 192.168.1.1, 192.168.0.1, or
192.168.2.1.

STEP 6 Open a web browser on the computer that is connected to the


router. Enter in the IP address of the router into the address bar and press
Enter. Your browser will attempt to connect to the router’s configuration
menu.

 If your router came with an installation disc, you can run the
configuration program from that instead. It will accomplish many of the
same functions.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 84 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 7 Enter your username and password. In order to access the
configuration page, you will need to be on the router's IP address and enter
a valid username and password at the prompt. Most routers have a basic
account set up that you will need to use to log on. This varies from model to
model, but should be printed on the router or in the documentation.

 The most typical username is “admin”.


 The most typical passwords are “admin” and “password”.
 Many routers will only require a username and a blank password, and
some allow you to leave all fields blank.
 If you can’t figure out the correct IP address, your username or
password, search for your router model online to see what the default
login is. If it has been changed, press the Reset button on the back of
the router for 10 (to 30+ seconds as dictated in the instructions for
the router model) to restore factory defaults and try again.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 85 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 8 Open the Wireless Settings. When you log in to your router, you will
be taken to the router’s main menu or status screen. There will be several
options to choose from. The Internet section can usually be left at default
settings, unless you received specific instructions from your internet service
provider. The Wireless section will allow you to set up your wireless network.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 86 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 9 Enter a name for your wireless network. In the Wireless section,
you should see a field labeled SSID or Name. Enter a unique name for your
wireless network. This is what other devices will see when scanning for
networks.

 Check the box to enable SSID broadcast. This will essentially “turn
on” the wireless network so that it may be readily seen by anyone in
range of the signal. *See the Tips section below for additional
information on the SSID setting

STEP 10 Choose a security method. Choose from the list of available


security options. For the best security, choose WPA2-PSK as the encryption
method. This is the most difficult security to crack, and will give you the most
protection from hackers and intruders.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 87 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 11 Create a passphrase. Once you’ve chosen your security method,
enter in a passphrase for the network. This should be a difficult password,
with a combination of letters, numbers, and symbols. Don’t use any
passwords that could be easily deduced from your network name or from
knowing you.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 88 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 12 save your settings. Once you are finished naming and securing
your wireless network, click the Apply or Save button. The changes will be
applied to your router, which may take a few moments. Once the router
has finished resetting, your wireless network will be enabled.

STEP 13 Change your router’s username and password from the default.
Once you have your network configured, you should change the username
and password that you use to access your router. This will help protect your
router from unauthorized changes. You can change these from the
Administration section of the router configuration menu.[2]

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 89 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 14 Block sites. If you want to prevent devices that are connected to
your network from accessing certain websites, you can use built-in blocking
tools to restrict access. These can be found in the Security/Block section of
the router.

 You can usually block by specific domain names, or by keywords

HOW TO CONFIGURE A WIRELESS ACCESSPOINT

The physical setup for a wireless access point is pretty simple: You take it out
of the box, put it on a shelf or on top of a bookcase near a network jack and
a power outlet, plug in the power cable, and plug in the network cable.

The software configuration for an access point is a little more involved, but
still not very complicated. It's usually done via a Web interface. To get to the
configuration page for the access point, you need to know the access point's
IP address. Then, you just type that address into the address bar of a browser
from any computer on the network.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 90 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Multifunction access points usually provide DHCP and NAT services for the
networks and double as the network's gateway router. As a result, they
typically have a private IP address that's at the beginning of one of the
Internet's private IP address ranges, such as 192.168.0.1 or 10.0.0.1. Consult
the documentation that came with the access point to find out more.

Basic configuration options


When you access the configuration page of your wireless access point on the
Internet, you have the following configuration options that are related to the
wireless access point functions of the device. Although these options are
specific to this particular device, most access points have similar
configuration options.

 Enable/Disable: Enables or disables the device's wireless access point


functions.

 SSID: The Service Set Identifier used to identify the network. Most
access points have well-known defaults. You can talk yourself into
thinking that your network is more secure by changing the SSID from
the default to something more obscure, but in reality, that only protects
you from first-grade hackers. By the time most hackers get into the
second grade, they learn that even the most obscure SSID is easy to get
around. So leave the SSID at the default and apply better security
measures.

 Allow broadcast SSID to associate? Disables the access point's


periodic broadcast of the SSID. Normally, the access point regularly
broadcasts its SSID so that wireless devices that come within range can
detect the network and join in. For a more secure network, you can
disable this function. Then, a wireless client must already know the
network's SSID in order to join the network.

 Channel: Lets you select one of 11 channels on which to broadcast. All


the access points and computers in the wireless network should use
the same channel. If you find that your network is frequently losing
connections, try switching to another channel. You may be experiencing
interference from a cordless phone or other wireless device operating on
the same channel.

 WEP — Mandatory or Disable: Lets you use a security protocol called


wired equivalent privacy.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 91 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
DHCP configuration
You can configure most multifunction access points to operate as a DHCP
server. For small networks, it's common for the access point to also be the
DHCP server for the entire network. In that case, you need to configure the
access point's DHCP server. To enable DHCP, you select the Enable option
and then specify the other configuration options to use for the DHCP server.

Larger networks that have more demanding DHCP requirements are likely to
have a separate DHCP server running on another computer. In that case, you
can defer to the existing server by disabling the DHCP server in the access
point.

HOW TO SET-UP WIRELESS REPEATER

If you have a large building or a sprawling piece of property and want Internet
access throughout, you will probably have to extend a wireless network. This
extension will allow you to maintain a strong wireless signal over a much
larger area. To start learning some basic guidelines to extend a wireless
network, scroll past the jump.

STEP 1 Set your main router as your base station. Make sure your router
is connected to your computer via Ethernet cable. This will allow you to login
directly to the router.

 Login to the router from a browser (in the URL bar: 192.168.0.1 or
192.168.1.1 are the standards). If you've enabled a password, enter
your login and password credentials now. If you haven't, then standard
settings for most routers are a login of admin and a password of
password, or admin and admin.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 92 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 2 Find your basic wireless settings, which should be located either
on the main login screen or under "Settings." From here you will want to
make sure that your router is broadcasting with the strongest signal
possible the most Mbps, or megabits per second, setting available.

 If you haven't changed the name of your wireless network or SSID, do


so now and make a note of it. This will help when setting up your
wireless repeater.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 93 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 3 Select "Repeating Functions" or "Signal Repeat Settings" or any
menu item that mentions repeating. From here you will be given an
option to enable wireless repeating function in your network.

 You will establish your primary router as your base station at this
point. Make sure that you select the base station functions for this
router and not repeater settings.

STEP 4 Enter, where prompted, the MAC or Media Access Control,


address of the router or repeater you will be using.

 The MAC address for your wireless repeater will be printed on a


sticker located on the back of the unit. The MAC address will be 16
characters. They will be either 8 groups of 2 characters separated by
hyphens or colons, or 4 groups of 4 separated by periods (i.e. 01-23-
45-67-89-ab or 01:23:45:67:89:ab or 0123.4567.89ab

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 94 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 5 Unplug the ethernet cable from the base station, and connect it
to your repeater or secondary router that will be acting as a wireless
repeater. Login to the router again using a web browser and the home URL
192.168.0.1 or 192.168.1.1.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 95 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 6 Go to basic settings and make sure that your wireless repeater will be
communicating with the correct wireless network by typing in the specific
SSID you used for your base station.

STEP 7 Enable signal repeating functions in the repeating settings menu.


For your wireless repeater you will assign a specific IP (Internet Protocol)
address.

 The first sets should be 192.168.0 (or 192.168.1), and you will enter
the final digit. You can enter any number between 1 and 255. Write
down this new IP address because you will need it to login to the
wireless repeater if you need to change settings in the future.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 96 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 8 Enter the MAC address of the base station. The MAC address for
the base station will be located on the back of the unit on a sticker and will
have a similar look to the MAC address for the wireless repeater.

STEP 9 Save these settings and disconnect the repeater from your
computer.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 97 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
STEP 10 Find a suitable location for your wireless repeater. It should be
within your known Wi-Fi signal area, but near the boundaries. This way you
will get maximum signal extension.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 98 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
TASK SHEET 2.3-2
Title: WIRELESS NETWORK DEVICE CONFIGURATION

Performance Objective: Given the proper in wireless network device


configuration, you should be able to configure
wireless router, wireless access point and wireless
repeater.

Supplies/Materials :

 Ethernet Cables
 Mother Board manual
 Network Drivers

Equipment : 2 Laptop Computer


2 Wireless Router (with router, access
point and repeater capability

Steps/Procedure:

1. Create a network diagram having a wireless router, wireless repeater and two
work stations as client.
2. Configure the first router as the main router assign the ip address range,
dhcp server, wireless network name and password.
3. Connect the second router to the main router using Ethernet cable. Plug it
to the LAN ports of the routers.
4. Configure the 2nd router as wireless access point.
5. Connect the two laptop clients to the wireless access point.
6. Check if the access point inherits the configuration of the main router.
7. Check each client’s network settings and perform a ping test.
8. Reset the 2nd router and reconfigure it as wireless repeater.
9. Connect the two laptop to the wireless repeater.
10. Check if the wireless repeater inherits the main router’s configuration.
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 99 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
11. Check each client network setting and perform and ping test.

Assessment Method:

Performance Criteria Checklist 2.3-2

Performance Criteria Checklist 2.3-2

CRITERIA YES NO
Did you….
1. Configure the main router based on the given
specifications?

2. Configure the 2nd router as wireless access point?

3. Configure the 2nd router as wireless repeater?

4. Configure the clients and established network


connectivity using the wireless router, access point and
repeater?

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 100 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 4 INSPECT AND TEST CONFIGURED
COMPUTER NETWORKS

CONTENTS:

1. Guidelines for testing computer system and network


2. Advance networking
3. Computer systems operation
4. Communications
5. Reports

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the configuration done on


the computer networks conforms with the manufacturer’s
instruction/manual
2. Computer networks are checked to ensure safe operation.
3. Reports are prepared/completed according to company requirements.

CONDITIONS:

The students/trainees must be provided with the following:

 Desktop Computer / Laptop Computer


 Server Computer
 Network switch
 Wireless router / Wireless access point
 Materials
- RJ45
- UTP Cable
 Tools:
- Screw drivers (assorted)
- Pliers (assorted)
- Soldering iron
- Wrenches
- Utility software
- Computer system
- Crimping tool
- LAN Tester

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 101 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
 Policies and procedures:
- Procedures and guidelines
- Safety precautions
METHODOLOGIES:

 Lecture
 Discussion
 Demonstration
 Viewing multimedia
ASSESSMENT METHODS:

 Written examination
 Practical examination

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 102 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
LEARNING OUTCOME # 4
INSPECT AND TEST CONFIGURED COMPUTER NETWORKS

Learning Activities Special Instructions

Read the Information Sheet 2.4- Read, understand the information


1(Testing & Troubleshooting sheet and evaluate yourself using
Network) Task Sheet 2.4-1.

Perform the instructions stated in the


Task Sheet 2.4-1, before proceeding to
the next activity.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 103 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
INFORMATION SHEET 2.4.1
TESTING & TROUBLESHOOTING NETWORK
Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST able to:

1. Check network configuration.


2. Check network connectivity.
3. Troubleshoot and repair network connection.
.

Introduction
Home networking equipment has reached a point of such ubiquity that
it will soon be counted among common household appliances such as your
TV, microwave and refrigerator. Unfortunately, it seems that the extent of
most people's troubleshooting knowledge ends with rebooting their router and
whining at the closest person they consider their personal tech support
representative. This guide aims to provide a series of tools which can help you
repair problems yourself, thus alleviating the pressure placed on those around
you with any tech knowledge at all.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 104 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
A Doctor’s Tools
Ping (Windows command)

The ping tool, one of the simplest network troubleshooting tools available, is
present in most common operating systems. It provides the ability to
monitor attempts to transfer and return a network packet from one point in
the network to another, thus proving that basic communication is possible.

Tracert (Windows command)


A command line tool which allows the user to trace the route taken by a
packet from the source host to the target host. The IP address and hostname
of each host are listed, along with the return time in milliseconds, allowing
the user to find the source of delays in their network infrastructure, good
sources for download mirrors and deciding which DNS server to use. A
similar tool is available for Linux and MacOS and is known as traceroute.

ipconfig (Windows command)


A Windows tool which displays IP configuration information via the
command line. A robust version of the network configuration options
available via the Control Panel, ipconfig also allows for forced DHCP lease
renewal via the /release and /renew switches. Some of the information
display features of ipconfig are available on MacOS and Linux distrubutions
using a tool called ifconfig.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 105 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
iperf
Iperf is an open source, cross-platform tool which measures network
throughput from one host to another, allowing the user to confirm that their
network is transferring at the expected rate.

Angry IP Scanner

Angry IP Scanner is an open source application used for traversing a subnet


and providing information on each of its active hosts. Helpful for finding
unwanted devices on your network, confirming that your DHCP is performing
as expected and finding the IP for a lost device. For more advanced purposes,
nmap is available for most major operating systems.

Windows 7 Network Troubleshooting

Surprisingly enough, the troubleshooting tool provided with Windows 7 does


an impressive job of automatically resolving common networking problems. It
achieves this by performing tasks such as refreshing its lease with the DHCP
server, resetting the network adaptor and confirming connection to its listed
default gateway.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 106 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Confirming Basic Connectivity
All network troubleshooting is predicated on the assumption that your basic
network connectivity is working as expected. The following are some simple
checks that you can perform to confirm the presence of staple network
connectivity.

Check Your Link Lights


On a cabled network, the simplest way to confirm a physical connection is to
check that the link lights on the devices at each end of each cable are lit. If a
light isn’t lit, check the plugs at each end to ensure that they’re securely
pressed into the network sockets. Link lights are usually found on the
network socket, or on the front of devices such as switches or LAN-capable
routers.

Confirm Your IP Address


By default, your router will act as a DHCP (Dynamic Host Configuration
Protocol) server. The advantage of using a DHCP server is that it will
automatically manage the distribution of IP addresses to every device
connected to your network. In Windows, check that your IP address is
correctly configured by bringing up a command prompt (Windows Key+R,

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 107 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
cmd, Enter) and typing ipconfig. Your router most likely defaults to
providing addresses in either the 192.168.xxx.xxx, or 10.0.x.x ranges. If the
IP address for your primary network adaptor is listed as something other
than these ranges use ipconfig /release, then ipconfig /renew to renew your
IP lease with the DHCP server.

Ping Internal and External Hosts

Using your Ping tool, attempt to confirm your connection to an internal host.
Your router is a good option because if you can ping it, there is nothing
between it and you that should be causing Internet connectivity issues. To
do so, bring up a command prompt and enter ping [the IP address of your
router]. By default, your router will most likely be found at 192.168.0.1, or
10.0.0.1. Having successfully pinged an internal host, attempt to ping a host
external to your network using the command "ping google.com".

Confirm Standard Network Services


Having proven that a physical and logical connection exists for your
network, it’s time to check the higher functioning services such as file
sharing and media streaming. Attempt to copy a file from your current
machine to another on the network. Use a small, but reasonably sized file
for this to ensure that transfer rates are performing as expected. Next,
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 108 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
attempt to stream media in much the same way. This time, use a large file
like HD video to confirm that the network is able to maintain the transfer at
a steady rate. Using iperf to confirm your network transfer rates is also
suggested.

Loss of Internet Connectivity


The most common and arguably the most frustrating problem that faces
users of any network is loss of access to the Internet. Right in the middle of
an important IM conversation, gaming session or video stream, access can
evaporate without warning or reason. There are a plethora of potential
causes for this sort of outage, so the best approach is a systematic one.
Check your local machine’s network connectivity. Is the operating system
reporting that your machine is still connected to your local network? Check
your physical cable or wireless connection to confirm whether or not local
network access has been affected.

If you are still connected to your local network, the next step is to confirm
connectivity to your router. Do this by attempting to navigate to its
administration panel using a web browser. Simply type the IP address of the
router into your address bar. Note that some brands of routers require the
user to specify the network port for access to the admin panel. Do this by
appending the necessary port number to the IP address in your address bar
using a colon. Most routers that require a defined port will default to :8080.

Now that you’ve logged into your router’s admin panel, it is possible to
determine whether external hosts are accessible from that point. Most good
routers will have a ping tool built into the admin panel, often included in a
diagnostics tab. If your router can successfully ping external hosts, while
you cannot from your local machine the you can confirm that the problem
exists within your network and can subsequently be fixed. As opposed to
problems which exist outside of your network, and thus are out of your
control.

Now that you’ve logged into your router’s admin panel, it is possible to
determine whether external hosts are accessible from that point. Most good
routers will have a ping tool built into the admin panel, often included in a
diagnostics tab. If your router can successfully ping external hosts, while
you cannot from your local machine the you can confirm that the problem
exists within your network and can subsequently be fixed. As opposed to
problems which exist outside of your network, and thus are out of your
control.

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 109 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Date Developed: Document No. SPUS-ICT-001
January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 110 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
TASK SHEET 2.4-1
Title: Trouble shooting network connectivity

Performance Objective: Given the basic concepts about troubleshooting


network connection, you should be able to
troubleshoot and test network connectivity.

Supplies/Materials : Ethernet Cables


Network Drivers
Network test tools and software
Equipment : 1 Desktop Computer
1 laptop computer
1 network switch
1 wireless router
Steps/Procedure:

1. Using the laptop and desktop computer create a local area


connection having the desktop connected to the switch and the
laptop to the wireless router.
2. Assign static ip address for the both clients.
3. Test the connectivity of each using the tools mentioned above (eg.
Ping, ip scanner and etc.)
4. Assign dynamic ip using the DHCP server of the wireless router.
5. Test the connectivity of each using the tools mentioned above (eg.
Ping, ip scanner and etc.)
6. After the completion of the following task make sure to return the
materials in the designated area, reset the router and terminate all
network and electrical connecitons.

Assessment Method:

Performance Criteria Checklist 2.4-1

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 111 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Performance Criteria Checklist 2.4-1

CRITERIA
YES NO
Did you….
1. Followed proper procedure in configuring a LAN
connection?
2. Tested the network connectivity using the network
tools and software?
3. Established network connectivity using static and
dynamic IP Address?

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 112 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01
Bibliography

Websites

http://www.networkworld.com/article/2280110/lan-wan/chapter-1--
building-a-simple-network.html?page=2

http://www.tested.com/tech/2412-how-to-diagnose-and-repair-basic-
network-connection-problems/

http://www.wikihow.com/Create-a-Local-Area-Network-%28LAN%29

http://www.tutorialspoint.com/ipv4/ipv4_example.htm

http://www.wikihow.com/Extend-a-Wireless-Network

http://www.dummies.com/how-to/content/configuring-a-wireless-access-
point.html

https://en.wikipedia.org/wiki/IPv6_address

https://www.anixter.com/en_au/about-us/news-and-events/news/how-to-
terminate-fiber-optic-cable-step-by-step.html

Other Materials

Competency Based Learning Materials: “Computer Systems Servicing”

St. Paul University Surigao

Date Developed: Document No. SPUS-ICT-001


January 2015 Issued by:
Setting up Computer
Date Revised:
Netrworks March 2015 Page 113 of 112
Computer Systems Developed by: SPUS
Servicing NC II Engr. John
Pearl Manungas Revision # 01

You might also like