0% found this document useful (0 votes)
46 views

g10 4th Quarter Module

This document provides a learning module on setting up computer networks. It includes an introduction to the module, lists of competencies and modules, and information sheets on safety procedures and setting up network configurations. The document aims to teach learners how to set up computer networks based on established procedures and system requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

g10 4th Quarter Module

This document provides a learning module on setting up computer networks. It includes an introduction to the module, lists of competencies and modules, and information sheets on safety procedures and setting up network configurations. The document aims to teach learners how to set up computer networks based on established procedures and system requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Page |1

LEARNING MODULE
T.L.E. 10 – COMPUTER SYSTEM SERVICING NC2
The Notre Dame of Katiko, Inc.

Grade 10, Quarter 4

Name ____________________________________________________
Section ____________________________________________________
Subject TeacherARTHUR C. ARCIAGA__________________________________
Class Adviser ____________________________________________________

QUARTER 4
SETTING-UP COMPUTER NETWORKS (SUCN)
LO1 - Install network cables
(TLE_IACSS9-12SUCN-IVa-j-33)

Lesson and Coverage


Lesson No. Topic Title Expected Outcome Estimated Time
LESSON 9. SETTING-UP The learners shall be TLE_IACSS9-12SUCN-
COMPUTER able to set up computer IVa-j-33
NETWORKS networks based (7 weeks)
established procedures
and system
requirements for
hardware

HOW TO USE THIS MODULE


Welcome to the Module “Setting-up Computer Networks Systems””. This module contains
training materials and activities for you to complete.

The unit of competency “Set-up Computer Networks Systems” contains knowledge, skills
and attitudes required for a Computer System Servicing NC II course.
You are required to go through a series of learning activities in order to complete each of the
learning outcomes of the module. In each learning outcome there are Information Sheets, Job
Sheets, Operation Sheets, and Activity Sheets. Follow these activities on your own and answer
the Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your teacher for assistance.

Recognition of Prior Learning (RPL)


You may already have some of the knowledge and skills covered in this module because you have:
o been working for some time o already have completed training in this area.

If you can demonstrate to your teacher that you are competent in a particular skill or skills,
talk to him/her about having them formally recognized so you don’t have to do the same training
again. If you have a qualification or Certificate of Competency from previous trainings show it to
your teacher. If the skills you acquired are still current and relevant to this module, they may
become part of the evidence you can present for RPL. If you are not sure about the currency of your
skills, discuss it with your teacher.
2|Page

After completing this module ask your teacher to assess your competency. Result of your
assessment will be recorded in your competency profile. All the learning activities are designed for
you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more than one
learning activity.

COMPUTER SYSTEMS SERVICING


COMPETENCY-BASED LEARNING MATERIALS

List of Competencies
No. Unit of Competency Module Title Code

1. Install and Installing and ELC724331


Configure Computer Configuring Computer
Systems Systems
2. Set-up Computer Setting-up Computer ELC724332
Networks Networks
3. Set-up Computer Setting-up Computer ELC724333
Servers Servers
4. Maintain and Repair Maintaining and ELC724334
Computer Systems and Repairing Computer
Networks Systems and Networks
MODULE CONTENT

UNIT OF COMPETENCY: Install and Configure Computer Systems


MODULE TITLE: Installing and Configuring Computer Systems

MODULE DESCRIPTOR:
This unit covers the outcomes required in setting-up computers networks for LANs and small-office
home-office (SOHO) systems. It consists of competencies to install network cables, set network
configuration, set router/Wi-Fi/ wireless access point/repeater configuration as well as to inspect
and test the configured computer networks.

NOMINAL DURATION: 31 hrs

LEARNING OUTCOME NO. 2

SET NETWORK CONFIGURATION

Contents:
1. OH&S policies and procedures
2. Tools, equipment and testing devices
3. Computer hardware
4. Operating system
5. Established installation procedures
6. Peripherals/devices
7. Application software
8. Stress test

Assessment Criteria
2.1 Network connectivity of each terminal is checked in accordance with network design.
2.2 Any fault or problem in the network system is diagnosed and remedied in line with the standard
operating procedures.
2.3 Network interface card (NIC) settings are configured in accordance with network design.
2.4 Communication checking between terminals are carried out in accordance with OS network
configuration guides
2.5 Unplanned events or conditions are responded to in accordance with established procedures

CONDITIONS
The students/trainees must be provided with the following:
Page |3

• PC or workstations
• Instructional Manuals such as: Occupational Health and Safety policies and
procedure manual, device manual and hardware diagrams and charts.
• Tools, equipment’s and test instruments such as: protective eyewear, digital
multi-meter, crimping tools, pliers, screw drivers.
• Supplies and materials such as: appropriate operating system ,driver software,
software applications and programs.

Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
4. Oral Questioning

SET NETWORK CONFIGURATION

Content Standard Performance Standard


The learners demonstrate an understanding of The learners shall be able to set up computer
concepts and principles in setting up computer networks based established procedures and system
networks requirements for hardware

INTRODUCTION

Welcome to the next level of your modular training in Computer System Servicing (CSS)
under the Information and Communications Technology (ICT) Course. In this module, you will have
a great deal of understanding of NETWORK SETTING CONFIGURATION.
At the end of this module you will be able to apply the knowledge and skills on planning and
preparing for configuration, configure computer systems and networks and inspecting configured
computer systems and networks. Those skills are essential for you to pass the National Certification
II in Computer System Servicing.

In this module, topics will be introduced progressively for easy understanding. After carefully
answering the pre assessment exercises, reading all the lessons, answering all the guide questions,
skillfully performing all the activities, showing evidences of learning and finally answering the
summative test you will gain a considerable knowledge and skills in configuring computer systems
and networks essential to be successful in computer system servicing as one of the career option in
ICT.

Reminder! Just follow the instructions given in this module. Now let us start exploring new
things in this module.
INFORMATION SHEET NO. 2.2-1

Safety Procedures

It is essential to maintain safe working conditions to prevent accidents and injury to any
person or damage to any object in a work area. New staff and visitors must be informed of the
appropriate safety procedures. Any transgression of the procedures must be reported.
As an aspiring computer technician, you should be aware of all possible dangers in the
workplace. It is a must to follow proper procedures for handling computer equipment. Failure to
follow the prescribed safety procedures could result in fines, criminal convictions, and damage to
equipment, claims for damage from the owner of the property and data, injury, or death.
A safe work space is clean, organized, and well-lit. The disposal or recycling of hazardous
computer components must be done properly. Make sure to follow regulations that govern how to
dispose specific items. When an organization violates these regulations, there can be legal
consequences.
To keep you safe, this module provides the general and fire safety guidelines that protects the
technician and the equipment.

General Safety Guidelines


4|Page

Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to
eyesight. As a best practice, make sure that a fire extinguisher and first aid kit are available in case
of fire or injury. Here are some general safety guidelines:
• Remove your watch or any other jewelry and secure loose clothing.
• Turn off the power and unplug equipment before opening the case and performing
service.
• Cover any sharp edges inside the computer case with tape.
• Never open a power supply or a monitor.
• Do not touch areas in printers that are hot or those which use high voltage.
• Know where the fire extinguisher is located and learn how to use it.
• Know where the first aid kit is located.
• Keep food and drinks out of your workspace.
• Keep your workspace clean and free of clutter.
• Lift heavy objects with sturdy leg support to avoid back injury.

Fire Safety Guidelines


Follow fire safety guidelines to protect equipment and lives. Turn off and unplug the
computer before beginning a repair to avoid damage to the computer or electric shock to the
technician. Fire can spread rapidly and be very costly. Proper use of a fire extinguisher can prevent
a small fire from getting out of control. When working with computer components, always consider
the possibility of an accidental fire and prepare how to react. If there is a fire, you should follow
these safety procedures:
• Always have a planned fire escape route before beginning any work.
• Never fight a fire that is out of control or not contained.
• Get out of the building quickly in case of an out-of-control fire.
Contact emergency services immediately for help.

ACTIVITY NO. 2.2-1


PROCESS

General Directions: Identify whether each statement is true or false. Gather picture evidences that
make it true or false. On the third column, show the effects of not following the safety precautions
through a picture presentation.

Example:
Turn off the power and unplug equipment before opening the case and performing service

Answer Picture Presentation


True Evidence Effect

TRUE OR EVIDENCE Effect


FALSE
1. A safe workplace is clean,
organized and well-lit.

2. Before opening the case


and performing services,
one must unplug the
power from the source.

3. It is a best practice that a


fire extinguisher and
first aid kit be available
in the workplace.

4. You are allowed to open


Page |5

the power supply or a


monitor.
5. You can eat inside the
laboratory.

INFORMATION SHEET NO. 2.2-2

Prepare Materials and Tools Used for Configuration

A key to a well-tuned, trouble-free system is proper configuration. In order to accomplish


this, you must start by understanding its configuration. It can be difficult to figure out all the
devices in your system and the resources they are using.
To assist in this, several software tools have been created. These are typically called
diagnostic utilities or programs. Some of them are built-in to your operating system and others are
available either for free download or commercial purchase.
Some of the built-in tools used in Microsoft system configuration involves Microsoft System
Configuration, Register Edit, Direct X and Control Panel Applets.
1. Microsoft System Configuration: This boot configuration utility allows you to set the programs
that will run at startup and to edit configuration files. It also offers simplified control over Windows
Services.
System Configuration Utility consists of five functional tabs such as General, Boot, Services,
StartUp and Tools. The succeeding table describes the use and functionality of each tab:

Table 1. General Tab of System Config Utility


Tab Function and Description
The general tab is the default tab in the System
configuration and shows how the computer will start, by
default Normal startup should be selected.

List of choices for startup configuration:


• Normal Startup. Starts Windows in the usual
manner. Use this mode to start Windows after you are
General done using the other two modes to troubleshoot the
problem.
• Diagnostic Startup. Starts Windows with basic
services and drivers only. This mode can help rule out
basic Windows files as the problem.
• Selective Settings. Starts Windows with basic
services and drivers and the other services and
startup programs that you select.

Figure 4. General Tab

Table 2. Boot Tab of System Config Utility


Tab Function and Description
6|Page

This tab allows you to make the same adjustments you can
make in the Windows boot.ini file without having to edit the
file. It shows configuration options for the operating system
and advanced debugging settings, including the following:
• Safe boot (Minimal): Boots the Windows
graphics user interface in safe mode running only
critical system services. Networking is disabled.
• Safe Boot (Alternate Shell): Boots the Windows
Command Prompt in safe mode running only critical
system services. Networking and the graphical user
interface are disabled.
Boot • Safe Boot (Active Directory Repair): Boots the
Windows graphical user interface in safe mode
running critical system services and Active Directory.
• Safe boot (Network): Boots the Windows
graphical user interface in safe mode running only
critical system services. Networking is enabled.
• No GUI boot. Does not display Windows splash
screen when booting.

Figure 5. Boot Tab

Table 3. Services Tab of System Config Utility


Tab Function and Description
The Services tab allows you to enable or disable any of the
Microsoft Windows services or other program services
running on the computer. It lists all the services that start
Services when the computer boots, along with their status (Running
or Stopped). By checking the "Hide all Microsoft services"
box at the bottom of the window, you can see all non-
Windows

services such as driver services and program se rvices that


are often the cause of startup problems. Unchecking a box
will disable the service from starting.

Warning:
Disabling services that normally run at boot time
might cause some programs to malfunction or result in
system instability. Do not disable services in this list unless
you know they are not essential to your computer’s
operation. Selecting Disable all will not disable some secure
Microsoft services required for the operating system to start.
Page |7

Table 4. Start Up Tab of System Config Utility


Tab Function and Description
The Startup tab is one of the most frequent reasons
most Windows users enter the System Configuration utility.
In the Startup tab, you will be able to see the list of
applications that run when the computer boots, along with
the name of their publisher, the path to the executable file,
Startup and the location of the registry key or shortcut that causes
the application to run. These startup programs are often one
of the biggest causes for a computer to startup and run slow.
You can clear the check box for a startup item to disable it on
your next boot. If you have chosen Selective startup on the
General Tab, you must either choose Normal startup on the
General tab or select the startup item’s check box to start it again at boot
time. If you suspect an application has been compromised, examine the
Command column to review the path to the executable file.

Windows 8 Microsoft has removed this Startup feature in the


System Configuration utility and moved it into the Windows 8 Task
Manager. Uncheck any program that you want to disable from starting up
each time.

Note:
Disabling applications that normally run at boot time might result in
related applications starting more slowly or not running as expected.

Figure 7. Startup Tab

Table 5. Tools Tab of System Config Utility


Tab Function and Description
This Provides a convenient list of diagnostic tools and other
Tools advanced tools that you can run.

Figure 8. Tools Tab

2. Register edit: This application allows you to edit the registry.


8|Page

The Windows Registry, usually referred to as "the registry," is a collection of databases of


configuration settings in Microsoft Windows operating systems.
In Windows 2000 and Windows XP, the Registry is stored in several Hives, located in the
following path: \windows\system32\config and
\Documents and Settings\ {username} folders.

Structure of the Registry

1. The Registry has a hierarchical structure, like the directories on your hard disk. Each branch
(denoted by a folder icon in the Registry Editor, see below) is called a key. Each key can contain
other keys, as well as Values. Each value contains the actual information stored in the Registry.
There are three types of values: String, Binary, and DWORD - the use of these depends upon the
context.
2. There are six main branches (five in Windows 2000 and Windows XP), each containing a
specific portion of the information stored in the Registry. They are as follows:
o HKEY_CLASSES_ROOT - this branch contains all of your file types as well as OLE
information for all your OLE-aware applications.
o HKEY_CURRENT_USER - this branch points to the part of HKEY_USERS appropriate
for the current user.
o HKEY_LOCAL_MACHINE - this branch contains information about all of the hardware
and software installed in your computer. Since you can specify multiple hardware
configurations, the current hardware configuration is specified in
HKEY_CURRENT_CONFIG.
o HKEY_USERS - this branch contains certain preferences (such as colors and control
panel settings) for each of the users of the computer. In Windows 95/98/Me, the default
branch here contains the currently-logged in user. In Windows 2000/XP, the default
branch here contains a template to be used for newlyadded users.
o HKEY_CURRENT_CONFIG - this branch points to the part of HKEY_LOCAL_MACHINE
appropriate for the current hardware configuration.
HKEY_DYN_DATA (Windows 95/98/Me only) - this branch points to the part of
HKEY_LOCAL_MACHINE, for use with Windows' Plug-&-Play subsystem.
3. Direct X Diagnostic: The Microsoft DirectX Diagnostic Tool provides you with information
about the DirectX API components and drivers on your system. It enables you to test sound and
graphics output and Microsoft DirectPlay service providers. You can use the diagnostic tool to
gather information about your system to use for diagnostic purposes.
If you are experiencing problems when running
Microsoft DirectX applications, the DirectX Diagnostic Tool can help you find the source of the
trouble such as incorrect versions of DirectX components, lack of hardware acceleration, devices
that are not connected and unsigned drivers.

Figure 9 . DX Diagnostic Tool


4. Control Panel applets
The names of various applets in the Control Panel differ slightly depending on the version of
Windows installed. In Windows XP, the icons are grouped into categories:
• Appearance and Themes: Applets that control the look of windows:  Display
 Taskbar and Start menu
Page |9

 Folder options
• Network and Internet Connections: Applets that configure all the connection types:
 Internet options
 Network connections
• Add or Remove Programs: An applet to add or remove programs and windows
components safely
• Sounds, Speech, and Audio Devices: Applets that control all the settings for sound:
 Sounds and audio devices
 Speech
 Portable media devices
• Performance and Maintenance: Applets to find information about your computer or
perform maintenance:
 Administrative tools
 Power options
 Scheduled tasks
 System
 Printers and Other Hardware: Applets to configure devices connected to your computer:
 Game controllers
 Keyboard
 Mouse
 Phone and modem options
 Printers and faxes
 Scanners and cameras
 User Accounts: Applets to configure options for users and their email:
 E-mail
 User accounts
 Date, Time, Language, and Regional Options: Applets to change settings based on your
location and language:
 Date and time
 Regional and language options
• Accessibility Options: A wizard used to configure windows for vision, hearing, and
mobility needs
• Security Center: Applet used to configure security settings for:
 Internet options
 Automatic updates
 Windows firewall

0ACTIVITY NO. 2.2-2


PROCESS
I. MS Configuration Command Classification
Directions: There are five functional tabs in MS Configuration utility, namely General, Boot,
Services, Startup and Tools. Classify the following items according to the tabs they belong to. Write
your answer on the space provided.
1. Event Viewer -______________________
2. Safe Boot -______________________
3. List of services that start when computer boots -______________________
4. Make all boot settings permanent -______________________
5. Normal startup -______________________
6. No GUI Boot -______________________
7. OS Boot information -______________________
8. Hide All Microsoft Services -______________________
9. Convenient List of Diagnostic Tools -______________________
10.Base Video

II. Applet Grouping


Directions: Complete the diagram of various Control Panel Applets with the components included
in their category. Write your answer on the space provided.
10 | P a g e

REFLECT
Research and Explore
Directions: Conduct a research that identifies other available tools used for computer system and
network configuration. Use some other resources like the World Wide Web and interview a
practitioner (preferably an IT specialist or a computer technician) to find out the different tools they
use for configuration. Write your research on the space provided .Your research will be rated
according to the following criteria

Rubrics for Term or Research Paper


Very Good (80-89) Excellent (90-100)
Qualities & Criteria Poor (70-74) Good (75-79)

Format/Layout Followed poorly the Some format and Most format and All the requirements
(15%) requirements related layout related layout related related to format
• Presentation of the to format and layout. requirements requirements were and layout were
text were met. met. strictly followed.
• Structuring of text
• Requirements of
length, font and style
followed
Content/Information The research was not The research was The research was The research was
(50%) objective and poorly objective and for objective and for objective and
• All elements of the addresses the issues some part the most part addresses with an
topics are addressed referred in the addresses an in- addresses an in- indepth analysis all
• The information is proposed topic. depth analysis depth analysis of the issues referred
technically sound The provided The provided most issues in the proposed
Information based on information was not information referred in the topic.
careful research  necessary or not was, for some proposed topic. The provided
Coherence of information sufficient to discuss part, The provided information was
these issues. necessary and information was, for necessary and
sufficient to the most part, sufficient to discuss
discuss these necessary and these issues.
issues. sufficient to discuss
these issues.
P a g e | 11

Quality of Writing (25%) The essay was not The essay was The essay was well The essay was well
• Clarity and well written, and well written for the most written from
cohesiveness of contains many written for some part, without start to finish,
sentences and spelling errors, and/or part, without spelling, grammar without spelling,
paragraphs  No grammar spelling, grammar or use of English grammar or use of
errors in spelling, errors and/or use of or use of English errors. English errors.
grammar and use of English errors. errors. The essay is for the The essay was well
English It lacks clarity and/or The essay is for most part well organized, clear and
• Organization and does not present some part well organized, clear presents ideas in a
coherence of ideas ideas in a coherent organized, clear and presents ideas coherent way.
way. and presents in a coherent way.
ideas in a
coherent way.
References (10%)  References were not Some of the Most of the All of the references
Soundness of appropriately used references were references were were appropriately
references and cited. appropriately appropriately used used and cited.
used and cited. and cited.

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
12 | P a g e

__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________
__________________________________________________________________________________________________

TRANSFER
Oral Presentation
Directions: After the thorough research and exploration, you have to present your work
individually in an oral presentation. Use video recording and send it to my messenger account. Your
performance will be rated based on the rubrics provided in this section.

Rubrics for Oral Presentation

(75-
CRITERIA (70- (85-89) (90-100)
79) (80-84)
74)
1. Gave an interesting introduction
2. Presented clear explanation of topic
3. Presented information in a logical manner
4. Used complete sentence
5. Offered a concluding statement
6. Spoke clearly, correctly, distinctly, and
confidently
7. Maintained eye contact
8. Maintained good and proper posture
9. Utilized audio-visual materials
10. Answered questions sufficiently and received
comments openly
Total
Grand Total
P a g e | 13

INFORMATION SHEET NO. 2.2-3

Procedures in Using Computer System Configuration Tools

As a future computer technician you must be diligent and eager to know the different
procedures in using the tools for computer system configuration. This will help and guide you to
carry out a particular job in a proper manner. Once you already identify them, you must also
acquire the necessary and appropriate skills to apply them in actual situations.

This part of the module present some of the required procedures in computer system
configuration. Take note that you need to exert extra effort in finding out some procedures which
are not in this module. This is your chance to explore and learn through your own experience.

The subsequent sections below present the various procedures in using Computer System
Configuration Tools:

1. Accessing and using Microsoft System Configuration


• Click on Start Button
• In the Search Box, type Run
• In the Run window, type msconfig, and press Enter.

Figure 10. General Tab of Microsoft system configuration

2. Accessing and using Regedit:


• Click on Start Button
• In the search box, or Run window, type the following:
regedit and then press Enter.

Figure11. Registry Editor Window


Using the Registry Editor
The Registry Editor (regedit.exe) is included in Windows to enable you to view and edit the contents
of the Registry. When you open the Registry Editor, you will see a window divided into two panes.
The left side shows a tree with folders (see Structure of the Registry above), and the right side shows
the contents (values) of the currently selected folder (key).
 To expand a certain branch, click on the little plus sign [+] on the left of any folder, or
just double-click on the folder.
14 | P a g e

 To display the contents of a key (folder), just click the desired key, and look at the
values listed on the right side.
 You can add a new key or value by selecting New from the Edit menu.
 You can rename any value and almost any key with the same method used to rename
files; right-click on an object and click rename, or click on it twice (slowly), or just press F2
on the keyboard.
 Lastly, you can delete a key or value by clicking on it, and pressing Delete on the
keyboard, or by right-clicking on it, and choosing Delete.
Caution: Using regedt32.exe or regedit.exe incorrectly might cause configuration problems that
may require you to reinstall the operating system.

3. Accessing and Using Direct X Diagnostic


You can test Microsoft DirectDraw and Direct3D on each monitor attached to your system. You
can also test DirectSound on each wave output device, and DirectMusic on each music port.

To run the DirectX Diagnostic Tool (DX Diagnostic Tools Window of Windows XP differs from
Windows 7 but it does the same function):
• Click on Start Button, type Run on the search box.
• On the Run window, Type in dxdiag and click Ok or press Enter, as shown in Figure
9, Run Dialog Box.

Figure12. Run Dialog Box

• Next you will see a new window with various tabs.

Figure 13. System Tab of DX Diagnostic Tool


 The System tab shows information about your computer and displays the version of DirectX
installed on your computer.
 The DirectX Files tab shows the file name and the version number for each DirectX file
installed on your computer. It also shows the file names and the version numbers of other files
that are used by games that are running under DirectX.
 The Display tab lists your current display settings, and allows you to disable DirectDraw,
Direct3D, and AGP Texture Acceleration. You can also test DirectDraw and Direct3D from the
Display tab which will indicate that the DirectX Graphics runtime files are installed and
operating correctly. It will also display your device's available memory and can tell you if your
video driver has passed Microsoft's Windows Hardware Quality Labs testing standard. The
DirectX Diagnostic Tool, however, cannot report memory that is in use at the time that it starts
and you may see less memory reported than your video card actually has.
P a g e | 15

Figure14. Display Tab of DX Diagnostic Tool


 The Sound tab displays your current audio settings and allows you to test DirectSound. It
will tell you if the audio driver are signed, meaning that it has passed Microsoft's Windows
Hardware Quality Labs testing standard. The Hardware Sound Acceleration Level slider is used
to correct audio glitches that might be caused by some audio drivers. You can adjust the slider
settings and see if it provides better results in your application. Be sure not to lower it too much
or you may disable some audio features of your system. If the tool detects a problem with your
sound settings, a warning message is displayed in the Notes box.

 The Music tab displays your current MIDI settings, and allows you to test the DirectMusic
component of DirectX. Click on the Test DirectMusic button to perform the test. If the DirectX
Diagnostic Tool detects a problem with DirectMusic, a warning message is displayed in the
Notes box.

Figure15. Sound Tab of DX Diagnostic Tool


 The Input tab lists the input devices connected to your computer such as USB and PS2
devices. It also displays the input drivers installed on your computer. If the DirectX Diagnostic
Tool detects a problem with an input device or an input device driver, a warning message is
displayed in the Notes box.

Figure16. Input Tab of DX Diagnostic Tool


 The Network tab lists the registered DirectPlay Service Providers. These are the connection
methods that DirectPlay will operate across. A registry problem here can normally be resolved by
reinstalling DirectX. A registry error here can normally be resolved by removing and reinstalling
that application. If the DirectX Diagnostic Tool detects a problem with a DirectPlay Service
Provider or Application, a warning message is displayed in the Notes box.
 The More Help tab allows you to further troubleshoot problems that the other tabs could not
resolve. Features include the DirectX troubleshooter, sound troubleshooter, system
information tool and the override tool which will override DirectDraw’s refresh rate.
16 | P a g e

Set Network Configuration

After dealing with the preparation for configuration, you can now proceed with the next
section of this module which is Set Network Configuration.
This lesson is designed to give you the proper procedures used in configuring network
system. At the end of this lesson you should be able to:

 Inspect network devices and connectors;


 Create cross-over and straight through Ethernet cable;
 Assign and configure IP address to clients and server;
 Create a peer-to-peer network;
 Enable network security; and
 Configure file and printer sharing.

Configure Computer System and Network


System Configuration is the way a system is set up, it is the collection of components that
make up the system. Configuration can refer to either hardware or software, or the combination of
both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a
floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows Operating
System.
Many software products require that the computer has a certain minimum configuration. For
example, the software might require a graphics display monitor and a video adapter, a particular
microprocessor, and a minimum amount of main memory capacity.
When you install a new device or program, you sometimes need to configure it, which means that
you need to set various switches and jumpers (for hardware) and to define values of parameters (for
software). For example, the device or program may need to know what type of video adapter you
have and what type of printer is connected to the computer. Thanks to technological advancements,
such as plug-and-play, much of this configuration is now performed automatically.

Safety Precautions Related to Networks


Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables must be
pulled through ceilings and walls where there are obstacles or toxic materials. You should wear
clothing such as long pants, a long-sleeved shirt, sturdy shoes that cover your feet, and gloves to
protect you from those toxic materials. Most importantly, wear safety glasses. If possible, ask
building management, or someone responsible for the building, if there are any dangerous materials
or obstacles that you need to be aware of before entering the ceiling area.

Safety precautions when using a ladder:


• Read the labels on the ladder, and follow any safety instructions written on it.
• Never stand on the top rung of the ladder. You could easily lose your balance and fall.
• Make sure that people in the area know you will be working there.
• Cordon off the area with caution tape or safety cones.
• When you are using a ladder that leans up against a wall, follow the instructions
written on the ladder, and have someone hold the ladder to help keep it steady.

Safety rules when working with cables:


The tools required to install copper and fiber-optic cable may cause danger through improper use.
When working with cables, strictly follow these safety rules:
• Make sure that the tools you are using are in good working condition.
• Watch what you are doing, and take your time. Make sure that you do not cut yourself
or place anyone in danger.
• Always wear safety glasses when cutting, stripping, or splicing cables of any kind. Tiny
fragments can injure your eyes.
• Wear gloves whenever possible, and dispose any waste properly.
Use common sense when installing cables and fixing network problems. Call for assistance for tasks
that you cannot do on your own.

Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain hazards:
• Dangerous chemicals
• Tools with sharp edges
• Light which you cannot see that can burn your eyes
• Glass shards produced by cutting fiber-optic cable that can cause bodily harm
P a g e | 17

Specific types of tools and chemicals are used when working with fiber-optic cable. These materials
must be handled with care.

Chemicals
The solvents and glues used with fiber optics are dangerous. You should handle them with extreme
care. Read the instructions on the label, and follow them carefully. Also, read the material safety
data sheet (MSDS) that accompanies the chemicals to know how to treat someone in case of
emergency.

Tools
When working with any tool, safety should always be your first priority. Any compromise in safety
could result in serious injury or even death. The tools used for working with fiber optics have sharp
cutting surfaces that are used to scribe glass. Other tools pinch cables with high pressure to fasten
connectors to them. These tools can produce shards of glass that can splinter and fly into the air.
You must avoid getting them on your skin and in your mouth or eyes.

Glass Shards
The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of
glass or plastic that can penetrate your eyes or skin and cause severe irritation. The fibers can be
extremely difficult to see on your skin because they are clear and small. When you work with fiber-
optic cabling, the working surface should be a dark mat so that you can see the tiny glass or plastic
fragments. The mat should also be resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiberoptic fragments with your
fingers. Use tape to pick up small fragments, and dispose them off properly. Use a disposable
container, such as a plastic bottle with a screw-on lid, to store fiber fragments. Close the lid tightly
before disposing the container.
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic strands. The light is a color
that humans cannot see. It can damage your eyes before you can feel it. When you use a magnifier
to inspect fiber-optic cable and connectors, the light emitted from the fiber could be directed into
your eyes. When working with fiber, be sure to disconnect the light source. Use special detectors to
help you tell if a fiber is energized.
18 | P a g e

INFORMATION SHEET NO. 2.3-1

Networking Devices, Media and Connector


To make data transmission more extensible and efficient than a simple peer-to-peer network,
network designers use specialized network devices such as hubs, switches, routers, and wireless
access points to send data between devices. You have already discussed in your Grade 9 CHS class
the different devices used in networking and which provides you the knowledge on the common
networking cables that are essential in putting up a network.

Common Network Cables


Until recently, cables were the only medium used to connect devices on networks. A wide
variety of networking cables are available. Coaxial and twisted-pair cables use copper to transmit
data. Fiber-optic cables use glass or plastic to transmit data. These cables differ in bandwidth, size,
and cost.
You need to know what type of cable to use based on the job requirements. You also need to
be able to troubleshoot and repair problems along the way.

Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone communications and
most Ethernet networks. A pair of wires forms a circuit that transmits data. The pair is twisted to
provide protection against crosstalk, the noise generated by adjacent pairs of wires in the cable.
Pairs of copper wires are encased in color-coded plastic insulation and are twisted together. An
outer jacket protects the bundles of twisted pairs.

Source: www.lanshack.chack.c
om
Figure 39. UTP and STP Cable
When electricity flows through a copper wire, a magnetic field is created around the wire. A
circuit has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When
the two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is
called the cancellation effect. Without the cancellation effect, your network communications become
slow because of the interference caused by the magnetic fields.

The two basic types of twisted-pair cables are as follows:


• Unshielded twisted pair (UTP) is the cable that has two or four pairs of wires.
This type of cable relies solely on the cancellation effect produced by the twisted-wire
pairs that limits signal degradation caused by electromagnetic interface (EMI) and
radio frequency interference (RFI). UTP is the most commonly used cabling in
networks. UTP cables have a range of 328 feet (100 m).
• With shielded twisted pair (STP), each pair of wire is wrapped in metallic foil
to better shield the wires from noise. Four pairs of wires are then wrapped in an
overall metallic braid or foil. STP reduces electrical noise from within the cable. It also
reduces EMI and RFI from outside the cable. Although STP prevents interference
better than UTP, STP is more expensive because of the extra shielding. It is also more
difficult to install because of the thickness. In addition, the metallic shielding must be
grounded at both ends. If it is improperly grounded, the shield acts like an antenna,
picking up unwanted signals.

Category Rating
UTP comes in several categories that are based on two factors:
• The number of wires in the cable
• The number of twists in those wires
P a g e | 19

1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10 Mega byte
per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate of 100
Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.

These extra twists further prevent interference from outside sources and from the
other wires within the cable.
Some Category 6 cables use a plastic divider to separate the pairs of wires, which
prevents interference. The pairs also have more twists than Category 5e cable.

Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is
used to connect the computers to the rest of the network.

Figure 40. Coaxial Cable


Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet NeillConcelman” connectors, at the
ends of the cables to make the connection. Several types of coaxial cable exist:
• Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps, with a
maximum length of 500 meters.
• Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps, with a
maximum length of 185 meters.
• RG-59 is most commonly used for cable television in the U.S.
• RG-6 is higher-quality cable than RG-59, with more bandwidth and less susceptibility
to interference.

Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits information using light. Fiber optic
cable has one or more optical fibers enclosed in a sheath or jacket. Because it is made of glass,
fiber-optic cable is not affected by EMI or RFI. All signals are converted to light pulses to enter the
cable and are converted back into electrical signals when they leave it. This means that fiber-optic
cable can deliver signals that are clearer, and can go farther, without compromising the clarity of
signals.

Figure 41. Fiber Optic Cable


Fiber-optic cable can reach distances of several miles or kilometers before the signal needs to
be regenerated. Fiber-optic cable usually is more expensive to use than copper cable, and the
connectors are more costly and harder to assemble. Common connectors for fiber-optic networks
are SC, ST, and LC. These three types of fiber-optic connectors are half-duplex, which allows data
to flow in only one direction. Therefore, two cables are needed.

These are the two types of glass fiber-optic cable:


• Multimode is the cable that has a thicker core than single-mode cable. It is easier to
make, can use simpler light sources such as Light Emitting Diodes (LEDs), and works well
over distances of a few kilometers or less.
20 | P a g e

• Single-mode is the cable that has a very thin core. It is harder to make, uses lasers as
a light source, and can transmit signals dozens of kilometers with ease.

Creating Ethernet Cable


Ethernet cabling has been the standard in networking installation for years. It is the fastest
way of connecting PC to a peer or to your router or a central switch. This section of the module will
bring you back to the procedures in creating an Ethernet cable specifically straight-through and
cross-over. Try to recall the procedures as you go on with the lesson.

Fabricating an Ethernet Cross-over and Straight-through Cable


In an Ethernet networking environment – like in a home or an office with multiple PCs that
are wired – the computers need to be connected to a central router to allow data transfer. The
router takes all the bits being sent out by the computers and relays them onto the other devices on
the network.
The straight-through Ethernet cable is used in local area network to connect a PC to a
network hub and router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network devices directly,
without the need for a router in the middle. It simply reverses some of the pins so that the output
on one computer is being sent to the input of another.

Bear in mind that safety precautions must always be applied and observed during the
fabrication of the said cables. Also, materials and tools to be used must always be complete and
functional to save time, money and effort.
The following items are the materials and tools used for making Ethernet cables:
 Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
 RJ45 crimpable connectors for Cat5e;
 RJ45 Crimping tool;
 Wire cutter, stripper or pliers; and  Ethernet cable tester.

Cable Fabrication Procedures

Cross-Over Straight-Through

Figure 42. Cross-Over and Straight-Through Color Coding

The picture below will serve as your guide in making the two important Ethernet cables.

1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a
razor blade that will do the trick with practice.

Figure 43. Step 1


2. Unwind and pair the similar colors.
P a g e | 21

Figure 44. Step 2


3. Pinch the wires between your fingers and straighten them out as shown. The color order is
important to do this correctly.

Figure 45. Step 3

4. Use wire cutter to make a straight cut across the wires 1/2 inch from the cut sleeve to the
end of the wires.
5. Push the wires into the connector. Each wire fits into a slot in the RJ45 connector. Note the
position of the blue plastic shielding. Also note how the wires go all the way to the end.

Figure 46. Step 5


6. Take view from the top. Make sure the wires are all the way in. There should be no short
wires.

Figure 47. Step 6


7. Crimping the Cable – carefully place the connector into the Ethernet Crimper and cinch
down on the handles tightly. The copper splicing tabs on the connector will pierce into each of
the eight wires. There is also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end is ready to use.

Figure 48. Step


22 | P a g e

8. For a standard "Straight-Through" cable, repeat all steps and wire color order on the other
end of cable. For a cross-over cable - the other end will have a different color order as shown by
the crossover picture on page 84.
9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does
this quite well.

Figure 49. Step 9

ACTIVITY NO. 2.3-9*


PROCESS

Directions: Complete the criss-cross puzzle and familiarize yourself of the cables being described.
Write your answer on the space provided.

CABLES

Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
P a g e | 23

REFLECT/UNDERSTAND

Now that you are equipped with the knowledge on the different cables used in networking,
you also need to know that fiber technologies and connectors have changed through the years. In
these videos, you will learn about the different fiber connectors, copper connectors and their
characteristics. To watch the video presentations just type in the following URL:

1) http://www.professormesser.com/n10-005/copper-connectors/

2) https://www.youtube.com/watch?v=TpoUUDYyikI

3) https://www.youtube.com/watch?v=EH9zlCZe1qA

Here are the questions:


(Write your answer on the space provided.)

1. What are the different types of fiber connectors? Cite their advantages and
disadvantages.
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
______________________________________________________________________________________
2. List down the different types of connectors.
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
______________________________________________________________________________________
3. What are the characteristics of UTP, STP and coaxial cable?
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
___________________________________________________________________________________________
______________________________________________________________________________________
24 | P a g e

TRANSFER
Create your own Ethernet Cable
Directions: Prepare the following tools and materials in fabricating your own cross-over and
straight-through cables.

Materials:
 6 meters Ethernet Cable Category 5e or Cat5e-standard wire for cabling;
 RJ45 crimpable connectors for Cat5e; Tools:
 RJ45 Crimping tool;
 Wire cutter, stripper or pliers; and
 Ethernet cable Tester / LAN Tester

Reminder / Caution: Be careful when using the tools.

Follow the procedures cited in this module and apply the safety precautions to avoid injury or any unwanted
incident. You will be given 30 minutes to complete the task. You will be rated using the performance rubrics found on
the next page.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a razor blade that will do
the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as shown on page 90. The color order is
important to do this correctly.
4. Use scissors to make a straight cut across the wires 1/2 inch from the cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic shielding. Also note how the wires go all
the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There should be no short wires.
7. In crimping the cable – carefully place the connector into the Ethernet Crimper and cinch down on the handles
tightly. The copper splicing tabs on the connector will pierce into each of the eight wires. There is also a locking
tab that holds the blue plastic sleeve in place for a tight compression fit. When you remove the cable from the
crimper, that end is ready to use.
8. For a standard straight-through cable, repeat all steps and wire color order on the other end of cable. For a
cross-over cable, the other end will have a different color order as shown in the cross-over picture on
Information sheet 2.2-2.
9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does this quite well.

Performance Rubrics for


Creating a Cross-Over and Straight-Through Ethernet Cables
CRITERIA Excellent Good Fair Poor
4 3 2 1
Safety Procedures
(15%)
-Applied / manifested safety precautions while working

Adherence to the
Procedures (30%) -Followed the procedures systematically
Workmanship (15%) -Organized materials and tools while
accomplishing the task and has time management
Quality of Product (40%)
-Produced a fully functional Ethernet Cable

You might also like