0% found this document useful (0 votes)
8 views

uc-2-setup-computer-networks-final

This document serves as a competency-based learning material for the Computer Systems Servicing NC II qualification, focusing on setting up computer networks. It outlines the necessary skills, knowledge, and attitudes required to install and maintain computer networks, including practical activities and assessment criteria. The module includes detailed instructions for learners to follow, as well as technical terms and learning outcomes related to network setup and configuration.

Uploaded by

Daniel Gamponia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

uc-2-setup-computer-networks-final

This document serves as a competency-based learning material for the Computer Systems Servicing NC II qualification, focusing on setting up computer networks. It outlines the necessary skills, knowledge, and attitudes required to install and maintain computer networks, including practical activities and assessment criteria. The module includes detailed instructions for learners to follow, as well as technical terms and learning outcomes related to network setup and configuration.

Uploaded by

Daniel Gamponia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

lOMoARcPSD|10856065

UC 2 Setup Computer Networks Final

Computer System Servicing (Sultan Kudarat State University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Daniel Gamponia ([email protected])
lOMoARcPSD|10856065

COMPETENCY BASED LEARNING


MATERIAL

Sector: ELECTRICAL AND ELECTRONICS

Qualification Title: COMPUTER SYSTEMS SERVICING NC II

Unit of Competency: SETUP COMPUTER NETWORKS

Module Title:
SETTING-UP COMPUTER NETWORKS

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 1 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

SUMMARY OF COMPETENCY-BASED LEARNING MATERIALS

1. Install computer systems and Installing computer ELC724331


networks systems and networks
2. Setting-up Computer ELC724332
Set-up Computer Networks
Networks
3. Setting-up Computer ELC724333
Set-up Computer Servers
Servers
Maintaining and Repair
4. Maintain and Repair Computer ELC724334
Computer Systems and
Systems and Networks
Networks

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 2 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

HOW TO USE THIS MODULE

Welcome to the Module “Setting-up Computer Networks”. This module contains


training materials and activities for you to complete.

The unit of competency “Setting-up Computer Networks” contains knowledge, skills


and attitudes required for a Computer Systems Servicing NC II.

You are required to go through a series of learning activities in order to complete each
of the learning outcomes of the module. In each learning outcome there are
Information Sheets, Operation Sheets, and Activity Sheets. Follow these activities
on your own and answer the Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your teacher for assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this module
because you have:
o been working for some time
o already have completed training in this area.

If you can demonstrate to your teacher that you are competent in a particular skill
or skills, talk to him/her about having them formally recognized so you don’t have to do
he same training again. If you have a qualification or Certificate of Competency from
previous trainings show it to your teacher. If the skills you acquired are still current and
relevant to this module, they may become part of the evidence you can present for RPL.
If you are not sure about the currency of your skills, discuss it with your teacher.

After completing this module ask your teacher to assess your competency.
Result of your assessment will be recorded in your competency profile. All the learning
activities are designed for you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by
relevant information sheets for each learning outcome. Each learning outcome may
have more than one learning activity.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 3 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

MODULE CONTENT

QUALIFICATION COMPUTER SYSTEMS SERVICING NC II


UNIT OF COMPETENCY Setup Computer Networks
MODULE TITLE Setting-up Computer Networks

INTRODUCTION:

This unit covers the outcomes required in setting-up computers networks for LANs and
small-office home-office (SOHO) systems. It consists of competencies to install network
cables, set network configuration, set router/Wi-Fi/ wireless access point/repeater
configuration as well as to inspect and test the configured computer networks.

LEARNING OUTCOMES:

1. Install network cables


2. Set network configuration
3. Set router/Wi-Fi/ wireless access point/repeater configuration
4. Inspect and test the configured computer networks

ASSESSMENT CRITERIA:
1. Cable routes are determined and planned in accordance with network design and
actual installation site.
2. Network materials necessary to complete the work are identified and obtained in
accordance with established procedures and checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation work are
obtained in accordance with established procedures and checked for correct
operation and safety
4. Appropriate personal protective equipment is used and OHS policies and
procedures are followed
5. Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with established
procedures and installation requirements
7. Installation work is performed and is checked to ensure no unnecessary damage
has occurred and complies with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
9. Excess components and materials are disposed of based on WEEE directives and
3Rs waste management program
10. Network connectivity of each terminal is checked in accordance with network design.
11. Any fault or problem in the network system is diagnosed and remedied in line with
the standard operating procedures.
12. Network interface card (NIC) settings are configured in accordance with network
design.
13. Communication checking between terminals are carried out in accordance with OS

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 4 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

network configuration guides


14. Unplanned events or conditions are responded to in accordance with established
procedures
15. Client Device systems settings are configured in accordance with manufacturers’
instructions and end-user preferences
16. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network design
17. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network design
18. Wireless settings are configured in accordance manufacturers’ instructions, network
design and end-user preferences
19. Security/Firewall/Advance settings are configured in accordance with manufacturers’
instructions and end-user preferences
20. Final inspections are undertaken to ensure that the configuration done on the
computer networks conforms with the manufacturer’s instruction/manual
21. Computer networks are checked to ensure safe operation.
22. Reports are prepared/completed according to company requirements

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 5 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

TECHNICAL TERMS

 Network is a collection of computers, servers, mainframes, network devices,


peripherals, or other devices connected to one another to allow the sharing of
data. An excellent example of a network is the Internet, which connects millions
of people all over the world. Below is an example image of a home network with
multiple computers and other network devices all connected to each other and
the Internet.

 LAN (Local Area Network) has networking equipment or computers in close


proximity to each other, capable of communicating, sharing resources and
information. For example, most home and business networks are on a
LAN.Firmware- is a combination of hardware and software, it is a program
integrated on a chip.

 WAN (Wide Area Network) is a collection of computers and network resources


connected via a network over a geographic area. Wide area networks are
commonly connected either through the Internet or special arrangements made
with phone companies or other service providers.

 Metropolitan Area Network, MAN is a network that is utilized across multiple


buildings. A MAN is much larger than the standard LAN local area network), but
is not as large as a WAN (wide area network). A MAN is commonly used in
school campuses and large companies with multiple buildings.

 Network Interface Card, the NIC is also referred to as an Ethernet card and
network adapter. It is an expansion card that enables a computer to connect to
a network; such as a home network, or the Internet using an Ethernet cable with
an RJ-45 connector.

 Bandwidth, communication speed, or connection speed is the total maximum


transfer rate of a network cable or device. Essentially, it is a measurement of how
fast data can be sent over a wired or wireless connection, usually measure in bits
per second.

 Broadcast information is to transmit it to many receivers. For example, a radio


station broadcasts a signal to many listeners, and digital TV subscribers receive
a signal that is broadcast by their TV provider.

 Internet or wideband transmission, broadband (bb) are telecommunications


that provide a variety of channels of data over a wire. Today, there are a wide
variety of broadband technologies available in most areas, below is a short listing
of some of these services and companies that provide it

 LAN cable, a Cat 5 or category 5 is a network cable that consists of four twisted
pairs of copper wire terminated by an RJ-45 connector. Cat 5 has a maximum
length of 100m, exceeding this length without the aid of bridge or other network
device could cause network issues.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 6 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

 Client is a computer that connects to and uses the resources of a remote


computer, or server. Many corporate networks comprise a client computer for
each employee, each of which connects to the corporate server. The server
provides resources like files, information, Internet and intranet access, and
external processing power. In the case of processing, any work done on the
server is referred to as "server-side" work. Any work done on the local client is
similarly called "client-side."

 Crimping Tool is a device used to conjoin two pieces of metal by deforming one
or both of them in a way that causes them to hold each other. The result of the
tool's work is called a crimp. A good example of crimping is the process of
affixing a connector to the end of a cable.

 Fiber Optic Cable defined in IEEE 802.8 is cable that contains optical fibers
(usually glass) coated in plastic that are used to send data by pulses of light. The
coating helps protect the fibers from heat, cold, electromagnetic interference from
other types of wiring, as well as some protection from ultraviolet rays from the
sun.

 Gateway is a networked device which serves as an entry point into another


network. For example, a wireless router is commonly the default gateway in a
home network.

 P2P network, a peer-to-peer network is a network that does not have a central
computer or dedicated server; in other words, all computers are independent.
This network is what you would most likely find in home networks or small
networks comprised of a dozen or less computers.

 Packet is a term first coined by Donald Davies in 1965 that is used to describe a
segment of data sent from one computer or device to another over a network.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 7 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

LEARNING OUTCOME SUMMARY

LEARNING
INSTALL NETWORK CABLES
OUTCOME #1

CONTENTS:

 Installed Network Cable


 Identifying Network Materials
 Copper Cable splicing and Troubleshooting
 Installed network cables and cables raceway
 OHS standards and 5S principles

ASSESSMENT CRITERIA:
 Cable routes are determined and planned in accordance with network
design and actual installation site.
 Network materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
 Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
 Appropriate personal protective equipment is used and OHS policies
and procedures are followed
 Copper cable splicing is performed based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards
 Network cables and cable raceway are installed in accordance with
established procedures and installation requirements
 Installation work is performed and is checked to ensure no
unnecessary damage has occurred and complies with requirements
 OHS standards and 5S principles are followed according to enterprise
requirements
 Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 8 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

CONDITION:
Trainees must be provided with the  terminal box
following:  Protective eyewear
 Cables  Digital multi-meter
 Fiber optics  Wire stripper with bolt cutter
 copper  Pliers (assorted)
 terminals  Screw drivers (assorted)
 cable raceway/duct  LAN Tester
 clamps  Crimping tools
 fasteners
 insulators

EVALUATION METHOD:

1. Practical demonstration
2. Written Examination

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 9 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Learning Experiences
Learning Outcome 1: Assemble Computer Hardware

Learning Activities Special Instructions


1. Read information sheet 1.1-1 ” Local If you have some problem on the content of the
Area Networks (LAN’s System” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
2. Answer self-check 1.1-1 Compare your answer to the answer key 1.1-1. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not review
the information sheet and go over the self-check
again.
3. Read information sheet 1.1-2 If you have some problem on the content of the
“Identifying Network Materials” information sheet don’t hesitate to approach your
facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
4. Answer self-check 1.1-2 Compare your answer to the answer key 1.1-2. If you
got 100% correct answer in this self-check, you can
now move to the next information sheet. If not review
the information sheet and go over the self-check
again.
5. Read information sheet 2.1-1 If you have some problem on the content of the
“Configuring the Computer information sheet don’t hesitate to approach your
facilitator.
Systems and Network”
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
6. Answer self-check 2.1-1 Compare your answer to the answer key 2.1-1. If you
got 100% correct answer in this self-check, you can
now move to the next task sheet. If not review the
information sheet and go over the self-check again.
7. Read information sheet 3.1-1 If you have some problem on the content of the
“Configuring WAN Settings for information sheet don’t hesitate to approach your
Internet Connection” facilitator.
If you feel that you are now knowledgeable on the
content of the information sheet, you can now
answer self-check provided in the module.
8. Answer self-check 3.1-1 Compare your answer to the answer key 3.1-1. If you
got 100% correct answer in this self-check, you can
now move to the next Learning Outcome. If not
review the information sheet and go over the self-
check again.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 10 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

INFORMATION SHEET 1.1-1

LOCAL AREA NETWORKS (LANs) SYSTEMS

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to crimp LAN cable,
configure the system and check the connectivity of your work.

A network is a group of interconnected computers, linked for the purpose of sharing


files, programs and peripherals. Through your computers or office network, you can run
programs, use printers, and edit files from other computers as if they were located on
your own.

A server is the computer on the network that manages the network resources, such as
the shared files, programs and printers.

Local-area network (LAN) is a computer network covering a small geographic area, like
a home, office, or group of buildings e.g. a school.

The majority of networking, particularly at the corporate level, is done using the internet
standard. At the center of the basic diagram of a wired network is either a hub or a
switcher and computers are connected to the hub, much like spokes of a wheel or star.
Each connection at the hub is called a port.

Three Basic Network Categories


 Local Area Network- the smallest of the three network types, consists of PCs
connected together within a limited area, such as within the same building, floor or
department.

LOCAL AREA
NETWORK

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 11 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

 Metropolitan Area Network – is a network that spans no more than 50 miles. It is


design to connect LANs spanning a town or city

METROPOLITAN AREA WIDE AREA NETWORK


NETWORK

 Wide Area Network – is used to distribute information thousands of miles among


thousands of users.
Network Terms:
 Network Server- is a powerful computer whose sole purpose is to serve network
clients.

NETWORK SERVER
 Host – any computer whether mainframe, server, or even PC that acts as an
information source on a network.
 Peers- mean any computer sharing the same protocol layer with another
computer.
 Workstation- is any network computer that connects to and request resources
from a network
 Protocol – refers to the specific standards governing the sending and receiving
of data.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 12 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Types of Networks
 Server/client –use a network operating system to manage the entire work.

 Peer-to-peer - no centralized computer oversees the networks, no server, and


computers simply connect with each other in a network group to share files,
printers, and internet access.

The Basic Rule


The basic rule for network design is known as the 5-4-3 rule. It states that in a 10 Mbps.
Ethernet network:
 you can have a maximum of five cable segments between any two computers
 you can have a maximum of four repeaters (hubs, switches, wireless access
points, etc.) between any two computers
 of the five cable segments (maximum) between any computers, only three of
these can terminate in computers.

How to wire Ethernet Cables

How to wire your own ethernet cables and connectors.

What You Need:

Required:
 CAT 5 Cable - bulk Category 5, 5e or 6 cable
 RJ45
 Crimper for RJ45

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 13 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

 Wire Cutters - to cut and strip the cable if necessary


Recommend:
 Wire Stripper
 Cable Tester

About the Cable:

Here is what the internals of the cable look like:

Internal Cable Structure and Color Coding


Inside the cable, there are 8 color coded wires. These wires are twisted into 4 pairs of
wires, each pair has a common color theme. One wire in the pair being a solid or
primarily solid colored wire and the other being a primarily white wire with a colored
stripe (Sometimes cable doesn't have any color on the striped cable, the only way to tell
is to check which other wire it is twisted around).

About the RJ45 Ends:

The RJ45 end is a 8-position modular connector that looks like a large phone plug.
There are a couple variations available.
Here is a diagram and pinout:

RJ45 Jack and Plug Pinout

Ethernet Cable Pinouts:

There are two basic cables. A straight through cable, which is used to connect to a hub
or switch, and a cross over cable used to operate in a peer-to-peer fashion without a
hub/switch. Some interfaces can cross and un-cross a cable automatically as needed,
really quite nice.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 14 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Standard, Straight-Through Wiring (both ends are the same):

Wire Color Wire Diagram 10Base-T Signal


RJ45 Pin # 1000Base-T Signal
(T568A) (T568A) 100Base-TX Signal
1 White/Green Transmit+ BI_DA+
2 Green Transmit- BI_DA-
3 White/Orange Receive+ BI_DB+
4 Blue Unused BI_DC+
5 White/Blue Unused BI_DC-
6 Orange Receive- BI_DB-
7 White/Brown Unused BI_DD+
8 Brown Unused BI_DD-
Straight-Through Cable Pinout for T568A
Wire Color Wire Diagram 10Base-T Signal
RJ45 Pin # 1000Base-T Signal
(T568B) (T568B) 100Base-TX Signal
1 White/Orange Transmit+ BI_DA+
2 Orange Transmit- BI_DA-
3 White/Green Receive+ BI_DB+
4 Blue Unused BI_DC+
5 White/Blue Unused BI_DC-
6 Green Receive- BI_DB-
7 White/Brown Unused BI_DD+
8 Brown Unused BI_DD-

Straight-Through Cable Pinout for T568B

Cross Over Cable (T568B):

RJ45 Pin # Diagram End RJ45 Pin # Diagram End


Wire Color Wire Color
(END 1) #1 (END 2) #2
1 White/Orange 1 White/Green
2 Orange 2 Green
3 White/Green 3 White/Orange
4 Blue 4 White/Brown
5 White/Blue 5 Brown

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 15 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

RJ45 Pin # Diagram End RJ45 Pin # Diagram End


Wire Color Wire Color
(END 1) #1 (END 2) #2
6 Green 6 Orange
7 White/Brown 7 Blue
8 Brown 8 White/Blue

Cross Over Cable Pinouts


+Note: The cross over cable layout is suitable for 1000Base-T operation, all 4 pairs are
crossed.

How to wire Ethernet Cables:

1. Strip off about 2 inches of the cable sheath.


2. Untwist the pairs - don't untwist them beyond what you have exposed, the more
untwisted cable you have the worse the problems you can run into.
3. Align the colored wires according to the diagrams above.
4. Trim all the wires to the same length, about 1/2" to 3/4" left exposed from the
sheath.
5. Insert the wires into the RJ45 end - make sure each wire is fully inserted to the
front of the RJ45 end and in the correct order. The sheath of the cable should
extend into the RJ45 end by about 1/2" and will be held in place by the crimp.
6. Crimp the RJ45 end with the crimper tool
7. Verify the wires ended up the right order and that the wires extend to the front of
the RJ45 end and make good contact with the metal contacts in the RJ45 end.
8. Cut the cable to length - make sure it is more than long enough for your needs.
Remember, an end to end connection should not extend more than 100m
(~328ft). Try to keep cables short, the longer the cable becomes the more it may
affect performance, usually noticeable as a gradual decrease in speed and
increase in latency.
9. Repeat the above steps for the second RJ45 end.
10. If a cable tester is available, use it to verify the proper connectivity of the cable.
That should be it, if your cable doesn't turn out, look closely at each end and see if you
can find the problem. Usually a wire ended up in the wrong place or more commonly,
one of the wires didn't extend to the front of the RJ45 connector and is making no, or
poor contact. If you see a mistake or problem, cut the end off and start again.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 16 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

SELF CHECK 1.1-1

Multiple Choices: Select the best answer of the given statement.

1. A group of interconnected computer


A. Network
B. Server
C. Workgroup
D. Sharing
2. The smallest type of network
A. Local Area network
B. Metropolitan Area Network
C. Wide Area Network
D. All of the above
3. A powerful computer whose sole purpose is to serve network clients
A. Host
B. Peers
C. Network Server
D. Workstation
4. Any network computer that connects to and request resources from a
network.
A. Host
B. Peers
C. Network Server
D. Workstation
5. Any computer whether mainframe, server or even PC that acts as an
information sources of a network
A. Host
B. Peers
C. Network Server
D. Workstation

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 17 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Answer key 1.1-1

1. A
2. A
3. C
4. D
5. A

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 18 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

TASK SHEET 1.1-1

Title : Network Cable Connection


Performance Objective : Given the necessary tools and materials you are going
to make crossover and straight cable connection and
test the connectivity of your cable.
Supplies : UTP Cable, RJ 45
Tools/Equipment : Crimping tool
Network Hub
Working Computer with OS
Server
Internet connection
Cable Tester

Steps/ Procedure:

1. Prepare the necessary tools and materials


2. Use UTP Cable and 4 RJ-45 to make Straight & Cross-over
connection.
3. Follow the procedures in crimping UTP cable in Information sheet
1.2-7
3. Check the connectivity of your cables.
4. Let your trainer check your work.

Assessment Method:

Demonstration with questioning , Performance Criteria checklist

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 19 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

PERFORMANCE CHECKLIST

Performance Criteria
Did you… YES NO
1. Prepared all materials needed

2. Used the correct procedure in crimping RJ-45

3. Crimped cross-over & straight though connection correctly

4. Checked the connectivity of two cables

5. Observed Safety Precautions while working

6. Used the standard color coding of cables

7. Observed 5s before, during and after the task

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 20 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

INFORMATION SHEET 1.1-2

IDENTIFYING NETWORK MATERIALS

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to identify network
material used in networking.

Different network and communication cables are needed depending on the network’s
physical layer, topology, and size. Can you figure out which type of patch cable and
connector to use? This article will introduce some common types of network cables and
their characteristics.
Network and communication cables are network hardware used to connect one network
device to other network devices. For example, connecting two or more computers to
share printers and scanners; connecting several severs to an access switch. The range
covers data and Ethernet cable assemblies, including twisted pair cable, coaxial cable,
optical fiber cable, power line, etc. The twisted pair cable, coaxial cable and optical fiber
cable are categories that are most often referred to.

What Twisted Pair Is Like and Its Cabling Standards


Twisted pair cabling is a type of wiring in which two conductors (usually copper) of a
single circuit are twisted together. Why are the pairs twisted together? Because the two
wires are carrying equal and opposite signals, one pair can induce crosstalk in another
and the effect gets stronger along the length of the cable, which is bad for the
transmission of signal. Twisting the pairs reduce the crosstalk between lines. Twisted
pair cabling is often used in data networks for short and medium length connections
because of its relatively lower costs compared to optical fiber and coaxial cable.

Shielded Twisted Pair vs. Unshielded Twisted Pair


Twisted pair cables are often shielded in an attempt to prevent electromagnetic
interference. Twisted pair with shielding are known as shielded twisted pair (STP). In
contrast to STP, unshielded twisted pair (UTP) is not surrounded by any shielding.
STP cable is also divided by overall shield and individual shield. Individual shielded
twisted pair is with aluminum foil for each twisted pair or quad. This type of shielding
protects cable from external electromagnetic interference (EMI) entering or exiting the
cable and also protects neighboring pairs from crosstalk. Overall shielded twisted pair is
with overall foil or braided shield across all of the pairs within the 100 Ω twisted pair
cable. This type of shielding helps prevent EMI from entering or exiting the cable. One
STP cable can have both overall and individual shielding.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 21 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Figure 1: shielded twisted pair construction.


UTP cable without shielding is more prone to outside interference. For this reason, this
cable type is more often found in indoor telephone applications. Outdoor telephone
cables contain hundreds or thousands pairs. Pairs that have the same twisted rate
within the cable can experience some degree of crosstalk, so wire pairs are usually
selected carefully within a large cable to reduce the crosstalk.
Most UTP cable uses RJ45 connectors, which look like telephone connectors (RJ11)
but have eight wires instead of four.

Figure 2: RJ45 connector (up) and RJ45 adaptor (up).

The Nearest Twisted Pair to Us: Ethernet Cable


Ethernet cable is a typical type of twisted pairs, and probably the most familiar one to
us. The following table gives the basic information of some Ethernet cables.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 22 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Table 1: twisted pair Ethernet cable types.

Typical
Name Construction Bandwidth Applications

Cat 3 UTP 16 MHz 10BASE-T and 100BASE-T4 Ethernet

Cat 4 UTP 20 MHz 16Mbit/s Token Ring

Cat 5 UTP 100 MHz 100BASE-TX & 1000BASE-T Ethernet

Cat 5e UTP 100 MHz 100BASE-TX & 1000BASE-T Ethernet

Cat 6 STP 250 MHz 10GBASE-T Ethernet

Cat 6a STP 500 MHz 10GBASE-T Ethernet

10GBASE-T Ethernet or
Cat 7 STP 600 MHz
POTS/CATV/1000BASE-T over single cable

10GBASE-T Ethernet or
Cat 7a STP 1000 MHz
POTS/CATV/1000BASE-T over single cable

Cat 1600-2000 40GBASE-T Ethernet or


STP
8/8.1 MHz POTS/CATV/1000BASE-T over single cable

1600-2000 40GBASE-T Ethernet or


Cat 8.2 STP
MHz POTS/CATV/1000BASE-T over single cable

Twisted Pair Cabling: T568A or T568B?


Two wiring standards are commonly used with twisted pair cabling: T568A and T568B.
These are telecommunications standards from TIA and EIA that specify the pin
arrangements for the connectors (often RJ45) on UTP or STP cables. The number 568
refers to the order in which the wires within the twisted pair cable are terminated and
attached to the connector. The signal is identical for both.
Pin numbers are read left to right, with the connector tab facing down. Notice that the
pin-outs stay the same, and the only difference is in the color coding of the wiring.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 23 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Figure 3: T568A and T568B wiring standards for twisted pair cabling.

Coaxial Cable: Not Just a Video Cable


Coaxial cable is a type of cable that has an inner conductor surrounded by a tubular
insulating layer, surrounded by a tubular conducting shield. The inner conductor and the
outer shield share a geometric axis. Many coaxial cable has an insulating outer sheath
or jacket.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 24 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Figure 4: coaxial cable construction.

Why Is Coaxial Cable Good for Radio Transmission?


Coaxial cable is used as a transmission line for radio frequency (RF) signals. Its
applications include feedlines connecting radio transmitters and receivers with their
antennas, computer network connections, digital audio, and distributing cable television
signals. Coaxial cable has an obvious advantage over other types of radio transmission
line. In a good coaxial cable, the electromagnetic field carrying the signal exists only in
the space between the inner conductor and the outer conducting shield. For this reason,
coaxial cables are allowed to be installed next to metal objects without power losses
that occur in other types of radio transmission line.

Widely Used Coaxial Connector Types


Many coaxial connector types are available in the audio, digital, video, RF and
microwave industries, each designed for a specific purpose and application. One
consideration the number of connect-disconnect cycles that a connector pair could
withstand while still performing as expected. Here are some common coaxial connector
types.
Table 2: coaxial connector types.

Maximum
Connecto Other
Female Male Frequency,
r Type Name
Application
250 MHz to 1
GHz. The “F”
series
connectors are
Type F Video primarily utilized
in television
cable and
antenna
applications.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 25 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

12 GHz or more.
Type N connector
was originally
designed for
military systems
operating below 5
GHz, later
Type N / improved to 12
GHz and higher.
Type N
connectors follow
the military
standard MIL-C-
39012.

100 kHz or less.


Same with the
Phone names, the phone
TS,
plugs and plug is the male
TRS connector, a
jacks
phone jack is the
female connector.

10 MHz. A round,
press-on
Phono connector
plugs commonly used
RCA
and for consumer-
jacks grade audio and
composite video
connections.
.5 GHz. A
relatively new
connector used
popularly as an
interconnect in
7/16 DIN / cellular and other
so called
“wireless”
applications,
especially on
towers.
18 GHz. The
genderless APC-
7 (Amphenol
Precision
Connector - 7
mm) offers the
lowest reflection
APC-7 7 mm same coefficient and
most repeatable
measurement of
all 18 GHz
connectors,
notably used for
metrology and
calibration.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 26 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

The Capable Optical Fiber Cable


Optical fiber cabling is an excellent transmission medium for its high data capacity and
supported long distances. It is indispensable in any fiber optic network. It has a
fiber/glass core within a rubber outer coating and uses beams of light rather than
electrical signals to relay data. Because light doesn't diminish over distance the way
electrical signals do, this cabling can run for distances measured in kilometers with
transmission speeds from 10 Mbps up to 100 Gbps or higher.

Figure 5: optical fiber cable cutaway.

The Fiber Core Size Matters: SMF and MMF


The inner fiber can be either single mode or multimode. Generally, a single mode fiber
core is 9/125µm wide, whereas a multimode fiber core can be 62.5/125µm or 50/125µm
wide. Only the early OM1 is 62.5/125µm fiber, the later generations OM2, OM3, OM4,
OM5 50/125µm fiber. The letters “OM” stand for optical multimode. Both multimode fiber
(MMF) and single mode fiber (SMF) can be used for high-speed transmission. MMF is
often for short reach while SMF is for long reach.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 27 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Figure 6: multimode fiber and single mode fiber core diameters.

Multiple Fiber Optic Connectors


Optical fiber cables can be terminated with various types of fiber optic connectors that
can be plugged into different ports of devices. The figure below shows some common
fiber optic connector types, and the LC, SC and ST are most used three types.

Figure 7: common fiber optic connector types.


In addition, there is a multi-fiber connector type called MTP/MPO (Multi-fiber Push On).
It is designed for higher bandwidth applications such as 40GbE and 100GbE. 12- and
24-fiber versions are currently used to directly connect into 40G and 100G transceivers
and also used in high density fiber distribution areas. Higher fiber versions are also
available (48, 72 fibers) but their use and deployment is currently limited.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 28 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Figu
re 8: 12-fiber and 24-fiber MTP/MPO connector interfaces.

Summary
This is a quick guide to the common categories of network cables and connectors.
Deeper interpretation on any type of the above-mentioned cables can also be found on
our page or you can study them by searching on the Internet. Knowing the network and
communication cables will benefit both in our daily life and in network construction work,
since the range covers both home-use cables and big-infrastructure cables.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 29 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

SELF-CHECK 1.1-2

IDENTIFICATION:

1. 6.
2. 7.
3. 8.
4. 9.
5. 10.

3 4
2
1

7
6 8
5

9 10

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 30 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

o ANSWER KEY 1.1-2

1. Jacket

2. Braded or Foil Shield

3. Foil Shields

4. Twisted Pairs

5. LC Connector

6. SC Connector

7. ST Connector

8. FC Connector

9. MTRJ Connector

10. MU Connector

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 31 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

LEARNING OUTCOME SUMMARY

LEARNING
SET NETWORK CONFIGURATION
OUTCOME #2

CONTENTS:

 Network Configuration
 Configuring NIC
 OS Network Configuration

ASSESSMENT CRITERIA:

 Network connectivity of each terminal is checked in accordance with network


design.
 Any fault or problem in the network system is diagnosed and remedied in line
with the standard operating procedures.
 Network interface card (NIC) settings are configured in accordance with
network design.
 Communication checking between terminals are carried out in accordance
with OS network configuration guides
 Unplanned events or conditions are responded to in accordance with
established procedures

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 32 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

CONDITION:

Trainees must be provided with the following:


 Cables
 Fiber optics
 copper
 terminals
 cable raceway/duct
 clamps
 fasteners
 insulators
 terminal box
 Protective eyewear
 Digital multi-meter
 Wire stripper with bolt cutter
 Pliers (assorted)
 Screw drivers (assorted)
 LAN Tester
 Crimping tools

EVALUATION METHOD:

1. Practical demonstration
2. Written Examination

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 33 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

INFORMATION SHEET 2.1-1

Configuring the Computer Systems and Network

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to Configuring the
Computer Systems and Network

How to Set Up a Computer from Scratch

Setting up a computer may seem like a daunting task, but it is really very simple. The
brand of computer doesn't matter, as almost all computers are set up the same way. If
you are setting up a new computer, odds are there is a quick start guide in the box that
will have pictures and step by step details.

Instructions
1. Unpack the monitor and tower and situate the monitor where you will be most
comfortable when working or surfing the Internet. Plug the monitor into the back of
the tower. Unpack and connect the keyboard and mouse. Next, plug in the speakers.
2. Plug the monitor, tower and speaker electrical plugs into the surge protector strip.
Next, power on the monitor, the tower and then speakers, making sure the volume is
turned rather low. Once the system is powered up, you will begin customizing
windows.
3. Customizing windows is very simple and each step is self-explanatory. You will be
setting up the region and language settings, personalizing the software, entering
your product key, naming the computer and assigning an administrator password
and setting the date and time.
4. The network settings will depend on whether you have a network of other computers
you will need to connect to or not. If you are connecting to a network, use the typical
settings if you are a beginner. Select custom settings if you are an advanced user
and know how to manually configure the components needed for your network.
5. If you are connecting to a network you will need to enter the name of the network
domain. All computers on a network need to have the same domain name to
communicate. If you are not connecting to a network, accept the default and click
"Next."
6. Windows will complete installation and then ask you about protection and
whether or not you would like to turn on automatic updates. Windows will then ask
how you choose to connect to the Internet so that it can activate windows and
register your copy.
7. Once Windows is up and running you should connect your printer and other
peripherals. Printers do not all install the same way, so you will need to review your
printer instructions before attempting setup. After you have completed installation
and setup of your printer, install any other devices such as a scanner

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 34 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Customize a Computer Desktop

A computer desktop can be customized to an individual’s specific needs. While one


person may want quick access to certain files or applications, someone else is sure to
have different needs. Everyone has their own tastes in images, the number of files
accessible from the desktop and practically any detail can be customized.

Instructions

Things you’ll need:

 Computer

How to Customize a Computer Desktop

1. Select your background. From the start menu, go to Control Panel and then click
“Appearance and Themes.”
2. Click “Change the Desktop Background.”
3. Choose a standard background by scrolling through the list of available
backgrounds. As you click each one, you can view how it will look on your desktop. If
you’d like to use an image from your pictures file rather than a standard background,
click “Browse” which will take you to your pictures folder.
Choose Folders to Display on Desktop
4. Click "Customize Desktop" from the “Change Desktop Background” popup.
5. Choose which folders or applications you'd like to have shown on your desktop. You
can also restore the original settings and set up automatic desktop cleanup.
6. Click on the Web tab to select any web pages you’d like to access from your
desktop.
7. Move any additional folders from the My Documents folder to the Desktop folder
if you’d like to have access to them from your desktop.

Change Display Settings in Windows XP

The display settings for Windows XP determine the screen resolution and color quality
that is displayed on your monitors. The "Display Properties" dialog box is used to adjust
these two components so you can get the look you want for Windows XP.
Difficulty: Easy

Instructions

Things you’ll need:


 Windows XP Operating System
1. Click the "Start" button on the bottom left of your computer to display the Start menu.
Choose the "Control Panel" option from the right side of the Start menu. The "Control
Panel" window will open onto your desktop.
2. Double-click the "Display" icon from the Control Panel to open the "Display
Properties" dialog box. You can then select the "Settings" tab from the top of the
dialog box.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 35 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

3. Slide the bar under the "Screen resolution" setting of the "Display Properties" dialog
box to decrease or increase the screen resolution. The chosen resolution will be
displayed under the sliding bar.
4. Use the "Color quality" drop-down list to choose the type of quality you want your
computer to use. You can choose to have the color quality be "Medium," "High" or
"Highest."
5. Click the "Apply" button at the bottom of the "Display Properties" dialog box to apply
the settings. If you are not happy with the settings you can change them as
instructed in the steps above.
6. Choose the "OK" button when you are happy with your display setting changes. The
"Display Properties" dialog box will close and the settings will be saved

Configure a Computer's Memory Settings


I want to do ths!

The memory that is installed on a computer helps determine its performance (how fast
or slow its processing speed is). Your computer's memory settings oftentimes can affect
how your computer runs, so if you're experience sluggish performance, perhaps you
should adjust your memory settings. Therefore, making sure your computer is equipped
for maximum performance is essential for a fast-operating computer that executes tasks
quickly. Sometimes, if multiple tasks are running and consuming a lot of your
computer's memory, your manufacturer pre-settings might not be very satisfactory. Not
to worry, however, because you can configure a computer's memory settings to the
most optimum level for your computing needs.

Instructions
1. Click the "My Computer" icon located on your desktop, and then select "Properties"
from the drop-down menu that appears.
2. Click the "Advanced" tab, which is located inside the "System Properties" window
that appears upon clicking "Properties."
3. Click "Settings," which is located in the "Performance" section of the "Advanced" tab.
4. Click "Advanced" within the "Performance Options" window that appears upon
clicking "Settings."
5. Click "Change," which is located within the "Virtual Memory" section of the
"Advanced" tab located in the "Performance Options" window.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 36 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

6. Click on "System Managed Size" to set the memory settings recommended for your
computer by your manufacturer, or configure your own memory settings by clicking
on "Custom."

Set Up a Local Area Network

A local area network, or LAN for short, is a group of interconnected computers that can
share data among one another. Almost always, LANs are set up using Ethernet cables
connecting Ethernet cards installed on each computer to a hub, switch or router. This
joining device must have enough ports on it so that all computers to be connected to the
LAN can plug into it. A LAN may, but need not by definition, provide access to the
Internet.

Instructions

Things you’ll need:


 Ethernet cables Ethernet hub/switch Computers with Ethernet cards
1. Shut off all computers to be networked.
2. Connect all computers to a hub or switch using Ethernet cords. If you plan on
connecting the computers to the Internet through a main gateway computer, that
computer will need two Ethernet adapters installed: one to receive the incoming
signal from a modem and one to connect to the hub.
3. Plug in the hub or switch.
4. Turn on all of the computers.
5. Run the network setup wizard on each computer. To access the wizard, go to the
"Start" menu and click on "Network," or "Network Connections." Depending on if you
are running Windows XP or Vista, things may be labeled differently, but under
Network Connections there should be buttons for sharing Internet connections or
setting up a network that open the network setup wizard. The wizard will take you
through a relatively simple process and configure the computers for networking.
6. Restart all computers on the network.

Change Workgroup and Computer Name

A Windows XP workgroup connects computers in a network in order to share files. A


workgroup also connects hardware, such as printers and scanners.

Instructions

1. Set up a Windows XP workgroup on your PC. Click the "Start" menu in the lower left-
hand corner of your WIndows XP screen and select "My Computer."
2. Right-click on the icon for "My Computer." Click "Properties" in the pop-up menu. A
"System Properties" window will appear on the screen.
3. Click the tab for "Computer Name." Click the "Change" button at the bottom of the
window.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 37 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

4. Enter a name for the Windows XP workgroup and computer Name. It is important
to remember this name. Click "OK."
5. Restart computer.

How to Setup a Static IP Address (Win XP)

I want to do this!

This guide will show the user how to set up a static IP address in Windows XP.
By default most broadband internet service providers automatically assign your
computer a new IP address every time it boots up. This is called a Dynamic IP address.
A static IP address assigns one permanent IP to your computer. This is useful if you
want to host a website, access your computer remotely, or run any kind of server.

Instructions

Things You'll Need:


 PC with Windows XP
 Broadband Internet Access
 Pencil and paper
1. First you'll need to take down some IP information so if you don't have something to
write with open up notepad.

Click on the Start Menu then select Run. A window like this one should appear. In
this window type "command" and press enter.
2. A black DOS screen should appear. Type "ipconfig /all" in the
DOS prompt and press enter. All your IP information should
generate. This is a helpful command to know if you ever
have to find your IP address or other info about your internet
connection.
Be sure to write down your IP Address, Subnet Mask,
Default Gateway, and both DNS servers. After your are done
type "exit" and press enter to exit the DOS window.
(Note: If both DNS server addresses are the same then they are just proxy numbers
used by your router and you will have to either log onto your

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 38 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

router status page or call your ISP and ask for your DNS or Name server
addresses.)
3. Now click "Start" and open up the "Control Panel." Select "Network Connections" and
right click on the connection you use and select "Properties."
4. A window like this one should appear. Select "Internet Protocol (TCP/IP)" and click
on Properties.
5. Window like the one pictured will pop up. "Obtain an IP
address automatically," should be
selected. If it isn't then congratulations,
you have a static IP already.
Select "Use the following IP address."
Enter the following:

IP Address -- Type in the IP address you wrote down but change the last digit to a
number between 1 and 255. For example, if your IP address is "192.168.1.1" you
would enter "192.168.1.11" or "192.168.1.101"
Subnet Mask / Default Gateway -- Enter these exactly as you copied them down.
6. Next click "Use the following DNS server addresses" and add the DNS servers
you copied down or found in your router settings.
After you've entered all the information your screen should look something like the
picture to the left.
7. Now make sure you can connect to the internet and congratulations! You now have
a static IP address!
If you can't connect to the internet the most common problem is the DNS servers.
Make sure your DNS servers are correct. If you can't find your router settings just
call your ISP and they should be able to give you your DNS or Name Servers.

Share a Printer between Desktop & Wireless Laptop

Different printer models allow you to share a printer between a desktop and a wireless
laptop computer. If you have a desktop computer somewhere in the house and you
want to print from a laptop in another part of the house, you can share a printer between
the computers so you won't have to send files between two computers. Find out how
you can share one printer between a desktop and laptop computers.

Instructions

Things you’ll need:


 Desktop computer
 Printer
 Printer driver
 Router
 Laptop computer

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 39 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

1. Load the printer driver onto both computers. This allows the computer to be able
to read and connect to the printer. The driver is included in the printer installation CD
and is automatically installed when you choose "Auto run."
2. Establish a network between two computers. If you already have an Internet
connection, it is most likely that the laptop and desktop are already in a network. Go
to the master computer (the one directly connected to the printer). On the control
panel, click "Printers and faxes." Select the printer you want to share, right click on it
and select "Properties." Click on the "Sharing" tab and share the printer. Change the
"Share name" to a name you want such as "Home computer" and write this down.
Click on the button that says, "Enable file and printer sharing."
3. On the other computer, open the control panel and click on "Printers and faxes"
to change the printer settings. Add the printer by choosing "add printer." Shortly, the
"Add printer" wizard will pop up and will guide you through the process, making
connection between the two printers easier. If you are asked for the name of the
computer you want to connect to, be sure to use the exact name that you assigned
the other computer (i.e. "Home computer," or whatever name you chose).
4. Test the connection by printing a test page. If it doesn't work, the first thing to
check is that you have the correct computer name on the wireless laptop.

How to install a wired network adapter


To connect to a network, your computer needs a network adapter. Fortunately,
most computer manufacturers know that connecting to the Internet or other computers
is important to computer users, and they include a network adapter with your computer.
If you need to add a network adapter, first choose which method you want to use
to install it. Most people prefer to use a USB (Universal Serial Bus) network adapter,
because it's easy to install. If you have a portable computer, you might find a CardBus
(also known as PCMCIA or PC Card) or CF network adapter better meets your needs. If
you have a desktop computer with the proper amount of available space, you may also
have the option of adding an internal network adapter.
The instructions you follow to install a network adapter depend on how you
connect it.

How to determine if you have a network adapter


Many newer computers have a network adapter built in that you
can use to connect to a wired network. If you want to install a wired
network adapter and aren't sure whether your computer already
has one, look for a network port on the back of the computer. Network ports resemble
phone jacks, but they are slightly larger and have eight pins inside.
To see what kind of network adapters may already be installed in your computer.

1. Click the Start, and then click Control Panel

2. Under or pick a Control Panel icon, click Network Connections

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 40 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

3. Microsoft Windows XP displays your network adapters. If an adapter has a


red X over it, it is disconnected. If the Network Connections window is
blank, your computer doesn't have a network adapter.

4. If you already have a network adapter, you are ready to configure your
network.

How to install a wired USB network adapter


Once you have the adapter…

 If your USB network adapter came with software, insert the CD or floppy disk
into your computer, and follow the manufacturer's instructions to install the
software.

 Find an available USB port on your computer.

Note: If you need to move your computer to reach the USB


ports, you should shut down Windows to avoid damaging
your computer. If you can easily reach a USB port, you
need not shut down your computer.

 If you do not have an unused USB port, connect a USB hub to add additional
ports. Then connect your USB network adapter to the unused USB port.

 Connect the network cable to the network adapter.

5. Connect the other end of the network cable to your networking equipment.

6. If you had to shut down your computer to get to the USB port, you can now
turn on your computer. Windows detects and installs the new hardware, and
then displays a notification informing you that the hardware has been
successfully installed.

5.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 41 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Sharing Resources and Accessing Shared


Resources

1. Open My Computer, double-click the C: drive,


and create a new folder on the C: drive. Name it
Shared. Right-click the Shared folder and select
Properties.

2. In the Shared Properties dialog box,


select the Sharing tab. Notice that the. Select
the Share This Folder button. Type the Share
Name. Click Apply and the computer you are
linked to should be able to view your Shared
folder.

2. Right-click My Network Places, which should be located on your desktop. Select


Properties. Right-click your connection (look for a name like Local Area Connection)
and again select Properties. In your Local Area Connection Properties dialog box, select
File and Print Sharing for Microsoft Networks and click OK. If you don’t see an option for
File and Print Sharing, click Install and select a service and then click Add. Now select
the File and Print Sharing option.

3. Open My Network Places- double-click the icon- and select the Entire Network
option under Other Places at the left of the window. In the main (right-hand) pane, you
should see one or more options. Double-click the Microsoft Windows Network icon.

Local Disk (C:\PC 1)

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 42 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

4. You’re now at the main network screen, where you should see what’s called a
workgroup. A workgroup is a basic group of computers connected to the same Ethernet
network. Double-click the workgroup to see all the computers connected to your
Ethernet network.

At this point, you can access any of the other computers and see what folders
they have shared. If you don’t see any computer but your own, just wait a few minutes
and refresh your screen. Then it’s time to troubleshoot the network problems.

In a network, other peripherals such as printer and faxes could also be shared. You
could use one computer in a network of 10 computers. Click the Print command, when
the dialog box appears click Find Printer. Then click Browse. Find the location of the
printer you will use.

If you don’t have any printer installed in your computer, here’s the step on how:

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 43 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

TO ADD A PRINTER:

1. Click Start button, then point to Printer and Faxes.

2. A window will be displayed showing Click Add a Printer on the Taskpane (if there
are printers already installed).

3. To continue, click Next.

4. Select what kind of printer you are going to connect, Local printer or Network
printer.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 44 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

5. Select Printer port.

6. Below Manufacturer, Click on the name of the printer's manufacturer. Manufacturers


are listed in alphabetical order and you may have to click on the little down arrow until
the manufacturer's name appears in the list.
Below Model, Click on the model of the printer you will be using. Model names are
listed in alphabetical order and you may need to click on the little down arrow until the
model name appears in the list.
Note: You can often find the manufacturer and model names by looking on the printer
itself.
7. Click the Next button. Windows will check to see if it has the software necessary to
communicate with the printer (the software your computer needs to communicate with
devices like printers, monitors, and disk drives is known as a driver). If so, it will install
the software automatically.

Note: If you receive a message saying that Windows was unable to locate
the necessary files, you will need to get the necessary software before continuing. Most
often, the printer manufacturer's Web site will have a section called Drivers, from which
you can download the software necessary to use their products. If you are unable to
locate the software on the manufacturer's Web site, inquire within your department to
see if someone is in possession of a software installation disk for the printer. Once you
have obtained the necessary software, click here for instructions on installing a driver.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 45 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

8. Assign your Printer name. Click Next. If you want to test page, click Yes. Click Next.

2. Then Finish. Right-click on the printer you installed. Click Set as Default.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 46 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Job Sheet 2.1-1

Title : Networking & File & Printer Sharing

Performance Objective : Given a working personal computer you are


going to network using hub and then Change the computer name and
workgroup, assign static IP address add printer and perform printer sharing.

Supplies, Tools & Equipment :

 Working PC
 Server
 LAN Cable
 Hub/Switch
 Printer

Steps/ Procedure:

1. Start Computer
2. Change workgroup and computer name based on the servers Workgroup.
3. Assign Static IP Address
4. Check the connectivity
5. Add servers printer
6. Share Servers Printer
7. Create document in your workstation
8. Save and share the document
9. Print document from your computer to server’s printer.

Assessment Method:

Demonstration , Performance Criteria checklist

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 47 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Performance Criteria Checklist 2.1-1

CRITERIA Yes No
Did you…
Started the computer properly

Changed workgroup

Changed computer name

Assigned IP Address

Installed printer

Made printer sharing

Connected to the server

Created document

Shared document

Printed Document

Followed safety procedures

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 48 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

SELF CHECK 2.1-1

ENUMERATION

I. Enumerate 7 steps on how to setup IP address

1.
2.
3.
4.
5.
6.
7.

II. Enumerate 6 steps on how to setup Local Area Network

1.
2.
3.
4.
5.
6.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 49 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

ANSWER KEY 2.1-1

I.

1. First you'll need to take down some IP information so if you don't have something
to write with open up notepad.
2. A black DOS screen should appear. Type "ipconfig /all" in the DOS prompt and
press enter. All your IP information should generate. This is a helpful command
to know if you ever have to find your IP address or other info about your internet
connection.
Be sure to write down your IP Address, Subnet Mask, Default Gateway, and both
DNS servers. After your are done type "exit" and press enter to exit the DOS
window.
(Note: If both DNS server addresses are the same then they are just proxy
numbers used by your router and you will have to either log onto your router
status page or call your ISP and ask for your DNS or
3. Now click "Start" and open up the "Control Panel." Select "Network Connections"
and right click on the connection you use and select "Properties."
4. A window like this one should appear. Select "Internet Protocol (TCP/IP)" and
click on Properties.
5. Window like the one pictured will pop up. "Obtain an IP address automatically,"
should be selected. If it isn't then congratulations, you have a static IP already.
Select "Use the following IP address." Enter the following:
6. Next click "Use the following DNS server addresses" and add the DNS servers
you copied down or found in your router settings.
1. After you've entered all the information your screen should look something
like the picture to the left.
7. Now make sure you can connect to the internet and congratulations! You now
have a static IP address!
If you can't connect to the internet the most common problem is the DNS servers.
Make sure your DNS servers are correct. If you can't find your router settings just
call your ISP and they should be able to give you your DNS or Name Servers
II.
1. Shut off all computers to be networked.
2. Connect all computers to a hub or switch using Ethernet cords. If you plan on
connecting the computers to the Internet through a main gateway computer, that
computer will need two Ethernet adapters installed: one to receive the incoming
signal from a modem and one to connect to the hub.
3. Plug in the hub or switch.
4. Turn on all of the computers.
5. Run the network setup wizard on each computer. To access the wizard, go to the
"Start" menu and click on "Network," or "Network Connections." Depending on if
you are running Windows XP or Vista, things may be labeled differently, but
under Network Connections there should be buttons for sharing Internet
connections or setting up a network that open the network setup wizard. The
wizard will take you through a relatively simple process and configure the
computers for networking.
6. Restart all computers on the network.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 50 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

LEARNING OUTCOME SUMMARY

LEARNING SET ROUTER/WI-FI/WIRELESS ACCESS


OUTCOME #3 POINT/REPEATER CONFIGURATION

CONTENTS:

 WAN Configuration
 LAN Configuration
 Wireless Setting Configuration
 Security and firewall Setting

ASSESSMENT CRITERIA:

 Client Device systems settings are configured in accordance with


manufacturers’ instructions and end-user preferences
 Local area network (LAN) port is configured in accordance with
manufacturers’ instructions and network design
 Wide area network (WAN) port is configured in accordance with
manufacturers’ instructions and network design
 Wireless settings are configured in accordance manufacturers’ instructions,
network design and end-user preferences
 Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end-user preferences

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 51 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

CONDITION:

Trainees must be provided with the following:


 Protective eyewear
 Digital multi-meter
 Wire stripper with bolt cutter
 Pliers (assorted)
 Screw drivers (assorted)
 LAN Tester
 Crimping tools Crimping tools
 Laptop
 Desktop
 Network storage
 Network printer
 Wireless Router
 Switch or Hub

EVALUATION METHOD:

1. Practical demonstration
2. Written Examination

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 52 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

INFORMATION SHEET 3.1-1

Configuring WAN Settings for Internet Connection

Configuring WAN Settings for Your Internet Connection


Use the Networking > WAN > WAN Settings to configure WAN settings by using the
account information provided by your ISP. If you have two ISP links, you can configure
one for WAN1 and another for WAN2.
Proceed as needed:
• Release or renew a DHCP WAN connection
• Configure the primary WAN
• Configure a secondary WAN

Release or renew a DHCP WAN connection


If a WAN interface is configured to obtain an IP address from the ISP by using Dynamic
Host Configuration Protocol (DHCP), you can click the Release icon to release its IP
address, or click the Renew icon to obtain a new IP address.

Configure the primary WAN


To configure the settings for the primary WAN (WAN1), click the Edit (pencil) icon. Then
use the WAN - Add/Edit page to configure the connection. If you enabled IPv4/IPv6
routing mode, complete both tabbed pages. Click OK to save your settings. Click Save
to apply your settings to the security appliance.
For IPv4 routing mode, enter the following information on the IPv4 tab:
• Physical Port: The physical port associated with the primary WAN.
• WAN Name: The name of the primary WAN (WAN1).
• IP Address Assignment: Depending on the requirements of your ISP, choose the
network addressing mode and complete the corresponding settings. The security
appliance supports DHCP Client, Static IP, PPPoE, PPTP, and L2TP. For information
on configuring network addressing mode, see Network Addressing Mode.
• DNS Server Source: DNS servers map Internet domain names to IP addresses. You
can get DNS server addresses automatically from your ISP or use ISP-specified
addresses.
– Get Dynamically from ISP: Choose this option if you have not been assigned a static
DNS IP address.
– Use these DNS Servers: Choose this option if you have assigned a static DNS IP
address. Also enter the addresses in the DNS1 and DNS2 fields.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 53 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

• MAC Address Source: Specify the MAC address for the primary WAN. Typically,
you can use the unique 48-bit local Ethernet address of the security appliance as your
MAC address source.

– Use Default MAC Address: Choose this option to use the default MAC address.
– Use the following MAC address: If your ISP requires MAC authentication and
another MAC address has been previously registered with your ISP, choose this option
and enter the MAC address that your ISP requires for this connection.
• MAC Address: Enter the MAC address, for example 01:23:45:67:89:ab.
• Zone: Choose the default WAN zone or an untrusted zone for the primary WAN. You
can click the Create Zone link to view, edit, or add the zones on the security appliance.
For IPv4/IPv6 routing mode, enter the following information on the IPv6 tab:
• IP Address Assignment: Choose Static IP if your ISP assigned a fixed (static or
permanent) IP address, or choose SLAAC if you were not assigned a static IP address.
By default, your security appliance is configured to be a DHCPv6 client of the ISP, with
stateless address auto-configuration (SLAAC).
– SLAAC: SLAAC provides a convenient method to assign IP addresses to IPv6
nodes. This method does not require any human intervention from an IPv6 user. If you
choose SLAAC, the security appliance can generate its own addresses using a
combination of locally available information and information advertised by routers.
– Static IP: If your ISP assigned a static IPv6 address, configure the IPv6 WAN
connection in the following fields:
IPv6 Address: Enter the static IP address that was provided by your ISP.
IPv6 Prefix Length: The IPv6 network (subnet) is identified by the initial bits of the
address called the prefix. All hosts in the network have the identical initial bits for their
IPv6 address. Enter the number of common initial bits in the network’s addresses. The
default prefix length is 64.
Default IPv6 Gateway: Enter the IPv6 address of the gateway for your ISP. This is
usually provided by the ISP or your network administrator.
Primary DNS Server: Enter a valid IP address of the primary DNS server.
Secondary DNS Server (Optional): Optionally, enter a valid IP address of the
secondary DNS server.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 54 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

Configure a secondary WAN


To configure a secondary WAN (WAN2), click Add. Then use the WAN - Add/Edit page
to configure the connection. If you enabled IPv4/IPv6 routing mode, complete both
tabbed pages, as described for the primary WAN interface. Click OK to save your
settings in the pop-up window. Click Save to apply your settings to the security
appliance. To determine how the two ISP links are used, configure the WAN
redundancy settings. See Configuring WAN Redundancy.
• If you are having problems with your WAN connection, see Internet Connection,
page 383.
Network Addressing Mode
The security appliance supports five types of network addressing modes. You need to
specify the network addressing mode for the primary WAN and the secondary WAN
depending on your ISP requirements.
Note Confirm that you have proper network information from your ISP or a peer router
to configure the security appliance to access the Internet.

Network Addressing
Mode Configuration

DHCP Client Connection type often used with cable modems. Choose this option if
your ISP dynamically assigns an IP address on connection.
NOTE: Unless a change is required by your ISP, it is recommended
that the MTU values be left as is.
• MTU: The Maximum Transmission Unit is the size, in bytes, of the
largest packet that can be passed on. Choose Auto to use the default
MTU size, or choose Manual if you want to specify another size.
• MTU Value: If you choose Manual, enter the custom MTU size in
bytes.

Static IP Choose this option if the ISP provides you with a static (permanent) IP
address and does not assign it dynamically. Use the corresponding
information from your ISP to complete the following fields:
• IP Address: Enter the IP address of the WAN port that can be
accessible from the Internet.
• Subnet Mask: Enter the IP address of the subnet mask.
• Gateway: Enter the IP address of default gateway.
• MTU: The Maximum Transmission Unit is the size, in bytes, of the
largest packet that can be passed on. Choose Auto to use the default
MTU size, or choose Manual if you want to specify another size.
• MTU Value: If you choose Manual, enter the custom MTU size in
bytes.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 55 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

PPPoE PPPoE uses Point to Point Protocol over Ethernet (PPPoE) to connect
to the Internet. Choose this option if your ISP provides you with client
software, username, and password. Use the necessary PPPoE
information from your ISP to complete the PPPoE configuration.
• User Name: Enter the username that is required to log into the ISP.
• Password: Enter the password that is required to log into the ISP.
• Authentication Type: Choose the authentication type specified by
your ISP.
• Connect Idle Time: Choose this option to let the security appliance
disconnect from the Internet after a specified period of inactivity (Idle
Time). This choice is recommended if your ISP fees are based on the
time that you spend online.
• Keep alive: Choose this option to keep the connection always on,
regardless of the level of activity. This choice is recommended if you
pay a flat fee for your Internet service.
• MTU: Choose Auto to use the default MTU size, or choose Manual
if you want to specify another size.
• MTU Value: If you choose Manual, enter the custom MTU size in
bytes.
• Add VLAN Tag: Click Yes to support VLAN Tagging (802.1q) over
the WAN port, or click No to disable it.
• VLAN Tag ID: Specify the VLAN tag (ID) to the WAN port.
• Reset Timer: You can reset the PPPoE connection at a given time
of a day and day of a week. The reset events are logged if you enable
this feature. Choose one of the following options from the Frequency
drop-down list and specify the corresponding settings:
– Never: Choose this option to disable this feature.
– Daily: Choose this option to reset the PPPoE connection at a given
time of a day. Specify the time of a day in the Time fields.
– Weekly: Choose this option to reset the PPPoE connection at a
given day of a week. Then specify the day of a week and the time of a
day.

PPTP The PPTP protocol is typically used for VPN connection. Use the
necessary information from your ISP to complete the PPTP
configuration:
• IP Address: Enter the IP address of the WAN port that can be
accessible from the Internet.
• Subnet Mask: Enter the subnet mask.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 56 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

• Gateway: Enter the IP address of default gateway.


• User Name: Enter the username that is required to log into the
PPTP server.
• Password: Enter the password that is required to log into the PPTP
server.
• PPTP Server IP Address: Enter the IP address of the PPTP server.
• MPPE Encryption: Microsoft Point-to-Point Encryption (MPPE)
encrypts data in PPP-based dial-up connections or PPTP VPN
connections. Check this box to enable the MPPE encryption to provide
data security for the PPTP connection that is between the VPN client
and the VPN server.
• Connect Idle Time: Choose this option to let the security appliance
disconnect from the Internet after a specified period of inactivity (Idle
Time). This choice is recommended if your ISP fees are based on the
time that you spend online.
• Keep alive: Choose this option to keep the connection always on,
regardless of the level of activity. This choice is recommended if you
pay a flat fee for your Internet service.
• MTU: Choose Auto to use the default MTU size, or choose Manual
if you want to specify another size.
• MTU Value: If you choose Manual, enter the custom MTU size in
bytes.

L2TP Choose this option if you want to use IPsec to connect a L2TP (Layer 2
Tunneling Protocol) server and encrypt all data transmitted from the
client to the server. However, it does not encrypt network traffic to other
destinations. Use the necessary information from your ISP to complete
the L2TP configuration:
• IP Address: Enter the IP address of the WAN port that can be
accessible from the Internet.
• Subnet Mask: Enter the subnet mask.
• Gateway: Enter the IP address of default gateway.
• User Name: Enter the username that is required to log into the L2TP
server.
• Password: Enter the password that is required to log into the L2TP
server.
• L2TP Server IP Address: Enter the IP address of the L2TP server.
• Secret (Optional): L2TP incorporates a simple, optional, CHAP-like
tunnel authentication system during control connection establishment.
Enter the secret for tunnel authentication if necessary.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 57 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

• Connect Idle Time: Choose this option to let the security appliance
disconnect from the Internet after a specified period of inactivity (Idle
Time). This choice is recommended if your ISP fees are based on the
time that you spend online.
• Keep alive: Choose this option to keep the connection always on,
regardless of the level of activity. This choice is recommended if you
pay a flat fee for your Internet service.
• MTU: Choose Auto to use the default MTU size, or choose Manual
if you want to specify another size.
• MTU Value: If you choose Manual, enter the custom MTU size in
bytes.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 58 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

SELF CHECK 3.1-1

IDENTIFICATION

1. Connection type often used with cable modems. Choose this option if your ISP
dynamically assigns an IP address on connection.

2. Choose this option if the ISP provides you with a static (permanent) IP address
and does not assign it dynamically

3. Choose this option if your ISP provides you with client software, username, and
password.

4. Is typically used for VPN connection. Use the necessary information from your
ISP

5. Choose this option to keep the connection always on, regardless of the level of
activity. This choice is recommended if you pay a flat fee for your Internet
service.

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 59 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])


lOMoARcPSD|10856065

ANSWER KEY 3.1-1

1. DHCP Client
2. Static IP
3. PPPoE
4. PPTP
5. Keep Alive

Computer Systems Date Developed: Document No.:


Servicing NC II October 05, 2015
Developed by: Issued by:
Setting-up
Page 60 of 60
Computer Networks Revision No.:
REY G. SOMBRERO

Downloaded by Daniel Gamponia ([email protected])

You might also like