NOT
Technology and 10
Livelihood Education
Information and Communications
Technology
Computer Systems Servicing
Quarter 3 - Module 3
Set Network Configuration
Department of Education ● Republic of the Philippines
Computer Systems Servicing
1
Technology and Livelihood Education Grade 10
Information and Communications Technology - Computer Systems Servicing
Alternative Delivery Mode
Quarter 3 - Module 3: Network Configuration
First Edition, 2020
Republic Act 8293, section 176 states that: No copyright shall subsist in any work
of the Government of the Philippines. However, prior approval of the government agency or
office wherein the work is created shall be necessary for exploitation of such work for profit.
Such agency or office may, among other things, impose as a condition the payment of
royalty.
Borrowed materials (i.e., pictures, photos, brand names, trademarks, etc.) included in
this book are owned by their respective copyright holders. Every effort has been exerted to
locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Computer Systems Servicing
2
Lesson
1 NETWORK
What’s New
NETWORK
A network consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
There are two basic types of networks which includes the following:
Local Area Network (LAN)
Wide Area Network (WAN)
Local Area Network
A Local Area Network (LAN) is a network that is confined to a relatively small
area. It is generally limited to a geographic area such as a writing lab, school, or
building. Rarely are LAN computers more than a mile apart.
In a typical LAN configuration, one computer is designated as the file server. It
stores all of the software that controls the network, as well as the software that can
be shared by the computers attached to the network. Computers connected to the
file server are called workstations. The workstations can be less powerful than the
file server, and they may have additional software on their hard drives. On most
LANs, cables are used to connect the network interface cards in each computer.
Wide Area Network
Wide Area Networks (WANs) connect larger geographic areas, such as Florida,
the United States, or the world. Dedicated transoceanic cabling or satellite uplinks
may be used to connect this type of network.
Networking Devices
Consist of, but are not limited to non-local printers, workstations, servers,
webcams, data loggers, instruments, dial-in devices, and, in general anything that
requires an Ethernet connection. These devices are supported on a best-effort basis
limited by the staffing and equipment level available.
Hub is a small, simple, inexpensive device that joins
multiple computers together. Many network hubs
available today support the Ethernet standard. Other
Computer Systems Servicing
3
types including USB hubs also exist, but Ethernet is the type traditionally used in
home networking.
Ethernet switch is a device that gathers the
signals from devices that are connected to it, and
then regenerates a new copy of each signal.
Bridge is a device filters
data traffic at a network boundary. Bridges reduce the
amount of traffic on a LAN by dividing it into two
segments.
Routers are small physical devices that join multiple networks
together.
Network gateway is an internetworking system
capable of joining together two networks that use
different base protocols. A network gateway can be
implemented completely in software, completely in
hardware, or as a combination of both.
Modem is a contraction of the
terms modulator and demodulator. Modems perform a simple
function: They translate digital signals from a computer into
analog signals that can travel across conventional phone lines.
The modem modulates the signal at the sending end and
demodulates at the receiving end.
Network interface card is a device that connects a client
computer, server, printer or other component to your
network. Most often, a network interface consists of a small
electronic circuit board that is inserted into a slot inside a
computer or printer. Alternatively, some computers, printers,
or other services include network interfaces as part of their
main circuit boards (motherboards).
Network firewall protects a computer network from
unauthorized access. Network firewalls may be
hardware devices, software programs, or a
combination of the two. It guards an internal computer
Computer Systems Servicing
4
network (home, school, business intranet) against malicious access from the outside.
Network firewalls may also be configured to limit access to the outside from internal
users.
What I Have Learned
Direction: Identify what is being described in the following sentences and write your
answer on a separate sheet of paper.
1. It protects a computer network from unauthorized access.
2. Type of network that connect larger geographic areas, such as Florida, the
United States, or the world.
3. This is an internetworking system capable of joining together two networks
that use different base protocols.
4. It is consists of two or more computers that are linked in order to share
resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications.
5. They translate digital signals from a computer into analog signals that can
travel across conventional phone lines.
6. It is a device that connects a client computer, server, printer or other
component to your network.
7. A device filters data traffic at a network boundary.
8. It is a device that gathers the signals from devices that are connected to it,
and then regenerates a new copy of each signal.
9. It is a small, simple, inexpensive device that joins multiple computers
together.
10. Type of network that is confined to a relatively small area.
What’s More
Now, that you are done with the introduction of network as well as the
networking devices, to enlighten your understanding and knowledge have some
more readings about it thru books and other resources. You should consider the
following topics for research:
1. Different types of Network Topology
2. Common networking tools
After the research, you can also deepen your understanding by watching a
video presentation using the URL below:
Computer Systems Servicing
5
https://www.youtube.com/watch?v=YqRHaR-OQVQ
https://www.youtube.com/watch?v=4nPnQVaRj4k
After the video presentation here are your tasks:
1. List down all the network devices and their advantages cited in the
video.
2. List down the different network topologies and their differences.
Computer Systems Servicing
6
Lesson
2 IP Addressing
What Is It
IP Addressing
An IP address is a number that is used to identify a device on the network.
Each device on a network must have a unique IP address to communicate with other
network devices. Network devices are those that move data across the network,
including hubs, switches, and routers. On a LAN, each host (device that sends or
receives information on the network) and network device must have an IP address
within the same network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a label
or address for the person’s physical aspect—the body. A person’s mailing address,
on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Media Access Control (MAC) address is assigned to the
host Network Interface Card (NIC) and is known as the physical address. The
physical address remains the same regardless of where the host is placed on the
network in the same way that fingerprints remain with someone regardless of where
he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very
difficult for humans to read a binary IP address. For this reason, the 32 bits are
grouped into four 8-bit bytes called octets. An IP address, even in this grouped
format, is hard for humans to read, write, and remember. Therefore, each octet is
presented as its decimal value, separated by a decimal point or period. This format is
called dotted-decimal notation. When a host is configured with an IP address, it is
entered as a dotted-decimal number, such as 192.168.1.5.
Computer Systems Servicing
7
Table: Five Classes of IP Address
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address is the
network portion
255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion
Table: Default Subnet Masks for Usable IP Addresses:
Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are
reserved for research use only.
IpConfig
Ipconfig is a command used to find out the IP address of a certain network
you are connected to.
How to use the ipconfig command?
1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
Computer Systems Servicing
8
Figure: Command Prompt Window
3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be useful
because it shows the IP address, subnet mask and default gateway of a network you
are connected to.
Figure: IP Configuration in CMD Window
Assigning a Static IP Address
Computer Systems Servicing
9
In a home network with several computers and devices, it is ideal to assign
each of them a specific address. This is for the purpose of avoiding problems when
you do troubleshooting which requires figuring out the IP address of each of them. It
is also a means to prevent address conflicts between the devices. You can also
manage them with ease if you have assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base
computer system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).
Figure: Wireless Network Connections Properties Dialog Box
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog
box appears.
Figure: TCP / IPV4 Dialog
Box
6. Type the IP address for your computer. Enter the appropriate IP Address in the IP
address section.
7. Type a subnet mask. The value used on a local network is
commonly255.255.255.0, but it can be different, such as 255.255.255.127.
Computer Systems Servicing
10
8. Type the default gateway address. The default gateway is the router, so type
the router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.
Figure: Assigning an IP Address
9. Type the address for the preferred DNS server. The address should be obtained
from your Internet Service Protocol. It is used to help your computer find web
pages and other addresses on the internet.
10.Type the address for the alternate DNS server. The alternate Domain Name
System (DNS) server’s IP address is something that your ISP provides.
11.Click OK to confirm the settings.
12.Close all other open dialog boxes and windows.
Assigning a Dynamic IP Address
If more than a few computers comprise the LAN, manually configuring IP
addresses for every host on the network can be time-consuming and prone to errors.
In this case, using a Dynamic Host Configuration Protocol (DHCP) server would
automatically assign IP addresses and greatly simplify the addressing process.
Figure: Assigning a Dynamic IP Address
Dynamic Host Configuration Protocol (DHCP) is a software utility used to
dynamically assign IP addresses to network devices. This dynamic process
eliminates the need to manually assign IP addresses. A DHCP server can be set up
and the hosts can be configured to automatically obtain an IP address. When a
computer is set to obtain an IP address automatically, the other entire IP addressing
configuration boxes are dimmed or disabled. The server maintains a list of IP addresses to
assign, and it manages the process so that every device on the network receives a unique
Computer Systems Servicing
11
IP address. Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins the network.
These are the IP address information that a DHCP server can assign to hosts:
IP address
Subnet mask
Default gateway
Optional values, such as a Domain Name System (DNS) server address
The DHCP server receives a request from a host. The server then selects IP
address information from a set of predefined addresses that are stored in a
database. After the IP address information is selected, the DHCP server offers these
values to the requesting host on the network. If the host accepts the offer, the DHCP
server leases the IP address for a specific period of time.
Using a DHCP server simplifies the administration of a network because the
software keeps track of IP addresses. Automatically configuring TCP/IP also reduces
the possibility of assigning duplicate or invalid IP addresses. Before a computer on
the network can take advantage of the DHCP server services, the computer must be
able to identify the server on the local network. You can configure a computer to
accept an IP address from a DHCP server by clicking the Obtain an IP address
automatically option in the NIC configuration window, as shown in previous Figure.
If your computer cannot communicate with the DHCP server to obtain an IP
address, the Windows operating system automatically assigns a private IP address.
If your computer is assigned an IP address in the range of 169.254.0.0 to
169.254.255.255, it can communicate with only other computers in the same range.
An example of when these private addresses would be useful is in a classroom lab
where you want to prevent access outside to your network. This operating system
feature is called Automatic Private IP Addressing (APIPA). APIPA continually
requests an IP address from a DHCP server for your computer.
Ping
The ping is a Command Prompt command used to test the ability of the
source computer to reach a specified destination computer. The ping command is
usually used as a simple way to verify that a computer can communicate over the
network with another computer or network device.
The ping command operates by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination computer and waiting for a
response. How many of those responses are returned, and how long it takes for
them to return, are the two major pieces of information that the ping command
provides.
Table: Ping Command Syntax
Computer Systems Servicing
12
Using the ping Command
Ping is one of your most important tools in troubleshooting Internet problems. It
shows you whether the Domain Name Server is working, whether the computer you
Computer Systems Servicing
13
are trying to talk to is reachable, and how long it takes to get there. It does this at a
very low level — only the most basic Internet functions have to be up and running.
1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
3) Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.
Figure: Step 3
Figure: Pinging
This output shows several things:
Decoding names to network addresses — A domain name server
(DNS) resolves machine names to numeric addresses. A single machine
can have many names, all of which resolve to the same Internet address.
In the example just given, the name www.google.com resolves to the
Internet address 122.2.152.23.
Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client machine
sent out the ping message until a reply came back (1 ms is 1 millisecond,
or one thousandth of a second). The variability in the times you see
reflects that networks do not always respond identically. Differing amounts
Computer Systems Servicing
14
of traffic on the communication lines or differing loads on the server are
common causes. You will see very different response times depending on
the access equipment you use.
Routing hop count — The part of the replies that says TTL=50 tells you
about the route the message took from one point to another. The acronym
TTL stands for Time to Live, which is a measure of how many rerouting
from one point to another the packet has to go through before IP declares
it undeliverable. The number following TTL (called the hop count) is a
number that usually starts at 255 and counts down by one every time the
message gets rerouted through an intermediary computer.
What I Have Learned
I. Identifying IP Address Classes
Directions: In this worksheet, your teacher will write several IP addresses
with their appropriate subnet masks. You will copy the IP address and Subnet
Mask. You will write which IP Address Class is appropriate in the IP Address
Class column in the chart below. An example has been provided for you.
IP Address Subnet Mask IP Address Class
10.0.0.0 255.0.0.0 A
192.168.123.132 255.255.255.0
101.102.103.5 255.255.255.0
10.10.10.10 255.0.0.0
172.168.10.1 255.255.0.0
172.16.1.1 255.255.0.0
Be prepared to discuss the IP Address Class you select.
What’s More
To deepen your understanding with regard to the Internet Protocols, IP
Address and subneting, utilize the Internet and the website
www.professormesser.com, watch and learn from the video presentations. Use the
URLs below:
1.https://www.youtube.com/watch?v=5pXSh1lUCFs
2.https://www.youtube.com/watch?v=bkYT3BEumw8
Computer Systems Servicing
15
3. https://www.youtube.com/watch?v=jRi-qfqM7iA
4. https://www.youtube.com/watch?v=7t4CQdBhhMM
Reflection on the video presentations
Directions: Answer the essential questions below based on the video presentations
you had watched. Write your answer in a clean sheet of paper.
1. What are the procedures involved in calculating IP address and the
procedures in converting IP address to binary and vice versa?
________________________________________________________
________________________________________________________
________________________________________________________
2. What are the different IP Classes? Discuss each briefly and give examples.
________________________________________________________
________________________________________________________
________________________________________________________
3. What are the distinguished Internet Protocols? Describe each.
________________________________________________________
________________________________________________________
________________________________________________________
4. What are the necessary procedures in calculating subnet mask or simply
subnetting? Show an example solution for the calculation.
________________________________________________________
________________________________________________________
________________________________________________________
Computer Systems Servicing
16
What I Can Do
Configure an Ethernet NIC to use DHCP
Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address.
You need to follow the procedures given below and apply safety precautions in
accomplishing this task. While doing the activity, you have to answer activity
questions written after every step. Write your answer in a clean sheet of paper.
Your performance will be rated based on the performance rubrics.
Rubrics for Configuration
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
Linksys 300N router
A computer running Window XP Professional
Ethernet patch cable
Procedures:
Step 1
Computer Systems Servicing
17
Plug one end of the Ethernet patch cable into “Port 1” at the back of the
router.
Plug the other end of the Ethernet patch cable into the network port on the
NIC in your computer.
Plug in the power cable of the router if it is not already plugged in.
Turn on your computer and log on to Windows as an administrator.
Click Start.
Right-click My Network Places, and then choose Properties.
The “Network Connections” window appears.
Figure: My Network Places
Step 2
Right-click Local Area Connection, and then choose Properties.
The “Local Area Connection Properties” window appears.
Figure: Local Area Connection Properties
Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:”
field?
2. What are the items listed in the “This connection uses the following items:”
field?
Computer Systems Servicing
18
Step 3
Choose Internet Protocol (TCP/IP).
Click Properties.
The “Internet Protocol (TCP/IP) Properties” window appears.
Figure: Internet Protocol (TCP/IP) Properties
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the fields
of the “Use the following IP address:” area? Answers may vary. If the
computer is configured to obtain an IP address automatically, there will be no
information in the fields.
Click the Obtain an IP address automatically radio button.
Click OK. The “Internet Protocol (TCP/IP) Properties” window closes.
Figure: Local Area Connection Properties Window
Click OK.
Restart your computer.
Computer Systems Servicing
19
Step 4
Log on to Windows as an administrator.
Check the lights at the back of the NIC. These lights will blink when there is
network activity.
Choose Start > Run.
Type cmd and click OK.
Figure: Run Window
Type ipconfig/all, and then press the Enter key.
Figure: ipconfig all window
Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter Local Area
Network Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?
Computer Systems Servicing
20
What I Can Do
Task 2
Configure Wireless Router
Directions: Configure and test the wireless settings on the LinksysWRT300N.
Recommended Equipment
A computer with Windows XP Professional / Windows 7
A Wireless NIC installed
An Ethernet NIC installed
Linksys WRT300N Wireless Router
Ethernet patch cable
Step 1
Connect the computer to one of the Ethernet ports on the wireless router with
an Ethernet patch cable.
Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2
Choose start > Run, and type “cmd”. Press the Return key.
Type ipconfig.
What is the default gateway for the computer?
Step 3
Open your browser. Type “192.168.1.1” in the “Address” field, and then press
Return.
Figure: Browser Window
The “Connect to 192.168.1.1” window appears.
Figure: Connect to 192.168.1.1 Window
Type “admin” in the “Password” field.
The Setup screen appears.
Computer Systems Servicing
21
Step 4
Click the “Wireless” tab.
Choose “Mixed” in the “Network Mode” drop-down box.
Figure: Wireless Tab Window
Type “CHS#” in the “Network Name (SSID)” field, where # is the number
assigned by your instructor.
Click Save Settings.
The “Settings are successful” screen appears.
Figure: Settings are Successful Window
Click Continue, and then close the browser window.
Step 4
Unplug the Ethernet patch cable from the rear of the computer.
Choose Start, and then right-click My Network Places. Choose Properties.
Double-click the wireless adapter, and then select View Wireless Networks.
Computer Systems Servicing
22
Choose CHS, and then click the Connect button.
Open Internet Explorer, and then connect to the wireless router.
Log in to the wireless router.
Close Internet Explorer.
References
Rosalie P. Lujero, Ronaldo V. Ramilo. “Technology and Livelihood Education-
Information and Communications Technology Learners Manual - Computer
Hardware Servicing Grade 9”.
Rosalie P. Lujero. “Technology and Livelihood Education - Information and
Communications Technology Learners Manual - Computer Hardware
Servicing Grade 10”.
https://www.youtube.com/channel/UCkefXKtInZ9PLsoGRtml2FQ
Prepared by:
JERICA D. SIMBOL
Teacher III
Reviewed by: Approved by:
JOSELITO C. IBAÑEZ EPIFANIA B.
DUNGCA, EdD
Head Teacher VI Principal IV
TLE Department Tarlac National High School
Computer Systems Servicing
23
Computer Systems Servicing
24