WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
COMPETENCY-BASED LEARNING MATERIAL
Sector : ELECTRONICS
Qualification Title : COMPUTER HARDWARE SERVICING NC II
Unit of Competency : SET-UP COMPUTER NETWORK
Module Title : SETTING-UP COMPUTER NETWORK
WEST PRIME HORIZON INSTITUTE, INC
V. SagunCor. M. Roxas, San Francisco District,
Pagadian city
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 1
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL
Welcome to the Module “SET-UP COMPUTER NETWORKS”. This module
contains training materials and activities for you to complete.
The unit of competency “SETTING-UP COMPUTER NETWORKS” contains
knowledge, skills and attitudes required for a Computer System Servicing NC II course.
You are required to go through a series of learning activities in order to complete
each of the learning outcomes of the module. In each learning outcome there are
Information Sheets, Task Sheets, and Job Sheets. Follow these activities on your own and
answer the Self-Check at the end of each learning activity.
If you have questions, don’t hesitate to ask your Trainer for assistance.
Recognition of Prior Learning (RPL)
You may already have some of the knowledge and skills covered in this module
because you have:
● Been working for some time
● Already have already completed training in this area.
If you can demonstrate to your Trainer that you are competent in a particular skill
or skills, talk to him/her about having them formally recognized so you don’t have to do
the same training again. If you have a qualification or Certificate of Competency from
previous training, show it to your teacher. If the skills you acquired are still current and
relevant to this module, they may become part of the evidence you can present for RPL.
If you are not sure about the currency of your skills, discuss it with your Trainer.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 2
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
After completing this module ask your Trainer to assess your competency. Result
of your assessment will be recorded in your competency profile. All the learning activities
are designed for you to complete at your own pace. Inside this module you will find the
activities for you to complete followed by relevant information sheets for each learning
outcome. Each learning outcome may have more than one learning activity.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 3
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
COMPETENCY-BASED LEARNING MATERIAL
List of Core Competencies
No. Unit of Competency Module Title Code
1 Install and configure Installing and configuring ELC724331
computer systems computer systems
2 Set-Up Computer Networks Setting-up Computer ELC724332
Networks
3 Set-up Computer Servers Setting up Computer ELC724333
Servers
4 Maintain and Repair Maintaining and Repairing ELC724334
Computer Systems and Computer Networks
Networks
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 4
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
TABLE OF CONTENTS
HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL…………………… 2
LIST OF COMPETENCIES…………………………………………….………………………………..4
TABLE OF CONTENTS…………………………………………………………………………………. 5
MODULE CONTENT……………………………………………………………………………
LEARNING EXPERIENCES…………………………………………………………………………………
INFORMATION SHEET………………………………………………………………………………………..
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 5
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
MODULE CONTENT
Program/Course : COMPUTER SYSTEM SERVICING NC II
Unit of Competency : SET-UP COMPUTER NETWORKS
Module : SETTING-UP COMPUTER NETWORKS
INTRODUCTION:
This module contains information and suggested learning activities on Computer
System Servicing NCII. It includes activities and materials on Setting up Computer
Network.
Completion of this module will help you better understand the succeeding module
on the SETTING-UP COMPUTER SERVERS.
This module consists of 4 learning outcomes. Each learning outcome contains
learning activities supported by each instruction sheet. Before you perform the
instructions, read the information sheets and answer the self-check and activities
provided to ascertain to yourself and your trainer that you have acquired the knowledge
necessary to perform the skill portion of the particular learning outcome.
Upon completion of this module, report to your trainer for assessment to check
your achievement of knowledge and skills requirement of this module. If you pass the
assessment, you will be given a certificate of completion.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 6
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
SUMMARY OF LEARNING OUTCOMES:
Upon completion of the module you should be able to:
LO1. INSTALL NETWORK CABLES
LO2. SET NETWORK CONFIGURATION
LO3. SET ROUTER/WI-FI/ WIRELESS ACCESS POINT/REPEATER CONFIGURATION
LO4. INSPECT AND TEST THE CONFIGURED COMPUTER NETWORKS
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 7
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
LEARNING EXPERIENCE
LO1. INSTALL NETWORK CABLES
Learning Activities Special Instructions
● Read Information Sheets 2.1-1
“Network Concepts” In these Learning outcomes you should
● Trainer to Discuss Network be able to understand, explain, and apply
Concepts using ppt. Install Network Cables.
● Answer Self-Check CO2.1-1
“Network Concepts” Go Through Information Sheets and
● Compare your answer in Answer Key answer self-checks to ensure that
CO2.1-1 “Network Concepts” knowledge of standards in install
● Read Information Sheets CO2.1-2 network cables is acquired.
“Network Topology”
● Trainer to Discuss Network Topology
using ppt. The output of this Learning Outcome is
● Answer Self-Check CO2.1-2 the following.
“Network Topology”
● Compare your answer in Answer Key ● Learn the Network Concepts
CO2.1-2 “Network Topology” ● Have Knowledge About Different
● Read Information Sheets CO 2.1-3 ○ Network Topologies
“Network OHS & 5s Principles” ● Perform Cabling Splicing & Testing
● Trainer to Discuss Network Topology maintenance.
using ppt. ● Perform Cable Installation
● Answer Self-Check CO2.1-3 ● Do Waste Management
“Network OHS & 5s Principles”
● Compare your answer in Answer Key Show your output to your trainer for his
CO.1-3 “Network OHS & 5s feedback as you accomplish them.
Principles”
● Read Information Sheets CO2.1-4
“Network Tools, Materials & Testing
Devices”
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 8
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● Trainer to Discuss Network Tools,
Materials & Testing Devices using
ppt.
● Answer Self-Check CO2.1-4 in
“Network Tools, Materials & Testing
Devices”
● Compare your answer in Answer Key
● CO2.1-4 “Network Tools, Materials &
Testing Devices”
● Read Information Sheets CO2.1-5
“Network cable installation and
testing.”
● Trainer to Discuss Network cable
installation and testing using ppt.
● Perform Task-Sheet CO2.1-5 in
“Network cable installation and
testing”
● Check Performance Criteria
Checklist CO2.1-5a “Network cable
installation and testing”
● Perform Job-Sheet CO2.1-5 in
“Network cable installation and
testing”
● Check Performance Criteria
Checklist
● CO2.1-5b “Network cable installation
and testing”
● Read Information Sheets CO2.1-6
“Waste Management”
● Trainer to Discuss Waste
Management using ppt.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 9
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● Answer Self-Check CO2.1-6
“Network Concepts”
● Compare your answer in Answer Key
CO2.1-6 “Waste Management”
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 10
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
INFORMATION SHEET 2.1-1
NETWORK CONCEPTS
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Have knowledge about network concepts
2. Identify the different components of network
3. Identify the different types of network
Before installing network cable you should have knowledge about the Networking
Concepts.
What is a Computer Network?
● Two or more computers connected together through a communication media
form a computer network.
● The computers are connected in a network to exchange information and data. The
computers connected in a network can also use resources of other computers.
Computer Network Components
There are different components of a network. Following are the basic components
of the network.
1. Server - Powerful computers that provides services to the other computers on the
network
2. Client - Computer that uses the services that a server provides the client is less
powerful than server
3. Media - A physical connection between the devices on a network
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 11
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
4. Network Adapter - Network adapter or network interface card (NIC) is a circuit
board with the components necessary for sending and receiving data. It is plugged
into one of the available slots on the Pc and transmission cable is attached to the
connector on the NIC.
5. Resources - Anything available to a client on the network is considered a resource
printers, data, fax devices and other network devices and information are
resources.
6. User - Any person that uses a client to access resources on the network
7. Protocols - These are written rules used for communications. They are the
languages that computers use to talk to each other on a network
Different Types of Computer Network
● Local Area Network (LAN) - Supplies networking capability to a group of
computers in close proximity to each other such as in an office building, a school,
or a home. A LAN is useful for sharing resources like files, printers, games or other
applications.
● Metropolitan Area Network (MAN) - Is a computer network that usually spans a
city or a large campus, A MAN usually interconnects a number of (LANs) using a
high-capacity backbone technology, such as fiber-optical links.
● Wide Area Network (WAN) - Is a network that covers a broad area (i.e., any
telecommunications network that links across metropolitan, regional, or national
boundaries) using private or public network transports, Business and government
entities utilize WANs to relay data among employees, clients, buyers, and
suppliers from various geographical locations. In essence, this mode of
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 12
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
telecommunication allows a business to effectively carry out its daily
function regardless of location. The Internet can be considered a WAN as well, and
is used by businesses, governments, organizations, and individuals for almost any
purpose imaginable.
● Storage Area Network (SAN) - Is a high-speed sub network of shared storage
devices, A storage device is a machine that contains nothing but a disk or disks for
storing data.
● Virtual Private Network (VPN) - Technology included in Windows Server 2003
helps enable cost-effective, secure remote access to private networks. VPN
allows administrators to take advantage of the Internet to help provide the
functionality and security of private WAN connections at a lower cost. In Windows
Server 2003, VPN is enabled using the Routing and Remote Access service. VPN
is part of a comprehensive network access solution that includes support for
authentication and authorization services, and advanced network security
technologies.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 13
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Self-check 2.1-1
Multiple Choices:
1. Two or more computers connected together through a communication media?
a. Computer
b. Computer Network
c. Network
d. All of the Above
2. Powerful computers that provide services to the other computers on the
network?
a. Network Adapter
b. Client
c. Server
d. Media
3. Computer that uses the services that a server provides?
a. a.) Client
b. Media
c. Server
d. Network Adapter
4. A physical connection between the devices on a network?
a. Client
b. Media
c. Server
d. Network Adapter
5. Any person that uses a client to access resources on the network?
a. Client
a. User
b. Server
c. Media
6. Supplies networking capability to a group of computers in close proximity to each
other such as in an office building, a school, or a home?
a. Local Area Network
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 14
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
b. Metropolitan Area Network
c. Wide Area Network
d. Storage Area Network
7. Is a computer network that usually spans a city or a large campus?
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Virtual Private Network
8. Is it a network that covers a broad area?
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Storage Area Network
9. Is a machine that contains nothing but a disk or disks for storing data?
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Storage Area Network
10. 10.Allows administrators to take advantage of the Internet to help provide the
functionality and security of private WAN connections at a lower cost.
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Virtual Private Network
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 15
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Answer key 2.1-1
1. B
2. C
3. A
4. B
5. B
6. A
7. B
8. C
9. D
10. D
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 16
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheets CO2.1-2
“Network Topology”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Different Network Topology
2. Draw Network Topology
Network topology is the diagram that you will follow in installing network cables.
What is Network Topology?
- Physical and logical network layout of computer Network.
Physical – actual layout of the computer cables and other network devices.
Logical – the way in which the network appears to the devices that use it.
COMMON TOPOLOGIES:
● BUS TOPOLOGY
- Uses a trunk or backbone to which all of the computers on the network
connect.
- Systems connect to this backbone using T connectors or taps
- Coaxial cablings (10Base-2, 10Base5) were popular options years ago.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 17
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
BUS TOPOLOGY
Advantages Disadvantages
Cheap and easy to implement Network disruption when computers are
added or removed
Require less cable A break in the cable will prevent all
Systems from accessing the network.
Does not use any specialized network Difficult to Troubleshoot
to troubleshoot.
RING TOPOLOGY
1. Logical ring
- Meaning that data travels in circular fashion from one computer to another on
the network.
- Typically FDDI, SONET or Token Ring technology are used to implement a ring
network
- Ring networks are most commonly wired in a star configuration
2. Token Ring
- Has multi-station access unit (MSAU), equivalent to hub or switch.
- MSAU performs the token circulation internally.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 18
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
RING TOPOLOGY
Advantages Disadvantages
Cable faults are easily located, making Expansion to the network can cause
troubleshooting easier network disruption
Ring networks are moderately easy to install A single break in the cable can
disrupt the entire network.
STAR TOPOLOGY
- All computers/devices connect to a central
device called hub or switch.
- Each device requires a single cable point-
to- point connection between the device
and hub.
- Most widely implemented
- Hub is the single point of failure
STAR TOPOLOGY
Advantages Disadvantages
Easily expanded without disruption Requires more cable to the network
Cable failure affects only a single User A central connecting device allows for a
single point of failure
Easy to troubleshoot and isolate to problems More difficult to implement
MESH TOPOLOGY
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 19
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
- Each computer connects to every other.
- High level of redundancy.
- Rarely used.
- Wiring is very complicated
- Cabling cost is high
- Troubleshooting a failed cable is tricky A variation hybrid mesh – create point to
point connection between specific network devices, often seen in WAN
implementation.
MESH TOPOLOGY
Advantages Disadvantages
Requires more cable than the other
Provides redundant paths between devices
LAN topologies
The network can be expanded without Can be expanded implementation
disruption to current uses
WIRELESS NETWORKING
- Do not require physical cabling
- Particularly useful for remote access for laptop users
- Eliminate cable faults and cable breaks.
- Signal interference and security issue.
MESH TOPOLOGY
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 20
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Advantages Disadvantages
Allows for wireless remote access Potential security issues associated
with wireless transmissions
Network can be expanded without disruption to Limited speed in comparison to other
current users network topologies
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 21
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Self-check 2.1-2
Multiple Choices:
1. Physical and logical network layout?
a. Layout
b. Drawing
c. Topology
d. All of the Above
2. Actual layout of the computer cables and other network devices?
a. Drawing
A. Topology
B. Physical Layout
C. Logical Layout
3. The way in which the network appears to the devices that use it?
a. Drawing
b. Topology
c. Physical Layout
d. Logical Layout
4. Uses a trunk or backbone to which all of the computers on the network connect?
a. Bus Topology
b. Star Topology
c. Ring Topology
d. Mesh Topology
4. Meaning that data travels in circular fashion from one computer to another on
the network?
a. Logical Ring
b. Token Ring
c. Ring Topology
d. Mesh Topology
5. Has multi-station access unit (MSAU), equivalent to hub or switch. MSAU
performs the token circulation internally?
a.) Logical Ring
b.) Token Ring
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 22
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
c.) Ring Topology
d.) Mesh Topology
6. Each computer connects to every other?
a.) Bus Topology
b.) Star Topology
c.) Ring Topology
d.) Mesh Topology
7. Do not require physical cabling
a.) Bus Topology
b.) Star Topology
c.) Ring Topology
d.) Wireless Networking
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 23
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Answer key 2.1-1
1. C
2. C
3. D
4. A
5. A
6. B
7. D
8. D
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 24
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheets CO2.1-3
“Network OHS & 5s Principles”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the Network Occupation Health and Safety
2. Learn the Network 5s Principles
Before installing network cables we must practice Network OHS & 5s Principles
to ensure our safety during the training.
OHS Policies and Procedures
Occupational health and safety (OHS) refers to the legislation, policies, procedures
and activities that aim to protect the health, safety and welfare of all people at the
workplace.
Every worker has a right to healthy and safe work and to a work environment that
enables them to live a socially and economically productive life. Safety practices should
be learned early and always adhered to when working with any electrical device including
personal computers and peripherals.
Personal safety while working with PC’s
Here are some safety precautions to take before working with any computer devices:
● Before doing anything, listen to your trainer’s instructions to prevent accidents or
any unwanted events that may occur in your workplace.
● Be sure not to mix electronic components and water.
● Avoid playing or running while inside the room.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 25
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● Always wear personal protective equipment (PPE) like coverall, shoes with rubber
sole, anti-static wrist strap, etc.
● Ask for assistance from your trainer when it comes to dealing with tools &
equipment.
● Applying safety measures when handling tools and equipment are necessary to
avoid certain damages.
● Be sure to use the tools and equipment properly to avoid accidents.
Manufacturing companies are all familiar with the 5S methodology to organize the
workspace for efficiency and effectiveness. 5S is the name of a workplace organization
method that uses a list of five Japanese words: seiri, seiton, seiso, seiketsu, and
shitsuke. Amazingly, transliterated or translated into English, they all start
with the letter S: sort, set, shine, standardize, sustain. (Credit goes to Hiroyuki
Hirano and his overall approach to production systems)
The obvious benefit of 5S methodology is improved productivity. This
methodology can be applied to any workplace – and for our purpose we can discuss it to
improve your Computer Network environment. Organizing the hardware and software
used in your environment, identifying and running the items used, maintaining the
equipment, and sustaining the new order through standardization, which builds
understanding among employees of how they should best utilize the computer network
– including hardware, software and business applications in the cloud – to be most
productive at work. Let’s review.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 26
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
1. Sort
Sorting helps you to use a red tag method that will get rid of all the different
processes or items that you don’t need. Throughout the years, your organization may
have acquired software and hardware that may be either used partially, or not used at all.
I bet you have some old boxes and bundles of cables and trinkets that you don’t know
what to do with. Some of them you probably don’t even know what they are for! This is
also a good time to do an inventory of your software, to make sure that all of your copies
are licensed and up-to-date. Perhaps you can donate your old or unused computers, or
discard old and broken gadgets and network-related equipment. Don’t forget to comply
with your local laws about e- waste! Check these resources for more on e-cycling and
electronic waste:
● EcoSquid is a web search platform that helps consumers identify the best options
to resell, recycle, or donate new and used electronics.
● Earth 911 has taken environmental hotlines, web sites and other information
sources nationwide, and consolidated them into one network where you can find
community-specific information on e-Cycling and much more.
● Electronic Industries Alliance’s Consumer Education Initiative helps you find
reuse, recycling and donation programs for electronics products in your state;
here is the link to their page specific to e-Cycling in New Jersey)
● TechSoup provides resources for those who would like to donate hardware, those
who would like to acquire recycled hardware, and refurbishes.
Evaluate your legacy systems to have full understanding of what is going to go
now. Take steps to remove these items from your location. Sorting will declutter
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 27
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
and free up space that your organization will need to move on to the next step –
Set.
2. Set - Now that you have a better understanding of what you have, and what you
need – and let’s not forget some free space, you can move on to the next aspect of 5 S
method: set everything in order. During this step you will make sure to lay out your
computer network in the most efficient way, and make sure that your employees have a
proper workplace that allows them to be productive within your network: make sure that
if new equipment, software or license is required, it is acquired. Don’t be an
unintentional software pirate! Make sure that your offices are properly wired, and your
necessary items such as printers, scanners, etc. at a reachable distance and can be easily
accessed. So, set things in order – and then shine!
3. Shine - Once you have the workplace sorted and set, it’s time to put some shine
on. What are you doing to make sure your network is neat and clean? The third step,
shine, is crucial to the 5 S methods. Teach your workforce the importance of maintaining
and cleaning the equipment and data for a great impact on the way your business
operates. Shine also helps the equipment to last longer as you aren’t neglecting it and
allowing it to get cluttered or dusty. In addition to prolonging the lifespan of your
equipment, keeping things right is also healthy for your employees. This page from OSHA
– Ergonomic Solutions for Occupational Safety is a great resource for
recommended workspace standards. Any environment can benefit from equipment
that is ergonomic – there is plethora of items such as monitors, keyboards, mice, office
chairs, etc. that are designed to keep your employees comfortable while on the job. When
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 28
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
they perform their jobs better, your business is doing better. To propel your success even
further, move on to the next step – standardize.
4. Standardize - One of the most important things you can do for your business is to
standardize the equipment and processes within your computer network. New
procedures, once vetted, should be properly documented and made standard. It will
ensure that large orders and other processes would flow easily, especially if you are
looking to expand your business. When you have your equipment documented, and when
procedures become part of the employee manual, your organization will benefit from
improved operations. You can easily use standard procedures for cross-training of your
employees, or bringing new hires on board. In addition, many platforms and solutions
now come with options to migrate data one to another, and having a standardized setup
makes things like data migrations, equipment and software updates a breeze.
With standards in mind keep an eye on the new trend – Bring Your Own Device (BYOD).
Users are shifting away from corporate issued devices, such as Blackberry smart phones,
to devices they feel more comfortable with, such as iOS or Android based platforms. If
not all of your equipment is standard, processes still should be. Keep computer network
security and efficiency in mind when considering BYOD for your organization.
5. Sustain - Your final step, sustain, is the hardest – not falling back into old habits is
not easy. It is even more difficult if you don’t have a full-time IT staff on board to perform
tech support and maintenance. Left unmonitored, your data, your network and computer
equipment and devices may get compromised and bring you to a gradual decline back to
the old ways. It may affect your business directly by having your business data and
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 29
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
environment vulnerable. It will leave employees idle and impact your ability to do
business, costing you even more through the loss of productivity, revenue, or reputation.
Managed Services allows you to maintain and review standards through practice of
outsourcing day-to-day IT management and Computer Network Tech Support as a cost-
effective method for improving business operations. Boost performance, tighten
security, and extend the life of your IT assets. Many IT companies provide Managed
services. If your business is in New Jersey or New York, give us a call at 201-493-1414 to
discuss the benefits of Managed IT Services for your business.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 30
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Self-check 2.1-3
Write T if the answer is True and write F if the answer is False.
1. After doing anything, listen to your trainer’s instructions to prevent accidents or
any unwanted events that may occur in your workplace.
2. Be sure to mix electronic components and water.
3. Avoid playing or running while inside the room.
4. Always wear personal protective equipment (PPE) like coverall, shoes with rubber
sole, anti-static wrist strap, etc.
5. Ask for assistance from your trainer when it comes to dealing with tools &
equipment.
6. Applying safety measures when handling tools and equipment are necessary to
avoid certain damages.
7. Be sure to use the tools and equipment properly to avoid accidents.
Enumerate Network Cabling 5s.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 31
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Answer-key 2.1-3
TRUE OR FALSE
1. F
2. F
3. T
4. T
5. T
6. T
7. T
ENUMERATION
1. Sort
2. Set
3. Shine
4. Standardize
5. Sustain
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 32
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheets 2.1-4
“Network Tools, Equipment, Materials & Testing Devices”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn Different Networking tools, materials & testing devices.
2. Familiarize Different Networking tools, equipment, materials & testing devices.
Before installing network cables we must know the different Networking tools, materials,
equipment & testing devices that we will use during the training.
Network Tools
●Crimping tool
A crimping tool is a tool designed to crimp or
connect a connector to the end of a cable. For
example, network cables and phone cables are
created using a crimping tool to connect the RJ-45
and RJ-11 connectors to the end of the cable. In the
example picture below, this crimper is capable of
crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors and also includes a wire
cutter near the handles that can be used to cut phone or CAT5 cable.
● Wire stripper - A tool designed to remove the
protective covering off of a cable to expose the
inner wires. Because different wires come in
different shapes, there are dozens of different wire
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 33
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
strippers available. The picture shows an example of a wire stripper, which strips a
cable by placing the cable in-between the blade and one of the ridges and then
spun around the cable until the jacket can be pulled off.
● Electric Hand Drill with Drill bit - Is a tool
fitted with a cutting tool attachment or
driving tool attachment, usually a drill bit or
driver bit, used for boring holes in various
materials or fastening various materials
together with the use of fasteners. The
attachment is gripped by a chuck at one
end of the drill and rotated while pressed against the target material. The tip, and
sometimes edges, of the cutting tool does the work of cutting into the target
material. This may be slicing off thin shavings (twist drills or auger bits), grinding
off small particles (oil drilling), crushing and removing pieces of the workpiece
(SDS masonry drill), countersinking, counter boring, or other operations.
Drills are commonly used in woodworking, metalworking, construction and do-it-
yourself projects. Specially designed drills are also used in medicine, space
missions and other applications. Drills are available with a wide variety of
performance characteristics, such as power and capacity.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 34
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Network Equipments
● Patch panel - A patch panel, patch
bay, patch field or jack field is a
device or unit featuring a number of
jacks, usually of the same or similar
type, for the use of connecting
and routing circuits for
monitoring, interconnecting, and testing circuits in a convenient,
flexible manner. Patch panels are commonly used in computer
networking, recording studios, and radio and television.
● Network Hub - When referring to a
network, a hub is the most basic
networking device that
connects multiple computers or other
network devices together. Unlike a
network switch or router, a network hub has no routing tables or
intelligence on where to send information and broadcasts all network
data across each connection. Most hubs can detect basic network errors
such as collisions, but having all information broadcast to multiple ports
can be a security risk and cause bottlenecks. In the past network hubs
were popular because they were much cheaper than a switch and router,
but today most switches do not cost much more than a hub and are a
much better solution for any network.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 35
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
In general, a hub refers to a hardware device that enables multiple
devices or connections to be connected to a computer. Another
example besides the one given above is a USB hub, which allows dozens
of to be connected to one computer, even though that computer may
only have a few USB connections. The picture is an example of a USB
hub.
● Network Switch - A network switch
(also called switching hub, bridging hub,
officially MAC Bridge) is a computer
networking device that connects
devices together on a computer
network, by using packet switching to
receive, process and forward data to the destination device. Unlike less
advanced network hubs, a network switch forwards data only to one or
multiple devices that need to receive it, rather than broadcasting the
same data out of each of its ports.
● Managed switches - Give you more
control over your LAN traffic and offer
advanced features to control that
traffic. An unmanaged switch simply allows Ethernet devices to
communicate with one another, such as a PC or network printer, and
those are typically what we call “plug and play.”
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 36
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● Network Controller/Network Interface
Card - A network interface controller (NIC,
also known as a network interface
card, network adapter, LAN adapter or
physical network interface and by similar
terms) is a computer hardware
component that connects a computer to a computer network.
- Early network interface controllers were commonly
implemented on expansion cards that plugged into a computer bus.
The low cost and ubiquity of the Ethernet standard means that most
newer computers have a network interface built into the
motherboard.
- Modern network interface controllers offer advanced features such
as interrupt and DMA interfaces to the host processors, support for
multiple receive and transmit queues, partitioning into multiple
logical interfaces, and on-controller network traffic processing such
as the TCP offload engine.
● Wireless Router - A wireless router is a device that performs the
functions of a router and also includes the functions of a wireless
access point. It is used to provide access to the
Internet or a private computer network. It can function in a wired LAN
(local area network), in a wireless- only LAN (WLAN), or in a mixed
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 37
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
wired/wireless network, depending on the
manufacturer and model.
● Wireless Access point - In computer networking,
a wireless access point(AP) is a device that allows
wireless devices to connect to a wired network
using Wi-Fi, or related standards. The AP usually
connects to a router (via a wired network) as a standalone device, but it
can also be an integral component of the router itself.
● Printer - In computing, a printer is a
peripheral which makes a persistent
human readable representation of
graphics or text on paper or similar
physical media. The two most common
printer mechanisms are black and
white laser printers used for common documents, and color inkjet
printers which can produce high quality photograph quality output.
● Cable Tester/Network Tester - A cable tester is a device that is used to test the
strength and connectivity of a particular type of cable or other wired assemblies.
There are a number of different types of cable testers, each able to test a specific
type of cable or wire (some may be able to test different types of cables or wires).
The cable tester can test whether a cable or wire is set up properly, connected to
the appropriate source points, and if the communication strength between the
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 38
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
source and destination is strong enough to serve its
intended purpose. The picture is an example of a
cable tester from TRENDnet.
Network Materials
● RJ 45 - Short for Registered Jack-45, an eight-wire
connector used commonly to connect computers onto local-
area networks (LAN), especially Ethernets. RJ-45
connectors look similar to the ubiquitous RJ-11 connectors
used for connecting telephone equipment, but they are
somewhat wider.
● Modular Box - Use to in a large building, usually place on the wall to connect
telephone lines or network cable easily.
● Raceway - A raceway (sometimes referred to as a raceway
system) is an enclosed conduit that forms a physical
pathway for electrical wiring. Raceways protect wires and
cables from heat, humidity, corrosion, water intrusion and
general physical threats.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 39
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● UTP Cable - Unshielded Twisted Pair cable is most
certainly by far the most popular cable around the world.
UTP cable is used not only for networking but also for the
traditional telephone.
● Fiber Optic Cable - An optical fiber cable is a cable containing one or more
optical fibers that are used to carry light. The optical
fiber elements are typically individually coated with
plastic layers and contained in a protective tube
suitable for the environment where the cable will be
deployed. Different types of cable are used for
different applications, for example long distance telecommunication, or
providing a high- speed data connection between different parts of a building.
Network Personal Protective Equipment
● Protective eyewear - is protective gear for the eyes,
which comes in many types depending upon the threat that is to
be reduced. The threats can be particles, light, wind blast, heat,
sea spray or some type of ball or puck used in sports.
● Gloves - A glove (Middle English from Old English glof) is a garment covering
the whole hand. Gloves have separate sheaths or openings for each finger and the
thumb; if there is an opening but no covering sheath for each finger they are called
"fingerless gloves". Fingerless gloves have one large opening rather than individual
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 40
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
openings for each finger are sometimes called gauntlets.
Gloves which cover the entire hand or fist but do not have
separate finger openings or sheaths are called mittens. Mittens
are warmer than gloves made of the same material because
fingers maintain their warmth better when they are in
contact with each other. Reduced surface area reduces heat loss.
● Working clothes - is clothing worn for work, especially work
that involves manual labour. Often those employed within trade
industries elect to be outfitted in workwear because it is built to
provide durability and safety.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 41
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Self-Check 2.1-4
Identification:
1. Is a tool designed to crimp or connect a connector to the end of a cable?
2. A tool designed to remove the protective covering off of a cable to expose the
inner wires.
3. Is a device or unit featuring a number of jacks, usually of the same or similar type,
for the use of connecting and routing circuits for monitoring, interconnecting, and
testing circuits in a convenient, flexible manner?
4. Is a computer networking device that connects devices together on a computer
network, by using packet switching to receive, process and forward data to the
destination device.
5. It is used to provide access to the Internet or a private computer network.
6. Is a device that is used to test the strength and connectivity of a particular type
of cable or other wired assemblies.
7. Is an eight-wire connector used commonly to connect computers onto local-area
networks (LAN), especially Ethernets.
8. Is an enclosed conduit that forms a physical pathway for electrical wiring.
9. Is used not only for networking but also for the traditional telephone.
10. Is protective gear for the eyes, which comes in many types depending upon
the threat that is to be reduced.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 42
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Answer-Key 2.1-4
1. Crimping Tool
2. Wire Stripper
3. Patch Panel
4. Network Switch
5. Wireless Router
6. Lan/Cable Tester
7. Raceways
8. RJ 45
9. UTP Cable
10. Protective Eye wear/Goggles
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 43
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheets 2.1-5
“Network cable installation and testing.”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Familiarize the different Types of UTP Cable and their uses.
2. Learn the proper ways in splicing cable.
3. Learn how to install cables properly.
4. Install Patch Panel Cable
5. Install Modular Box
6. Install Network Equipment
7. Test Network Installation
Installing cable is one of the most critical part of this module because this can
affect other module so it should be done properly to avoid problems during configuration
of the network.
● Network Cables - Networking cables are used to connect one network device to
other network devices or to connect two or more computers to share printer,
scanner etc. Different types of network cables like Coaxial cable, Optical fiber
cable, Twisted Pair cables are used depending on the network's
topology, protocol and size. The devices can be separated by a few meters (e.g. via
Ethernet) or nearly unlimited distances (e.g. via the interconnections of the
Internet).
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 44
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● Unshielded Twisted Pair - Unshielded Twisted Pair cable is most certainly by far
the most popular cable around the world. UTP cable is used not only for
networking but also for the traditional telephone.
UTP Cable Categories
● CAT1
- Data rate up to 1Mbps
- Traditional Telephone & ISDN – Modem
● CAT2
- Data rate up to 4Mbps
- Token Ring
● CAT3
- Data rate up to 10Mbps
- Token Ring & 10Base-T
● CAT4
- Data rate up to 16Mbps
- Token Ring
● CAT5
- Data rate up to 100Mbps
- Ethernet (10Mbps)
- Fast Ethernet (100Mbps) & Token Ring (16Mbps)
● CAT5e
- Data rate up to 1000Mbps
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 45
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
- Gigabit Ethernet
● CAT6
- Data rate up to 1000Mbps
- Gigabit Ethernet
Ethernet Cable Standard Color Coding
● - The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the
TIA/EIA 568-B standard in 2002 and has been updated since. Both standards
define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable
and RJ-45 connectors for Ethernet connectivity. The standards and pin-out
specification appear to be related and interchangeable, but are not the same and
should not be used interchangeably.
● Both the T-568A and the T-568B standard Straight-Through cables are used
most often as patch cords for your Ethernet connections. If you require a cable to
connect two Ethernet devices directly together without a hub or when you
connect two hubs together, you will need to use a Crossover cable instead.
● A good way of remembering how to wire a Crossover Ethernet cable is to wire
one end using the T-568A standard and the other end using the T- 568B
standard. Another way of remembering the color coding is to simply switch the
Green set of wires in place with the Orange set of wires. Specifically, switch the
solid Green (G) with the solid Orange, and switch the green/white with the
orange/white.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 46
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
T-568A Straight-Through Ethernet Cable
T-568B Straight-Through Ethernet Cable
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 47
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Ethernet Cable Instructions:
● Pull the cable off the reel to the desired length and cut. If you are pulling cables
through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The
total length of wire segments between a PC and a hub or between two PC’s
cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for
10BASE-T.
● Start on one end and strip the cable jacket off (about 1″) using a stripper or a knife.
Be extra careful not to nick the wires, otherwise you will need to start over.
● Spread, untwist the pairs, and arrange the wires in the order of the desired cable
end. Flatten the end between your thumb and forefinger. Trim the ends of the
wires so they are even with one another, leaving only 1/2″ in wire length. If it is
longer than 1/2″ it will be out-of-spec and susceptible to crosstalk. Flatten and
insure there are no spaces between wires.
● Hold the RJ-45 plug with the clip facing down or away from you. Push the wires
firmly into the plug. Inspect each wire is flat even at the front of the plug. Check
the order of the wires. Double check again. Check that the jacket is fitted right
against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45
with the crimper.
● Check the color orientation, check that the crimped connection is not about to
come apart, and check to see if the wires are flat against the front of the plug. If
even one of these are incorrect, you will have to start over. Test the Ethernet
cable.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 48
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Ethernet Cable Tips:
● A straight-thru cable has identical ends.
● A crossover cable has different ends.
● A straight-thru is used as a patch cord in Ethernet connections.
● A crossover is used to connect two Ethernet devices without a hub or for
connecting two hubs.
● A crossover has one end with the Orange set of wires switched with the Green set.
● Odd numbered pins are always striped, even numbered pins are always solid
colored.
● Looking at the RJ-45 with the clip facing away from you, Brown is always on the
right, and pin 1 is on the left.
● No more than 1/2″ of the Ethernet cable should be untwisted otherwise it will be
susceptible to crosstalk.
● Do not deform, do not bend, do not stretch, do not staple, do not run parallel with
power cables, and do not run Ethernet cables near noise inducing components.
Basic Theory:
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 49
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet
crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected
to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see
that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either
standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or
required in 100BASE-TX as well. So why bother using these wires, well for one thing its
simply easier to make a connection with all the wires grouped together. Otherwise you’ll
be spending time trying to fit those tiny little wires into each of the corresponding holes
in the RJ-45 connector.
How to wire your room with Cat5e or Cat6 Ethernet Cable.
- Although wireless is simpler for a lot of people, due to multimedia sharing,
bandwidth on a home network, and paranoia about wireless security, you may want to use
a hard wired solution for home networking. Having a wired network at home allows you to
have a private, high-speed network for internet access, file sharing, media streaming,
online gaming, IP security cameras, and much more.
Step 1: Initial Considerations and Planning
There are certain design considerations that need to be addressed based on your needs.
1. Which room(s) do I want wired?
2. How many ports do I want in each location?
3. What is a good location for distribution?
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 50
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
4. What path should the cables take?
5. What network speed do I need?
Step 2: Required Tools, Equipments and Materials
Tools
Crimping Tool
Electric Hand Drill
Wire Stripper
Equipments
Patch panel
Network Switch/Hub
Wireless Router
Wireless Access point
Manage Switch
Materials
Cat5e or Cat6 UTP
Cat5e or Cat6 UTP Cable Crimp (Straight-through & Crossover)
Raceways
Modular Box
Label maker (optional).
Step 3: Measure and Run the Cables
There are a number of ways to do this. You can estimate, measure from floor plans, run
one, etc.
Step 4: Connect the Wires to the Patch Panel
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 51
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Strip the sheath
a. Remove the cable sheath 2.54 cm (1 inch) from the end of the cable.
Position wires in data jack
a. Position wires in the proper channels on the RJ-45 jack maintaining the
twists as close to the jack as possible. The diagram that follows shows an example
of how to place the wires with one type of jack.
b. Most jacks have the channels color-coded to indicate where the wires go. The
following photo of the jack shows one model. Jacks are typically stamped to
indicate whether they are T568A or T568B.
Punch down the data jack
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 52
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
a. Use the punch tool to push conductors into the
channels. Make sure to position the cutting side of the punch
tool so that it faces the outside of the jack. If this is not done,
it will cut the wire being punched. Try tilting the handle of the
punch tool a little to the outside, so it will cut better.
b. If any wire remains attached after using the punch tool, simply twist the ends
gently to remove them. Then place the clips on the jack, and tighten them. Make sure that
no more than 1.27 cm (one half inch) of untwisted wire is between the end of the cable
jacket and the channels on the jack. Attach the faceplate.
c. Snap the jack into the faceplate by pushing it from the back side. Make sure when
this is done, that the jack is right-side up so the clip faces down when the wall plate is
mounted.
d. Use the screws to attach the faceplate to either the box or to the bracket. If there
is a surface mounted box, keep in mind that it might hold 30-60 cm (1-2 feet) of excess
cable. Then it will be necessary to either slide the cable through the tie-wraps, or pull back
the raceway that covers it, in order to push the excess cable back into the wall. If there is
a flush-mounted jack, all that is needed is to push the excess cable back into the wall.
Punch down the patch panel
a. On the opposite end of the cabling, remove the jacket 2.54 cm (1 inch) from the
cable.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 53
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
b. Lay the wires down in the patch panel so that the colors of the wires correspond
exactly to the colors indicated on the pin locations in the same manner as the data jack
was punched down.
c. Keep the sheath within .64 cm (¼ inch) of where the wires begin branching out to
their pin locations.
d. Do not untwist the wires more than necessary to lay them down at the pin
locations. A good way to keep from untwisting too much is to hold down the wires next to
the patch panel with one finger while using the other hand to pull apart each end as you
lay it across the connector.
e. The following figure shows a large punch down patch panel with carefully routed
cabling.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 54
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Step 5: Test the data jack and patch panel terminations
a. Obtain two straight-through Ethernet patch cables and verify they both function
properly using a simple cable tester.
b. Connect one end of one of the straight-through Ethernet patch cables to the data
jack outlet and one end of the other straight-through cable to the jack at the patch panel.
c. Insert the opposite ends of the two cables into a simple cable tester and check for
continuity from end to end through both patch cables, the data jack, and the patch panel.
Did the cable run test good from end to end?
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 55
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Step 6: Connect the wires to the modular box.
a. Make sure the stripper is adjusted properly on a scrap piece of cable. The Stripper
should be adjusted to only score the jacket to make removing it easier and not nick the
twisted pairs.
b. Straighten the pairs out completely and lay them over the top of the keystone jack
noting the color pattern for the 568b wiring. Note: Each keystone jack is slightly different
in how they are labeled and how the colors are arranged. The 568B standard is most
commonly used and ends of the cable must have the same standards to communicate.
We have the 3 most common keystone jack styles pictured here. The first jack pictured
has the 2 standard pairs on the right, and the 2 variable pairs on the left. The A standard is
the center column and the B standard is on the left. Both A and B standard applies to the
right side of the jack. The solid color box with the lower right corner missing represents
the solid color wire with the white stripe. The white box with the colored tip represents
the white wire with the colored stripe. The second jack pictured here has both A and B
standards on both sides of the jack, with the color code running down the center. The
solid color rectangle represents the solid color wire with the white stripe, wile the half
white half color rectangle represents the white wire with the colored stripe. The third jack
pictured here has the A and B standard codes labeled on the outside of the jack. With the
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 56
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
A standard on top and the B standard on the bottom. The solid box represents the solid
wire with the white stripe Wile the box with the white diagonal stripe going throught the
middle, represents the white wire with the colored stripe.
c. Keeping the pairs as twisted as possible press the wire into the correct groove
with your thumbs. If you completely straighten the wires to run them through the jack you
will risk cross talk between the pairs.
d. Using a punch down tool punch the wires down into the blades built into the
keystone jack. The blades in the jack are designed to work with solid cable, and may not
work with stranded cable. Make sure the blade (as noted in the picture) is facing the
outside of the keystone jack. If you reverse it you will cut the wires inside the keystone
jack rendering them useless. The punch down tool should cut off the remaining pieces of
the wire on the outside, but sometimes you may need to punch them down
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 57
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
a 2nd time and wiggle the wire to it breaks clean off. Once this is done you can install the
dust covers if your keystone jack comes with them. This keystone jack did not have the
covers. The covers should never be used to do the job of the punch down tool.
Step 7: Connect to the Internet
a. Connect Network Switch/Hub to the patch panel using cross-over cable base on
the netowork topology.
b. Connect the Wireles Router to the Network hub & to the Modem using cross-over
cable base on the netowork topology.
c. Connect your pc on the modular box using straight-through cable.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 58
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Task-Sheet CO2.1-5
Title: Cabling & Testing
Performance Objective: Given (tools, equipment, materials &
Protective equipment), you should be able to (create straight-through & crossover
cable) following (the proper way of cabling).
Supplies/Materials : UTP Cable & RJ 45
Tools & Equipment : Crimping Tools, Wire stripper & Cable/Lan
Tester
Steps/Procedure:
1. Make sure to follow the proper way of cutting & crimping cables.
2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment, materials & protective equipments you will use.
4. Crimp straight-through & crossover cable.
5. Test your cable if they are working properly.
Assessment Method:
● Demonstration
● Interview
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 59
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Performance Criteria Check-list CO2.1-5
CRITERIA Did you….
YES NO
1. Make sure to follow the proper way of cutting & crimping cables.
2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment, materials & protective equipments you will
use.
4. Crimp straight-through & crossover cable.
5. Test your cable if they are working properly.
Job-Sheet CO2.1-5
Title: Network Cable Installation
Performance Objective: Given (tools, equipment & materials), you should be able to
(Install Cable in the Patch Panel, Modular box and connect to the other network
equipments) following (the steps written in the information sheet CO2.1-6).
Supplies/Materials : Crimp Straight-through & Cross-over Cable, UTP Cable,
Raceways, Modular Box & Label Marker.
Tools & Equipment : Crimping Tools, Wire stripper & Cable/Lan Tester, Electric Hand
Drill, Patch panel, Network Switch/Hub, Wireless Router, Wireless Access point,
Manage Switch.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 60
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Steps/Procedure:
1. Make sure to follow the proper way of cable installation.
2. Make sure that you’re working area is ready.
3. Prepare all tools, equipment & materials you will use.
4. Install Patch Panel Cable.
5. Connect Cable to Modular box.
6. Connect Network equipments according to Network Topology.
Assessment Method:
• Demonstration
• Interview
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 61
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Performance Criteria Check-list CO2.1-5b
CRITERIA Did you….
YES NO
1. Make sure to follow the proper way of cable installation.
2. Make sure that you’re working area is ready.
3. Follow the proper way of cutting & crimping cables.
4. Install Patch Panel Cable.
5. Connect Cable to Modular box.
6. Connect Network equipments according to Network Topology.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 62
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheets CO2.1-6
“Waste Management”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Learn the proper disposal of network cables
Recycling used cable: Challenges and opportunities
The cabling industry has a ways to go before it can be considered “green.”
It has been more than four years since the National Electrical Code, in its 2002
edition, first required the removal of abandoned cable. That requirement, which is law
wherever the 2002 NEC or the portions of it relating to abandoned cable have been
adopted, kicks in whenever a cabling project of any type takes place. Chief among the
concerns about abandoned cable is that it represents a fire hazard, and it is no
coincidence that the document requiring its removal is published by the National Fire
Protection Association (NFPA; www.nfpa.org).
The requirement has stimulated something of a cottage industry, with some
contractors specializing in, or limiting their practice exclusively to, removing abandoned
cable from buildings. Soon (or perhaps even today), it may be inappropriate to call it a
cottage industry, as signs point to cable removal becoming a mainstream practice. The
ground first shook on that concept in May 2005 when DuPont launched its Abandoned
Cable Services program (www.dupont.com/cablingsolutions). Under the program, DuPont
conducts engineering analysis of a building’s abandoned cable and provides building
owners with a written report. Building owners then have the option to have the cable
removed, a process carried out by a stable of DuPont-sanctioned contractors.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 63
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Last summer, Communications Planning Corp. (CPC;
www.communicationsplanning.com) also launched cable-removal services. Headed by
noted industry figure, Frank Bisbee, CPC is one of several cabling design and installation
contractors that have turned at least some of their attention to abating abandoned cable.
Guidance for recycling
In June, DuPont introduced a specification guide for abandoned cable assessment
and removal. The guide is meant to act as an aid to project specifies and designers, and
provides a template by which those professionals can dictate that abandoned cable be
identified and removed. The specifications are written in accordance with the 2004
edition of the Master Format, which is a series of construction specifications endorsed by
the Construction Specifications Institute and the American Institute of Architects.
In addition to the guide covering abandoned cable assessment and removal, DuPont
simultaneously introduced similar specification guides for installing limited-combustible
cable and for recycling removed abandoned cable. DuPont and some cable
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 64
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
manufacturers have advocated installation of limited-combustible cable for several
years. But the notion of recycling communications cable that has been removed from
buildings is a newer concept-one that DuPont incorporated into its Abandoned Cable
Services program last year.
If abandoned cable removal services can be called a “cottage industry,” then the
recycling of such cable might be described as “fledgling,” because by and large, it is a new
enterprise that has not yet taken firm hold. Among several contributing factors, CPC’s
Bisbee emphasizes that labor is a significant hurdle. “The process of separating the
removed abandoned cables to get them into the recycle stream can be more costly than
the materials recovered,” he notes.
What's in there?
Those contractors that have been recycling cable, and did so even before the
2002 NEC edict about abandoned cable removal, have not necessarily followed strict
procedures preparing that cable for recycling. While nobody would go on record
admitting the following practice, many in the industry have heard about or perhaps even
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 65
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
witnessed a batch of old cable being thrown into a large barrel and burned down to its
copper-the component most often recycled. Considering the chemicals that make up a
twisted-pair copper cable, such a practice can hardly be considered environmentally
friendly.
Additionally, the fluoropolymers that insulate the copper conductors in a plenum- rated
twisted-pair cable do not burn easily (that’s exactly the point of a plenum cable). Stripping
those cables down to their bare copper is, as Bisbee referred to, a labor-intensive
endeavor. But it can be done, by hand or other means.
This author also could not find a recycler willing to go on record describing in detail the
process by which an unshielded twisted-pair cable is broken down and prepared for
recycling. The closest thing to a description was, “The separation and recovery processes
are proprietary; however, the processes used are mechanical in nature and do not require
any chemicals.”
In a big-picture view, cable that is removed from a building and intended for the recycling
stream are separated into several groups, including communications cable containing
copper, communications cable containing optical fiber, and electrical cables. Other pieces
of hardware, including racks, trays, and blocks, also must be dealt with separately from
the copper communications cable.
Once separated, the cables get put into some type of temporary storage. Depending on
how much cable is involved and the time frame in which it will be removed, it may be
stored in a dumpster placed on site exclusively for cable; or, for smaller projects, it may
be stored in bags or boxes. On smaller projects, the contractor is responsible for
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 66
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
transporting the cable to the recycling facility. DuPont notes that it can provide
dumpsters to larger job sites for cable that will be recycled through its program.
Once the cable reaches the recycling facility, the sites employ their proprietary processes
to break down the cable. Says one recycler that is part of DuPont’s program, “After
abandoned cable is removed from a building, fiber-optic, electrical cables, and related
hardware are separated from the low-voltage communication cable, which is then
recycled. First, the metal is separated from the non-metal components. Then the non-
metal components-primarily
fluoropolymers, polyvinylchloride, and polyethylene-are separated and recovered.”
As far as what happens to each part of a cable, the recycler states, “Usually all the parts of
an unshielded twisted-pair cable can be recycled except polyester wraps or draw strings.
Each of the components is separated by material type. The copper is sent to a copper
refining company, the PVC and polyethylene are sold to secondary converters for a
variety of applications, and the fluoropolymer is cleaned and extruded into pellets for
secondary applications and sold by DuPont in the wire and cable industry.”
Some cable types can present significant challenges to a recycler. Specifically, coaxial
and shielded twisted-pair cable may contain tin-plated copper as a shielding element.
That material is not worth as much as pure copper and is hard to segregate from pure
copper. Additionally, wrapped shields can vary greatly from heavy foils to metalized
polyester. They also pose segregation challenges, which diminish their value.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 67
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Taking an interest
With DuPont cleaning and reusing recovered fluoropolymers, it has a financial
interest in reclaiming these materials; it stands to reason the company will make
accommodations to facilitate large-scale recycling activities. When the company
introduced its new specification guides, Robert Kenny, global business manager of
DuPont Cabling Solutions, stated, “DuPont is committed to making it easier for building
owners to comply with codes in a way that is environmentally responsible through
recycling, and to follow best practice recommendations for fire safety on an ongoing
basis.”
But will recycling take hold across the board on cable-removal projects? The
current price of copper suggests there is some chance contractors will find it worthwhile
to recycle cable for that element alone. Copper is the cable component most in demand
today.
Another significant aspect of cable removal and recycling is the fact that many
cables in buildings today contain hazardous substances, particularly lead. The recently
enacted European Union environmental initiative RoHS (Restriction on Hazardous
Substances) has spurred any cable manufacturer wanting to do business in Europe to
remove lead from its products. California legislation set to go into effect on January 1
contains restrictions similar to that of RoHS. So, by and large, lead and other dangerous
materials have been eliminated from products now reaching the marketplace. But the
entire issue of abandoned cable focuses on products that were manufactured years and
in some cases decades ago, and almost certainly contain hazardous materials.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 68
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Bisbee, outspoken about the use of heavy metals and other hazardous materials in
cabling products, comments that while over-the-counter swipe kits can be helpful in
determining the presence of high quantities of lead, a lower and still-dangerous lead level
may not show up on such a test. The Environmental Protection Agency also has
cautioned that tests of these types are not accurate enough to distinguish between high
and low levels. Impossible to verify or quantify without third-party testing, the presence
of lead dust in abandoned cabling systems looms as a possible threat and, at this point, an
unknown.
A less-heard-about but perhaps no less significant European Union environmental
law is WEEE-the Waste Electrical and Electronic Equipment directive. Although it is
aimed at household electronics users and not commercial users, it provides a blueprint
that puts the onus for waste-electronics collection and recycling on the manufacturers of
the equipment.
Meanwhile, in the United States, building owners face the task of having unused
cable removed. And where it goes once it leaves the building varies greatly from project
to project. PATRICK McLaughlin is chief editor of Cabling Installation & Maintenance.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 69
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Self-Check 2.1-6
Multiple Choices:
1. Introduced a specification guide for abandoned cable assessment and removal.
a.) DuPont
b.) PATRICK McLaughlin
c.) Robert Kenny
d.) All of the Above
2. NEC Stands For?
a.) National Electrical Code
b.) National Electrician Code
c.) National Electricity Code
d.) National Electronics Code
3. Abandoned cable removal services can be called what?
a.) Equipment directive
b.) Cottage industry
c.) Fledgling
d.) All of the Above
4. Recycling of such cable might be described as what?
a.) Equipment directive
b.) Cottage industry
c.) Fledgling
d.) All of the Above
5. Is the cable component most in demand today.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 70
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
a.) Copper
b.) Silver
c.) Aluminum
d.) All of the Above
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 71
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Answer key 2.1-7
1. A
2. A
3. B
4. C
5. A
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 72
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
LEARNING EXPERIENCES
LEARNING OUTCOME 2
SET NETWORK CONFIGURATION
Learning Activities Special Instructions
• Read Information Sheets CO2.2-1 In these Learning outcomes you should
“Configure Computer Network” be able to understand, explain, and
• Trainer to Discuss Configure apply Setting-up of Network
Computer Network using ppt. Configuration.
• Perform Task-Sheet CO2.2-1 Go Through Information Sheets and
“Configure Computer Network” answer self-checks to ensure that
• Check Performance Criteria knowledge of standards in install
Checklist CO2.2-1 network cables is acquired.
“Configure Computer Network” The output of this Learning Outcome is
• Read Information Sheets CO2.2-2 the following.
“Inspect & Diagnose Computer Network” • Perform Network Configuration
• Trainer to Discuss Inspect &
Diagnose Computer Network ppt. • Diagnose computer network
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 73
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
• Perform Job-Sheet CO2.2-2
“Inspect & Diagnose Computer Network”
• Check Performance Criteria
Checklist CO2.2-2
“Inspect & Diagnose Computer Network” • Perform Network Inspection
Show your output to your trainer for his
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 74
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheets CO2.2-1
“Configure Computer Network”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure Peer to Peer Network
2. Share Folders and Printers
Windows 7, as with many of the different operating systems available, has a number of
different network functions which can be configured.
How to Configure a Static IP Address in Windows 7
Sometimes in order to gain connectivity in certain networks where a DHCP server
is not running, the configuration of a static IP address is required.
The steps required to setup up a static IP address are rather
straightforward, but the process is a bit different from Windows Vista and XP.
Let’s go through the steps now and configure a static IPv4 address in Windows 7.
Static IPv4 Configuration in Windows 7
The first thing that must be done is to gain access to the Network and Sharing
Center in Windows 7. This can be done in one of two ways; the first way to access it is via
the control panel.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 75
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Select the Windows 7 or on the bottom left-hand corner and select the control panel
option as shown below:
There are several views which are available for the control panel; by default the
category view is used. When using the category view the option that you need to select is
called View network status and Tasks, as highlighted below.
This will bring you to the Network and Sharing Center.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 76
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
The second way to gain access to the Network and Sharing Center is to utilize the
network icon which is displayed in the system tray when a network interface has been
enabled.
When this icon is right-clicked the option to open the Network and Sharing Center is
given as shown below:
Once the Network and Sharing Center is open there is an option which allows the change
of adapter settings which is shown in the upper left hand corner of the window. This is
shown highlighted in the following figure (click on the image to enlarge):
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 77
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Once in the Network Connections window, an interface must be selected which is going
to be configured with the static IP address. In the following example, both a wired and
wireless interface is shown as examples.
For the purposes of this article the wired interface will be used as the interface being
given a static IP Address.
By right-clicking on the correct interface a sub-menu is shown; from this menu select the
properties option.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 78
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Once the properties option is selected the interface properties windows will be displayed.
This screen gives the option to configure a number of different network parameters.
Since we want to change the interface IPv4 IP address this option must be selected
from the window. Once this option is selected the properties button will be enabled; press
the properties button.
Once the properties button is pressed the IPv4 properties window is displayed
which shows that the interface is currently configured to obtain both its IP address and
its DNS server information automatically.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 79
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
In order to change to a static IP address the option to Use the following IP address
must be selected; once this is done the option to enter the IP address parameters is
enabled and the Use the following DNS server addresses option is selected.
For the purpose of this article the IP address 192.168.1.100 is used with a subnet mask of
255.255.255.0 and a default gateway of 192.168.1.1. The DNS server which will be
configured is 4.2.2.2.
These options are shown in their correct locations in the following figure:
Once these options have been entered on the screen simply press Ok on both
property screens and the configuration of a static IP is complete.
The knowledge of static IP configuration is vital in modern organizational environments
as many do not completely utilize automatic IP assignment; it is also vital knowledge
when trying to troubleshoot IPv4.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 80
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
HOMEGROUP Configuration in Windows 7
A new option which was introduced with Windows 7 is HomeGroup. HomeGroup allows
Windows 7 machines to be linked in an easier way which makes the sharing of resources
between machines much simpler to setup. Each machine must become a member of a
HomeGroup in order to utilize this functionality.
The first thing that must be done on the first computer used is the creation of a
HomeGroup. This is done through the Choose HomeGroup and Sharing Options in the
Network and Sharing Center window.
Once this option is selected, the HomeGroup window is displayed. The first
computer to be configured with a HomeGroup will be given the option to Create a
homegroup. Once a HomeGroup is configured on a network it will actively broadcast its
existence to the other computers on the network (HomeGroup requires IPv6 to be
enabled), this option is shown in the following figure:
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 81
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Once a HomeGroup has been created on a network, all other participating
computers must join it. In order to join the HomeGroup, the HomeGroup password shown
in the figure above is required (this can also be changed).
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 82
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
The following figure shows how the HomeGroup window will display when there is an
existing HomeGroup on the network. Once this is shown, simply press theJoin now button
and select the local shared options and enter the HomeGroup password.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 83
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Once this is complete the machine has become part of a HomeGroup.
Windows 7 Network Locations aka Profiles
Another feature which can be used with Windows 7 is network location. Everytime a new
network connection is established, a prompt will be given to select what type of location
the new network connection is. The three options are Home, Work and Public.
When using the Home location, network discovery and HomeGroup are enabled which
allows the easy networking of Windows machines. The Work location is similar to
the Home location but disables the use of the HomeGroup functionality. The Public
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 84
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
location is the most secure and disables the various sharing functionalities which are
enabled then in the other locations.
The current location which is selected is shown in the Network and Sharing Center under
View your active networks and can be changed by selecting the current setting.
Once the setting is selected the Set Network Location window is opened which enables
the configuration of a different network location. This window is also the same window
which will be used to prompt initial network location selection.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 85
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Conclusion
There are a number of different advanced options which can be utilized with Windows 7;
this article shows how to configure some of the most used options.
Windows 7, as with newer operating systems, continues to make better help systems.
Take the time to utilize these systems and learn even more about Windows 7
functionality.
How to Change the Name of Your Windows Computer
Changing this in XP was extremely simple, but in Windows 7, Windows 8, or Vista it’s
buried behind a few more menus. Here are three routes you can take to open up System
Properties:
● Type sysdm.cpl into the start menu search box (quickest)
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 86
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● Right-click on the Computer option on the start menu or in My Computer.
● Open Control Panel, and go to System and Maintenance, and then System.
If you chose one of the last two options, then you’ll need to click on
Advanced System Settings on the left menu:
Now you’ll finally be on the right screen, which should say System Properties.
Click on the “Change” button to rename the computer, which will pop up this dialog:
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 87
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Now you can finally change the name of the computer. You could also change the name
of the workgroup to something more descriptive as well. You’ll have to reboot after you
make this change.
Share files and folders over the network
Sharing files with public folders
To share items in your Public folder and its subfolders with other users of your computer,
you don’t need to do a thing. By default, all users with an account on your computer can
log on and create, view, modify, and delete files in the Public folders. The person who
creates a file in a Public folder (or copies an item to a Public folder) is the file’s Owner and
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 88
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
has Full Control access. All others who log on locally have Modify access. For more
information on access levels, see what are permissions?
To share items in your Public folder with network users, click the Start button ,
click Network, and then click Network and Sharing Center. Turn on Public Folder Sharing
(for information on how to do this, see sharing files with the Public folder). You can’t
select which network users get access, nor can you specify different access levels for
different users. Sharing via the Public folder is quick and easy—but it’s rigidly inflexible.
Sharing files and folders from any folder
Whether you plan to share files and folders with other people who share your
computer or with those who connect to your computer over the network (or both), the
process for setting up shared resources is the same as long as the Sharing Wizard is
enabled. We recommend that you use the Sharing Wizard even if you normally disdain
wizards. It’s quick, easy, and almost certain to make all of the correct settings for network
shares and NTFS permissions—a sometimes daunting task if undertaken manually. Once
you’ve configured shares with the wizard, you can always dive in and make changes
manually if you want.
To make sure the Sharing Wizard is enabled, click the Start button , type “folder”
in the Search box, and then click Folder Options. Click the View tab. In the
Advanced settings box, scroll down the list and make sure the Use Sharing Wizard
(Recommended) check box is selected.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 89
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
The process for setting up shared resources is the same as long as the
Sharing Wizard is enabled
With the Sharing Wizard at the ready, follow these steps to share files or folders:
1. In Windows Explorer, select the folders or files you want to share. (You can select
multiple objects.)
2. In the Command bar, click Share. (Alternatively, right-click, and then click Share.)
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 90
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
3. With the Sharing Wizard, it’s quick and easy to share files or folders with other
people
4. In the file sharing box, enter the name of the user with whom you want to share
files or folders, and then click Add. You can type a name in the box or click the arrow to
display a list of available names. Repeat for each person you want to add.
The list includes all of the users who have an account on your computer, plus everyone. If
you want to grant access to someone who doesn’t appear in the list, you need to create a
user account for that person (for information on how to do this, see Create a user
account).
Note:
If you select everyone, and you have password-protected sharing enabled, the user must
still have a valid account on your computer. However, if you have turned off password-
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 91
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
protected sharing, network users can gain access only if you grant permission to
everyone or to Guest.
For each user, select a permission level. Your choices are:
● Reader Users with this permission level can view shared files and run shared
programs, but cannot change or delete files. Selecting . Reader in the Sharing
Wizard is equivalent to setting NTFS permissions to Read & Execute.
● Contributor This permission level, which is available only for shared folders (not
shared files), allows the user to view all files, add files, and change or delete files
that the user adds. Selecting . Contributor sets NTFS permissions to Modify.
● Co-owner Users who are assigned the Co-owner permission have the same
privileges that you do as the Owner: They can view, change, add, and delete files in
a shared folder. Selecting . Co-owner sets NTFS permissions to Full Control for
this user.
Note:
You might see other permission levels if you return to the Sharing Wizard after you set up
sharing. The Custom permission level identifies NTFS permissions other than Read &
Execute, Modify, and Full Control. The Mixed permission level appears if you select
multiple items, and those items have different sharing settings. Owner, of course,
identifies the owner of the item.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 92
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
5. Click Share. After a few moments, the wizard displays a page similar to the page
shown in the following illustration.
The Sharing Wizard displays the network path for each item you’ve shared
6. In the final step of the wizard, you can do any of the following:
• Send an e-mail message to the people with whom you’re sharing. The message
includes a link to the shared file or folder.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 93
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
With the Sharing Wizard, you can send a message that includes a link to the item you
want to share
• Copy the network path to the Clipboard. This is handy if you want to send a link via
instant messenger or another application.
• Double-click a share name to open the shared item.
• Open a search folder that shows all of the folders or files you’re sharing.
7. When you’re finished with these tasks, click done.
Creating a share requires privilege elevation. But, after a folder has been shared, the
shared folder is available to network users no matter who is logged on to your computer
—or even when nobody is logged on.
Using advanced sharing to create shorter network paths
Confusingly, when you share one of your profile folders (or any other subfolder of
%SystemDrive%\Users), Windows Vista creates a network share for the Users folder—
not for the folder you shared. This isn’t a security problem; NTFS permissions prevent
network users from seeing any folders or files except the ones you explicitly share. But it
does lead to some long UNC paths to network shares.
For example, if you share the My Received Files subfolder of Documents (as shown after
step 5 in the previous section), the network path is \\CARL- PC\Users\Carl\Documents\
My Received Files. If this same folder had been anywhere on your computer outside of
the Users folder, no matter how deeply nested, the network path would instead be \\
CARL-PC\My Received Files. Other people to whom you’ve granted access wouldn’t
need to click through a series of folders to find the files in the intended target folder.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 94
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Network users, of course, can map a network drive or save a shortcut to your target
folder to avoid this problem. But you can work around it from the sharing side, too: Use
advanced sharing to share the folder directly. (Do this after you’ve used the Sharing
Wizard to set up permissions.)
Note:
Make sure the share name you create doesn’t have spaces. Eliminating spaces makes it
easier to type a share path that works as a link.
Stopping or changing sharing of a file or folder
If you want to stop sharing a particular shared file or folder, select it in Windows Explorer,
and then click Share. The Sharing Wizard appears, as shown in the following illustration.
Use the Sharing Wizard to change sharing permissions or to stop sharing a
file or folder
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 95
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
If you click Change sharing permissions, the wizard continues as when you created the
share, except that all existing permissions are shown. You can add or remove names and
change permissions.
The Stop sharing option removes access control entries that are not inherited. In
addition, the network share is removed; the folder will no longer be visible in another
user’s Network folder.
Setting advanced sharing properties
If you disable the Sharing Wizard, Windows Vista reverts to a process similar to that
employed by earlier versions of Windows (except the aberration in Windows XP called
Simple File Sharing—nothing before or after is similar to that). Without the Sharing
Wizard, you configure network shares independently of NTFS permissions. (For more
information about this distinction, see How share permissions and NTFS permissions
work together at the end of this section.)
With the Sharing Wizard disabled, when you select a folder, and then click Share, rather
than the wizard appearing, Windows opens the folder’s properties dialog box and displays
the Sharing tab, as shown in the next illustration. Even with the Sharing Wizard enabled,
you can get to the same place; right-click the folder, and then choose Properties.
Note:
The Sharing tab is part of the properties dialog box for a folder, but not for files. Also,
when the Sharing Wizard is disabled, the Share button appears on the Command bar only
when you select a single folder. Only the Sharing Wizard is capable of making share
settings for files and for multiple objects simultaneously.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 96
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
The Share button summons the Sharing Wizard, but it’s available only when the Sharing
Wizard is enabled
To create or modify a network share using advanced settings, follow these steps:
1. On the Sharing tab, click Advanced Sharing.
2. Select the Share this Folder check box.
Use advanced settings to create or modify a network share
3. Accept or change the proposed share name.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 97
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Note:
If the folder is already shared, and you want to add another share name (perhaps with
different permissions), click Add, and then type the name for the new share. The share
name is the name that other users will see in their own Network folders. Windows initially
proposes to use the folder’s name as its share name. That’s usually a good choice, but
you’re not obligated to accept it. If you already have a shared folder with that name, you’ll
need to pick a different name.
4. Type a description of the folder’s contents in the Comments box. Other users will
see this description when they inspect the folder’s properties dialog box in their Network
folder (or when they use the Details view).
5. To limit the number of users who can connect to the shared folder concurrently,
specify a number in the Limit the number of simultaneous users to box. Windows Vista
permits up to 10 concurrent users. (If you need to share a folder with more than 10 users
at once, you must use a server version of Windows.)
6. Click Permissions.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 98
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
The default share permission associated with a new share is Read access to everyone.
Caution:
When you share a folder, you also make that folder’s subfolders available on the network.
If the access permissions you set for the folder aren’t appropriate for any of its
subfolders, either reconsider your choice of access permissions or restructure your
folders to avoid the problem.
7. In the Group or user names box, select the name of the user or group you want to
manage. The share permissions for the selected user or group appear in the permissions
box.
8. Select Allow, Deny, or neither for each access control entry:
• Full Control Allows users to create, read, write, rename, and delete files in the
folder and its subfolders. In addition, users can change permissions and take ownership
of files on NTFS volumes. .
• Change Allows users to read, write, rename, and delete files in the folder and its
subfolders, but not create new files. .
• Read Allows users to read files but not write to them or delete them. If you select
neither . allow nor Deny, it is still possible that the user or group can inherit the
permission through membership in another group that has the permission. If the user or
group doesn’t belong to another such group, the user or group is implicitly denied
permission.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 99
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Note:
To remove a name from the Group or user names box, select the name, and then click
Remove. To add a name to the list, click Add. Enter the names of the users and groups
you want to add.
9. Click OK in each dialog box.
How share permissions and NTFS permissions work together
The implementation of share permissions and NTFS permissions is confusingly
similar, but it’s important to recognize that these are two separate levels of access
control. Only connections that successfully pass through both gates are granted access.
Share permissions control network access to a particular resource. Share permissions do
not affect users who log on locally. You set share permissions in the Advanced Sharing
dialog box, which you access from the Sharing tab of a folder’s properties dialog box.
NTFS permissions apply to folders and files on an NTFS-formatted drive. They provide
extremely granular control over an object. For each user to whom you want to grant
access, you can specify exactly what they’re allowed to do: run programs, view folder
contents, create new files, change existing files, and so on. You set NTFS permissions on
the Security tab of the properties dialog box for a folder or file.
It’s important to recognize that the two types of permissions are combined in the most
restrictive way. If, for example, a user is granted Read permission on the network share, it
doesn’t matter whether or not the account has Full Control NTFS permissions on the
same folder; the user gets only Read access when connecting over the network.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 100
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
In effect, the two sets of permissions act in tandem as gatekeepers that winnow out
incoming network connections. An account that attempts to connect over the network
is examined first by the share permissions gatekeeper. The account is either bounced
out on its caboodle or allowed to enter with certain permissions. It’s then confronted by
the NTFS permissions gatekeeper, which might strip away (but not add to) some or all of
the permissions granted at the first doorway.
In determining the effective permission for a particular account, you must also consider
the effect of group membership. Permissions are cumulative; an account that is a
member of one or more groups is granted all of the permissions that are granted
explicitly to the account as well as all of the permissions that are granted to each group of
which it’s a member. The only exception to this rule is Deny permissions, which take
precedence over any conflicting Allow permissions.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 101
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Task-Sheet CO2.2-1
Title: Network Configuration
Performance Objective: Given (Equipments & Materials), you should be able to
(configure network and share files) following (network configuration and sharing steps).
Materials : 1 Crossover Cable
Equipment : 2 Computer Sets
Steps/Procedure:
1. Make sure that you’re working area is ready.
2. Prepare two computers with network cable.
3. Configure HOMEGROUP.
4. Use static class C IP address.
5. Share Local Folder.
Assessment Method:
• Demonstration
• Interview
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 102
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Performance Criteria Check-list CO2.2-1
CRITERIA Did you…. YES NO
1. Configure HOMEGROUP Properly.
2. Use static class C IP address.
3. Share Files on the Network.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 103
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheets 2.2-2
“Inspect & Diagnose Computer Network”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Inspect Network Configuration
2. Diagnose Network Problems
When a user experiences a networking problem, NDF provides the ability to diagnose and
repair it by presenting the person with diagnostic assessments and resolution steps. NDF
simplifies and automates many of the common troubleshooting steps and solution
implementations for networking troubles.
Network Troubleshooting from the Network Icon in the Notification Area
You can easily launch network troubleshooting by right-clicking on the network icon in
the notification area of the Windows 7 desktop and selecting Troubleshoot problems.
Windows Network Diagnostics will launch and attempt to detect and correct what’s
wrong.
Network Troubleshooting from Control Panel
With Windows 7, you don’t have to wait for an error to occur to use the built-in
diagnostics. You can launch a troubleshooting session anytime from the new
Troubleshooting item in Control Panel. When you do, the screen shown in Figure 1
appears. In this case, the tool has found that the computer has no Internet connection.
The page displays a boxed message that informs you of the problem and offers a Try to
connect again option.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 104
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Figure 1 Opening the Troubleshooting item in Control Panel produces this screen.
If you click on the Network and Internet selection, you’ll get the dialog box shown in
Figure 2. There you can choose from seven options that start sessions for
troubleshooting several types of issues: Internet-connection difficulties, problems
accessing files and folders on other computers, and network-printing troubles.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 105
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Figure 2 Troubleshooting network and Internet problems.
Choosing any of the seven options launches a wizard that steps you through diagnosis of
the problem, and if possible, automated or manual correction. The troubleshooter also
records an Event Tracing Log (ETL). If the problem can’t be resolved, you can examine
and even forward the log. Just click on View History from the Troubleshooting dialog.
Figure 3 shows an example ETL.
Figure 3 an example of troubleshooting history.
Each item in the history list represents a separate troubleshooting session.
Double-clicking on a session displays the results for it.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 106
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Figure 4 Example of a troubleshooting report.
To view the details of the detection, click the Detection details link, and you’ll see a
window like the one in Figure 5.
Figure 5 A typical Detection-details screen from a troubleshooting report.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 107
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Near the top of the dialog, you’ll see the name of the ETL file that contains the
information from the troubleshooting session. If you want to send a copy to support staff
or Microsoft for analysis, you can save the file by clicking on its name, which will bring up
the File Download dialog.
You can view and analyze ETL files with Network Monitor 3.3. You can also
view the files with Event Viewer and the Tracerpt.exe tool as well as by converting
them to XML or text files with the netsh trace convert command. You can save the
details of the troubleshooting session in a CAB file by right-clicking the session in
the Troubleshooting History window and then selecting Save As. Just as with ETL
files, you can send the CAB file to support staff for analysis.
Network Tracing with Netsh.exe
Windows 7 includes a new Netsh.exe context, netsh trace, for network tracing.
Commands in the netsh trace context allow you to selectively enable tracing for
providers and scenarios. A provider represents an individual component in the network
protocol stack, such as Winsock, TCP/IP, wireless LAN services, or NDIS. A tracing
scenario is a predefined collection of providers for a specific function, such as file sharing
or wireless LAN access. To exclude irrelevant details and reduce the size of the ETL file
you can apply filters.
Typically, to perform detailed troubleshooting of networking issues, you have to
supply your helpdesk staff or Microsoft’s Customer Service and Support organization
with both internal component tracing information and a capture of the network traffic at
the time of the problem. Prior to Windows 7, you had to carry out two different
procedures to obtain this information: Use Netsh.exe commands to enable and disable
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 108
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
tracing and a packet-sniffer program, such as Network Monitor to capture the network
traffic. And then you faced the difficult task of tying together the information from these
two sources to determine when network traffic was sent relative to the events in the
tracing logs.
In Windows 7, when you perform network tracing with commands in the netsh
trace context, ETL files can contain both network traffic and component tracing in
sequence. And you can display the ETL files with Network Monitor 3.3, which provides
much more efficient way to analyze and troubleshoot network problems. Figure 6
shows an example of an ETL file being viewed in Network Monitor 3.3.
Figure 6 Using Network Monitor 3.3 to view the network traffic recorded in an ETL
file.
With this new capability, capturing network traffic requires neither end users nor
helpdesk staff to install and use Network Monitor on the computer having the problem.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 109
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Note that by default the ETL files generated for troubleshooting sessions from
Control Panel | Troubleshooting do not contain network traffic information.
To capture both tracing and network traffic information sequentially for multiple
components in the network stack (such as Winsock, DNS, TCP, NDIS, WFP and so forth),
Windows uses an activity-ID-based correlation known as grouping to collect and record
the tracing and traffic information in the ETL file. Grouping within the ETL file allows you
to examine the entire transaction as a single, correlated sequence of events.
For more information about the Netsh.exe commands for a tracing session, see the
“Starting and Stopping a Netsh.exe Trace” sidebar.
When you enable tracing with Netsh.exe, Windows 7 can create two files. An ETL
file contains trace events for Windows components, and if specified, network traffic. By
default, the ETL file is named Nettrace.etl and stored in the %TEMP%\NetTraces
folder. You can specify a different name and storage location with the trace file=
parameter. An optional CAB file can contain several types of files including text, Windows
Registry, XML and others that store additional troubleshooting information. The CAB file
also includes a copy of the ETL file. By default, the CAB file is named Nettrace.cab and
stored in the %TEMP%\NetTraces folder.
You can also use Netsh.exe tracing in conjunction with Control Panel |
Troubleshooting. First, use the appropriate Netsh.exe command to enable tracing for the
scenario. For example, use the netsh trace scenario=internetclient report=yes command.
Use Control Panel | Troubleshooting to run the Connect to the Internet troubleshooting
session. When complete, run the netsh trace stop command. Now, when you view the
history of the troubleshooting session, you’ll be able to access the CAB file.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 110
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Sidebar: Starting and Stopping a Netsh.exe Trace
To start a network trace with Netsh.exe, first run an elevated command prompt.
To display the list of trace providers, type netsh trace show providers. To produce the list
of trace scenarios, type netsh trace show scenarios. To show the list of trace providers
within a scenario, type netsh trace show scenario Name.
You can start a trace for one or multiple providers or scenarios. For example, to do
so for the Internet Client scenario, type netsh trace start scenario=internetclient.
To start tracing for more than one scenario, you can specify all of the appropriate
scenarios, such as netsh trace start scenario=File Sharing scenario=Direct Access. You
can create a CAB file with a formatted report by including the report=yes parameter. Use
trace file=parameter to specify a name and location for the ETL and CAB files. If you
want to record network traffic in the ETL file, include the capture=yes parameter.
For example, here’s the command that will start a trace for the WLAN scenario,
create a CAB file with a formatted report, capture network traffic, and store the files with
the name WLAN Test in the C:\Tshoot folder: netsh trace start scenario=WLAN
capture=yes report=yes trace file=c:\tshoot\WLANtest.etl.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 111
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Job-Sheet CO2.2-2
Title: Diagnose computer network
Performance Objective: Given (Equipments & Materials), you should be able to
(Diagnose computer network) following (Network Diagnostic procedures).
Materials : 1 Crossover Cable
Equipment : 2 Computer Sets
Steps/Procedure:
1. Make sure that you’re working area is ready.
2. Prepare two computers with network cable.
3. Inspect & diagnose network.
4. Make diagnostic report.
5. Prepare repair solutions report.
Assessment Method:
• Demonstration
• Interview
Performance Criteria Check-list CO2.2-2
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 112
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
CRITERIA Did you…. YES NO
1. Make sure that working area is ready.
2. Prepare two computers with network cable.
3. Inspect & diagnose network.
4. Make diagnostic report.
5. Prepare repair solutions report.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 113
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Learning Outcome 3
Set router/Wi-Fi/ wireless access point/ repeater configuration
CONTENTS:
1. Configure Client device
2. LAN & WAN Configuration
3. Wireless Network Configuration
ASSESSMENT CRITERIA:
1. Client Device systems settings are configured in accordance with manufacturers’
instructions and end user preferences.
2. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network design.
3. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network design.
4. Wireless settings are configured in accordance manufacturers’ instructions,
network design and end-user preferences.
5. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end user preferences.
6. Local area network (LAN) port is configured in accordance with manufacturers’
instructions and network design.
7. Wide area network (WAN) port is configured in accordance with manufacturers’
instructions and network design.
8. Wireless settings are configured in accordance manufacturers’ instructions,
network design and end-user preferences.
9. Security/Firewall/Advance settings are configured in accordance with
manufacturers’ instructions and end user preferences.
CONDITION:
Student/ trainee must be provided with the following:
● Protective eyewear
● Digital multi-meter
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 114
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● Wire stripper with bolt cutter
● Pliers (assorted)
● Screw drivers (assorted)
● LAN Tester
● Crimping tools Crimping tools
● Laptop
● Desktop
● Network storage
● Network storage
● Network printer
● Wireless Router
● Switch or Hub
ASSESSMENT METHOD:
1, Demonstration
2. Interview
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 115
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 116
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheet 2.3-1:
CLIENT DEVICE CONFIGURATION
I. Learning Outcomes
You are expected to:
1. Configure Client Device
Your wireless router has a variety of useful options you can configure. These are
practically hidden you wouldn’t know these features exist unless you were digging
through your router’s configuration pages. Bear in mind that different routers have
different options. You may not have all the options listed here on your own router. The
options will also be in different places with different names.
Click the Details button to view more information about the connection.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 117
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Look for the IPv4 Default Gateway IP address in the details window. Plug this IP
address into your web browser’s address bar.
You’ll need to log in with your username and password combination. If you don’t
know these, your router is probably using its default combination — check your router’s
manual or perform a web search for its model number and “default password.” If you’ve
previously changed the password and can’t remember it, you can reset your router’s
password to the default. Once you’ve logged in, you can now browser your router’s
configuration pages and configure its settings.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 118
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
● The most typical username is “admin”.
● The most typical passwords are “admin” and “password”.
● Many routers will only require a username and a blank password, and some allow
you to leave all fields blank.
● If you can’t figure out the correct IP address, your username or password, search
for your router model online to see what the default login is. If it has been
changed, press the Reset button on the back of the router for 10 (to 30+ seconds
as dictated in the instructions for the router model) to restore factory defaults
and try again.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 119
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Open the Wireless Settings. When you log in to your router, you will be taken to the
router’s main menu or status screen. There will be several options to choose from. The
Internet section can usually be left at default settings, unless Page 100 of 118 you
received specific instructions from your internet service provider. The Wireless section
will allow you to set up your wireless network.
Enter a name for your wireless network.
In the Wireless section, you should see a field labeled SSID or Name. Enter a
unique name for your wireless network. This is what other devices will see when
scanning for networks.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 120
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Check the box to enable SSID broadcast. This will essentially “turn on” the wireless
network so that it may be readily seen by anyone in range of the signal. *See the Tips
section below for additional information on the SSID setting.
Choose a security method. Choose from the list of available security options. For the
best security, choose WPA2-PSK as the encryption method. This is the most difficult
security to crack, and will give you the most protection from hackers and intruders.
Create a passphrase. Once you’ve chosen your security method, enter in a
passphrase for the network. This should be a difficult password, with a combination of
letters, numbers, and symbols. Don’t use any passwords that could be easily deduced
from your network name or from knowing you.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 121
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Save your settings. Once you are finished naming and securing your wireless
network, click the Apply or Save button. The changes will be applied to your router,
which may take a few moments. Once the router has finished resetting, your wireless
network will be enabled.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 122
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Performance Criteria Check-list 2.3-1
CRITERIA YES NO
Did you……..
1. Make sure that you’re working area is ready.
2. Prepare computer/laptop and other equipments.
3. Configure wireless router.
4. Change SSID.
5. Change wireless router password.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 123
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
INFORMATION SHEETS 2.3-2
LAN & WAN NETWORK CONFIGURATION
Learning objectives
You are expected to:
1. Configure LAN Network
2. Configure WAN Network
What is an IP Address?
An Internet Protocol address (IP address) in layman’s terms is basically the
address given to your computer when it’s connected to a network. Technically speaking,
an IP address is a 32-bit number that signifies the address of both the sender and
receiver of packets on a network.
Let’s take an example: suppose you want to send an email to your friend. Though
your email may be broken down into millions of data packets before it’s transmitted,
right now for simplicity’s sake consider it a single information packet. The IP addresses
are embedded on each packet that is transmitted over the network and are used to
identify the machine.
CLASS ADDRESS RANGE SUPPORTS
Class A 1.0.0.1 to 126.255.255.254 Large networks with many devices
Class B 128.1.0.1 to 191.255.255.254 Medium-sized networks.
Class C 192.0.1.1 to 223.255.254.254 small networks (fewer than 256
devices)
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or
Research and Development
Purposes.
Note: It’s totally possible for your computer to have two IP addresses at the same
time. One may be for the Internet and another one for the local area network.
These IP addresses are further divided into two main types: Static and Dynamic
IP address. Let’s have a good look at both for better understanding.
Static IP Address
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 124
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
As the name suggests, the static IP addresses are those types of IP addresses
that never change once they are assigned to a device on a network. No doubt this type
of addressing is cost effective but could have a high security risk. Static IP addresses are
mostly used by web, email and gaming servers who don’t care much about hiding their
locations.
Dynamic IP Address
On the other hand, a Dynamic IP address changes each time the device logs in to
a network. This kind of IP address is very tough to trace and is thus used by companies
and business firms. You must be thinking as to who or what allocates this Dynamic IP
address every time the device logs in. Well, these IP address are assigned using DHCP
(Dynamic Host Configuration Protocol). Talking about DHCP in detail is beyond the
scope of this article and we will take it up in a future post.
Which is better, Static or Dynamic?
You are probably wondering which type of IP addressing is better, Static or
Dynamic? Static IP addresses, as I already mentioned above, are used in places where
security is not a big concern like web servers, FTP and dedicate VOIP services. Dynamic
IP addressing, on the other hand are used when you browse through the Internet,
receive mails, download files, etc.
What is Local Area Connection?
LAN (Local Area Network) card will automatically install when you setup windows
7. LAN connection is required when you want to share your pc with others in your Home
Group. Suppose you have two Laptop/Pc and you want to connect them for some
purpose, say playing multiplayer games (Cod 1, Cod 2, Cod4, Cod5 etc.) or to access
another Pc, just setup Local Area Connection. You can also connect your Pc to your
friends Pc no matter how far the distance, connect them with cable connection.
Procedure of setup Local Area Connection:
∙ Crete Workgroup:
1. Go to my computer properties.
2. Click change settings.
3. See
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 125
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
4. Type your Computer name and WORKGROUP
5. This message will appear
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 126
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Restart your computer then your WorkGroup will be created.
Give your IP Address:
1. Go to control panel
2. Click Network and Internet
3. Click Network and Sharing Center
4. Click HomeGroup
5. Click Advance Sharing Setting
6. There are two types: Home to work, Public
7. From Home to work select >Turn on Network Discovery >Turn on file and printer
sharing >Turn on public folder sharing..... >Enable file sharing for device........ >Allow
windows to manage.....
8. From Public select >Turn on Network Discovery >Turn on file and printer sharing
>Turn on public folder sharing..... >Enable file sharing for device........ >Turn off password
protected sharing.
9. Click change Adapter Setting (Top left side of the window)
10. You will find this
11. Plug your cable and then find this
12.Now setup your IP. Right click on Local Area Connection go to properties.
13. Double click Internet protocol version 4 (TCP/IPv4) Or click properties
14. Click Use the following IP address
15. IP address: Give your IP address
16. Subnet mask: Just press tab it will automatically generate (Default255.255.255.0)
17.Click use the following DNS server address.
18. Click ok.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 127
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
TCP/IP and WAN
TCP/IP is in most companies now the standard protocol, especially when multiple
locations (Offices and/or factories) are connected via a Wide-AreaNetwork (WAN).
In the headquarter, there will be most probably some servers, which need to be
Page 110 of 118 accessed from Remote offices and/ or factories (like a mail-server
and/or a company internal web server) and/or a main-frame or mini-computer, running a
common accounting system or an Enterprise Resource Planning System ( ERP ), which
usually are accessed from the client-computers via TCP/IP.
The head quarter could be connected via fixed lines (provided by WAN providers)
to the remote offices and/ or factories. Once the routers are setup properly by the WAN
provider, you as a user will not need to worry about the WAN; you have access to the
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 128
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
servers and main-frame, as long as in all locations the systems are properly configured
for the router/Gateway.
In this example, you would need to define in the remote location the Gateway (=
Router) address, either manually or using DHCP when IP-addresses are obtained
automatically (for example from a DHCP-service on an NT4-server) Just verify the
values using ipconfig on windows 7.
Test the connection from the remote location to the headquarter by making the
PING test to the systems located in the headquarter.
For File-Access to an NT-server in the head quarter via the WAN, you will either
to setup a WINS server or use LMHOSTS.
It is getting more complicated, when you have a second router/gateway installed,
for example for permanent Internet access.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 129
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
But there is also a special item to watch out for in the remote location when connecting
via a modem and a dial-up connection to the Internet.
Once you connect to the Internet, you will lose the connection via the WAN to all
the systems in the Headquarter, you will not be able to PING them. What Happened?
Use in the START-menu the RUN-command to start "ipconfig" and check your IP-
values of the dial-up connection (via the modem) to the Internet, which is the "PPP
Adapter": Usually, you get an additional Gateway address assigned to you for the
Internet connection. All network traffic, also for the internal communications, will now be
send to the Internet gateway!
While you are connected, you have now a configuration with multiple
routers/gateways, and you will have to give Windows a "helping hand" to tell it, which
router/gateway to be used for Internet network traffic and which one for company
internal network traffic: you need to use the "ROUTE" command to inform Windows,
which gateway to use to access the systems in the headquarter (more details on ROUTE
in the next section below):
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 130
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Your system knows now to use the gateway address at 192.168.1.1 for internal
communication with the Headquarter, while all other communications will use the
gateway defined by the Internet connection.
A WAN setup with multiple Routers/gateways in a location:
With 2 gateways, you have 2 possibilities:
1) Define one of them as the Default gateway (usually the Internet Gateway) and
program this gateway to pass any network traffic for the headquarter on to the WAN
router/gateway. But very often, you as a user or even network administrator do not have
access to the internal routing tables of your router, requiring you to use the 2nd
possibility.
2) Define the gateway with the widest range of IP-addresses (usually the Internet
Gateway) as your Default gateway and then program your own system to send all other
network traffic (for internal communication) to the WAN router by using the "ROUTE" -
command:
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 131
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
The Help-information, as displayed on a WindowsNT4 or Windows2000 system in a
Command-prompt window:
We need to use the "ROUTE ADD" command to program the system to send all
network traffic for the address range 192.168.2.0 (applying the subnet-mask of
255.255.255.0) to the gateway/ router at 192.168.1.1
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 132
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Performance Criteria Check-list CO2.3-2
CRITERIA YES NO
Did you……..
1. Make sure that you’re working area is ready.
2. Prepare three computers with network cable.
3. Configure two Local Area Network
4. Set Static IP Address using Class CIP.
5. Test Network if working.
6. Configure WAN Network.
7. Change the IP Address of 2 computers to class B IP.
8. Connect the 2 Local Area Network to form WAN.
9. Test the Network if it is successful.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 133
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
INFORMATION SHEET 2.3-3
Wireless Network Configurations
Learning objectives
You are expected to:
1. Configure Wireless LAN
2. Connect client to a Wireless Network
A wireless network is any type of computer network that uses wireless data
connections for connecting network nodes.
Wireless networking is a method by which homes, telecommunications networks and
enterprise (business) installations avoid the costly process of introducing cables into a
building, or as a connection between various equipment locations. Wireless
telecommunications networks are generally implemented and administered using radio
communication. This implementation takes place at the physical level (layer) of the OSI
model network structure.
Examples of wireless networks include cell phone networks, Wi-Fi local networks
and terrestrial microwave networks.
Wireless Devices
- Wireless Router
- Wireless Access Point
- Wireless Network Adapter
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 134
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
LEARNING OUTCOME NO. 4
Inspect And Test The Configured Computer Networks
Contents:
1. Network Connections
2. Testing Computer Networks
3. Configure Network Interface card
Assessment Criteria
1. Network connectivity of each terminal is checked in accordance with network
design.
2. Any fault or problem in the network system is diagnosed and remedied in line
with the standard operating procedures.
3. Network interface card (NIC) settings are configured in accordance with
network design.
4. Communication checking between terminals are carried out in accordance
with OS network configuration guides
5. Unplanned events or conditions are responded to in accordance with
established procedures
Conditions
The participants will have to access to:
● OH&S policies and procedures
- Occupational Health and Safety Laws
- Personal Safety
- Workplace Hazards
● Manuals
● Materials
-
Cables/wires
▪ Fiber optics
▪ copper
- terminals
- cable raceway/duct
- terminal box
- computer storage media
● Computers and devices
- 1 server
- Laptop
- Desktop
- Network storage
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 135
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
- Network printer
● Tools and equipment
- Pliers (assorted)
- Screw drivers (assorted)
- LAN Tester
- Crimping tools
Assessment Method:
1. Written test
2. Practical test
3. Direct observation
4. Oral questioning
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 136
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 137
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
LEARNING EXPERIENCES
Learning Outcome 4
Inspect And Test The Configured Computer Networks
Learning Activities Special Instructions
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 138
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information Sheet 2.2-4
Inspect computer network configuration
You’ve set up all your network switches, plugged in all the cables and configured all
your computers. One task remains before you can declare your network finished: you
must verify that the network works as expected
Equipment/Facilities Tools & Instrument Supplies & materials
Computer peripherals Multi-tester Connectors rj-45
Desktop computers Diagnostic software Rj-45 modular box
Glasses Appropriate software Bus wires and cables
Mask Assorted Screw drivers Appropriate software
Gloves Crimping tool Computer storage media
Anti-static wrist strap Punch down tool
Usb flash drive
Here are a few simple tests you can conduct to make sure your network is functional.
● Check the physical connections
Check that the link light – the little red or green light next to the RJ-45 port – is lit
on every computer. You must check this light both on the computer itself and on
the switch or router the computer is plugged into. If this light is not on, you have a
connection problem – most likely a bad cable.
● Verify that you can log on
When you’re sure the physical connections are good, you should attempt to log
on to each of your network computers using a valid domain user account.
● Check the network configuration
Click the start button, type cmd and press Enter. Then enter the command
ipconfig/all and press enter
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 139
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
IP Address (version
4)
192.168.15.108
Gate way
192.168.15.1
● This command will spit out numerous lines of information. The line you’re looking
for should resemble this
IPv4 Address………..192.168.15.10
● Verify that the computer can ping each other.
Another basic test you should perform is to use the ping command from a
command prompt to make sure that the computers on your network can contact
one another.
Ping another computer (LAN only)
Click the start button, type cmd and press Enter. Then enter the command
PING 192.168.15.1 and press enter.
Ping a Website (WAN-Internet)
Click the start button, type cmd and press Enter. Then enter the command
PING google.com and press enter.
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 140
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Task Sheet 2.2-2
Configure Local Area Network
Performance Objective: Given a Network Materials (Switch/hub and Ethernet Cable)
together with a Personal Computer you should test the network connectivity of the
computers
Supplies/M aterials and Equipments :
• Personal Computer
• Ethernet Cable
• Personal Protective equipment (if necessary)
• Network Switch/Hub
Steps/ Procedure:
1. Prepare your W orkplace
a. Make sure that you have the necessary Materials/Peripherals
b. Make sure that the workplace is clean and dry.
2. Start
a. Connect Personal Computer using your Ethernet Cable
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 141
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
b. Plug cables to Switch/hub
c. open cmd
d. Type in the IP Address in the command prompt
e. ping computer in LAn and Wan
f. Do the same Procedure to other computer with unique Ip address
Assessment Method:
Performance Criteria checklist
Inspection List
Item to inspect Check daily Check Check
weekly monthly
Check cable connections √ √ √
Check room ventilation √ √ √
Check device temperature √ √
Clean network devices √ √
Check user log on √
Check routers signal √ √
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 142
CRITERIA YES NO
Did the trainee test the local areaPRIME
WEST using ping
HORIZON INSTITUTE, INC.
PAGADIAN CITY
correctly? COMPUTER SYSTEM SERVICING NC II
Did the trainee test the wide area network using ping correctly?
PERFORMANCE CRITERIA CHECKLIST 2.2-2
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 143
WEST PRIME HORIZON INSTITUTE, INC.
PAGADIAN CITY
COMPUTER SYSTEM SERVICING NC II
Information sheet 2.2-4
Check computer network operation
Network monitoring is absolutely necessary for your business. The whole purpose of it is
to monitor your computer network's usage and performance, and check for slow or
failing systems. The system will then notify the network administrator of any
performance issues or outages with some kind of an alarm or an email
Date Developed: Document No.
COMPUTER HARDWARE Issued by:
May 2025
SERVICING NC II
Page |
Developed by: Revision
SET-UP COMPUTER NETWORK #___ 144