cblm front

151
Republic of the Philippines Technical Education and Skills Development Authority P hilippine I nternational T echnological S chool Jose Abad Santos St., Digos City Competency – Based Learning Materials Computer Hardware Servicing NC II

Upload: fibrous85

Post on 10-Apr-2015

3.585 views

Category:

Documents


9 download

TRANSCRIPT

Page 1: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Competency – Based Learning MaterialsComputer Hardware Servicing NC II

Unit of Competency : Configure Computer Systems and NetworksModule Title : Configuring Computer Systems and Networks

Page 2: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

TABLE OF CONTENTS Page

Table of content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1How to use CBLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Technical Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Learning Outcome 1: Plan and prepare for configuration . . . . . . . . 5

Learning Experience / Activities . . . . . . . . . . . . . . . . . . . . . . . . . 6 Information Sheet 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . 7 Information Sheet 1.2 . . . . . . . . . . . . . . . . . . . . . . . . . 10 Self-Check 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . 12 Activity Sheet 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . 13

Learning Outcome 2: Configure computer systems and networks. 14 Learning Experience / Activities . . . . . . . . . . . . . . . . . . . . . . . . . 15 Operation Sheet 2.1 . . . . . . . . . . . . . . . . . . . . . . . . . 16 Operation Sheet 2.2 . . . . . . . . . . . . . . . . . . . . . . . . . 55 Operation Sheet 2.3 . . . . . . . . . . . . . . . . . . . . . . . . . 83 Information Sheet 2.1 . . . . . . . . . . . . . . . . . . . . . . . . . 86 Operation Sheet 2.4 . . . . . . . . . . . . . . . . . . . . . . . . . 109 Self Check . . . . . . . . . . . . . . . . . . . . . . . . . 111 Activity Sheet 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . 112

Learning Outcome 3: Inspect and test configured computer systems and networks . . . . . . . . . . . . . . . . . . . . . . . . . 113

Learning Experience / Activities . . . . . . . . . . . . . . . . . . . . . . . . . 114 Operation Sheet 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . 115 Operation Sheet 3.2 . . . . . . . . . . . . . . . . . . . . . . . . . 117 Self Check . . . . . . . . . . . . . . . . . . . . . . . . . 118 Activity Sheet 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . 119

Assessment Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Observation Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Observation and Questioning Checklist . . . . . . . . . . . . . . . . . . . . . . . . . 122Demonstration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123Written Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124Performance Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Answer key 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126Answer key 2.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Answer key 3.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

1

Page 3: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

How to use this CBLM

Welcome to the Module “Configuring Computer Systems and Networks”. This module contains training materials and activities for you to complete.

The unit of competency “Configure Computer Systems and Networks” contains the knowledge, skills and attitudes required for Computer Hardware Servicing course required to obtain the National Certificate (NC) level II.

You are required to go through a series of learning activities in order to compete each of the learning outcomes of the module. In each learning outcome there are information sheets, information sheets and activity sheets. Do this activity on your own and answer the Self Check at the end of each learning activity.

If you have questions, do not hesitate to ask your teacher for assistance.

Recognition of Prior Learning (RPL)

You have already some basic knowledge and skills covered in this module. If you can demonstrate competence to you teacher in a particular skill, talk to him/her so you did not have to undergo the same training again. If you have a qualification or Certificate of Competency from previous trainings show it to him/her. If the skills you required are consistent with and relevant to this module, they become part of the evidence. You can present these RPL. If you are not sure about your competence skills, discuss this with your teacher.

After completing this module, ask your teacher to assess your competence. Result of your assessment will be recorded in your competency profile. All the learning activities are designed for you to complete at your own pace.

In this module, you will find the activities for you to accomplish and relevant information sheets for each learning outcome. Each learning outcome may have more than one learning activity.

This module is prepared to help you achieve the required competency in receiving and relaying information. This will be the source of information that will enable you to acquire the knowledge and skills in Computer Hardware Servicing NC II independently at your own pace with minimum supervision from your trainer.

2

Page 4: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC IIUnit of Competency : Configure Computer Systems and NetworksModule Title : Configuring Computer Systems and Networks

INTRODUCTION:

This module contains information sheets and suggested learning activities in installing computer systems and networks. It includes instructions and procedure on how to install computer systems and networks.

This module consists of three (3) learning outcomes. Each learning outcome contains learning activities supported by instruction sheets. Before you perform the instruction, read the information sheets and answer the self check and activities provided to ascertain to yourself and your teacher that you have acquired the knowledge necessary to perform the skill portion of the particular learning outcome.

Upon completing this module, report to your teacher for assessment to check your achievement of knowledge and skills requirements of this module. If you pass the assessment, you will be given a certificate of completion.

SUMMARY OF LEARNING OUTCOMES

Upon completion of the module the students shall be able to:

1. Plan and prepare for configuration2. Configure computer systems and networks3. Inspect and test configured computer systems and networks

ASSESSMENT CRITERIA:

Refer to assessment criteria of learning outcomes 1-3 of this module.

PREREQUISITES:

None

3

Page 5: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

TECHNICAL TERMS:

Cable Tester - Tests for shorts, opens, miswires, reversals, split pairs, and shield continuity

Crimper - To press or pinch into small regular folds or ridges

Disk Formatting - is the process of preparing a hard disk or other storage medium for use, including setting up an empty file system.

Driver - software driver is a computer program allowing higher-level computer programs to interact with a hardware device.

FDisk (Fixed Disk) - is a commonly used name for a command-line utility that provides disk partitioning functions in an operating system. Usually used for deleting and creating drives or partitions.

Hardware - is a comprehensive term for all of the physical parts of a computer.

Operating System - is an interface between hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of a computer that acts as a host for computing applications run on the machine.

Partitioning - is the act or practice of dividing the storage space of a hard disk drive into separate data areas known as partitions.

RJ 45 - registered jack (RJ) is a standardized physical network interface — both jack construction and wiring pattern — for connecting telecommunications or data equipment to a service provided by a local exchange carrier or long distance carrier.

Software - is a generic term for organized collections of computer data and instructions specific tasks.

Software Installation - Installation (or setup) of a program (including drivers, plugins, etc.) is the act of putting the program onto a computer system so that it can be executed.

UTP - is a type of wiring in which two conductors (the forward and return conductors of a single circuit) are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources; for instance, electromagnetic radiation from Unshielded Twisted Pair (UTP) cables, and crosstalk between neighboring pairs.

4

Page 6: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC IIUnit of Competency : Configure Computer Systems and NetworksModule Title : Configuring Computer Systems and Networks

Learning Outcome 1: Plan and prepare for configuration

ASSESSMENT CRITERIA:

1. Configured computer systems and networks identified from the Job/Service Order or instructions.

2. Planned and prepared job requirements.3. Followed OHS policies and procedures of job requirements.4. Checked computer systems and networks configuration with specified

requirements.5. Checked necessary tools, equipment materials

References:

Module Title : Configuring Computer Systems and NetworksLo1 : Plan and Prepare For Configuration

5

Page 7: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

LEARNING EXPERIENCES / ACTIVITIES:

Learning Outcome 1: Plan and Prepare For Installation

Learning Activities Special Instruction

1. Read Information Sheet 2 – 1.2about the plan and prepare for configuration

2. Do the Self Check Do not write anything on the module Prepare a separate sheet of paper on the

Self-Check and Activity.

3. Read activity sheet 1.1 about the tools and computer equipment.

4. Prepare the Activity Sheet using separate sheet of paper.

6

Page 8: Cblm Front

INFORMATION SHEET No. 1.1

What is System Requirements?

all computer software needs certain hardware components or other software resources to be present on a computer. These pre-requisites are known as (computer) system requirements and are often used as a guideline as opposed to an absolute rule.

Most software defines two sets of system requirements:1. Software Requirements

2. Hardware Requirementslists tested, compatible, and sometimes incompatible

hardware devices for a particular operating system or application

Architecture

All computer operating systems are designed for a particular computer architecture. Most software applications are limited to particular operating systems running on particular architectures

Processing power

The power of the central processing unit (CPU) is a fundamental system requirement for any software.].

Memory

All software, when run, resides in the random access memory (RAM) of a computer. Memory requirements are defined after considering demands of the application, operating system, supporting software and files, and other running processes.

Secondary storage

Hard-disk requirements vary, depending on the size of software installation, temporary files created and maintained while installing or running the software, and possible use of swap space (if RAM is insufficient).

7

Page 9: Cblm Front

Display adapter

Software requiring a better than average computer graphics display, like graphics editors and high-end games, often define high-end display adapters in the system requirements.

Peripherals

Some software applications need to make extensive and/or special use of some peripherals, demanding the higher performance or functionality of such peripherals. Such peripherals include CD-ROM drives, keyboards, pointing devices, network devices, etc.

Software requirements

Software Requirements deal with defining software resource requirements and pre-requisites that need to be installed on a computer to provide optimal functioning of an application. These requirements or pre-requisites are generally not included in the software installation package and need to be installed separately before the software is installed.

Platform

In computing, a platform describes some sort of framework, either in hardware or software, which allows software to run. Typical platforms include a computer's architecture, operating system, or programming languages and their runtime libraries.

APIs and Drivers

Software making extensive use of special hardware devices, like high-end display adapters, needs special API or newer device drivers..

Web browser

Most web applications and software depending heavily on Internet technologies make use of the default browser installed on system.

OPERATING SYSTEM HARDWARE MINIMUM REQUIREMENTS

MINIMUM HARDWARE REQUIREMENTS FOR WINDOWS 98: A personal computer with a 486DX 66 megahertz (MHz) or faster

processor (Pentium central processing unit recommended). 16 megabytes (MB) of memory (24 MB recommended).

8

Page 10: Cblm Front

A typical upgrade from Windows 95 requires approximately 195 MB of free hard disk space, but the hard disk space may range from between 120 MB and 295 MB, depending on your computer configuration and the options that you choose to install.

A full install of Windows 98 on a FAT16 drive requires 225 MB of free hard disk space, but may range from between 165 MB and 355 MB, depending on your computer configuration and that options that you choose to install.

A full install of Windows 98 on a FAT32 drive requires 175 MB of free hard disk space, but may range from between 140 MB and 255 MB, depending on your computer configuration and the options that you choose to install.

One 3.5-inch high-density floppy disk drive. VGA or higher resolution (16-bit or 24-bit color SVGA

recommended).

WINDOWS 2000 PROFESSIONAL MINIMUM SYSTEM REQUIREMENTS:

133 MHz or more Pentium microprocessor (or equivalent). Windows 2000 Professional supports up to two processors on a single computer.

64 megabytes (MB) of RAM recommended minimum. 32 MB of RAM is the minimum supported. 4 gigabytes (GB) of RAM is the maximum.

A 2 GB hard disk that has 650 MB of free space. If you are installing over a network, more free hard disk space is required.

VGA or higher-resolution monitor. Keyboard. Mouse or compatible pointing device (optional).

MINIMUM HARDWARE REQUIREMENTS FOR WINDOWS XP PROFESSIONAL

Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended)

At least 64 megabytes (MB) of RAM (128 MB is recommended) At least 1.5 gigabytes (GB) of available space on the hard disk CD-ROM or DVD-ROM drive Keyboard and a Microsoft Mouse or some other compatible

pointing device Video adapter and monitor with Super VGA (800 x 600) or higher

resolution Sound card Speakers or headphones

INFORMATION SHEET No. 1.2

9

Page 11: Cblm Front

Tools

Crimping Toolis a tool designed to crimp or connect a connector to the end of a cable. For

example, network cables and phone cables are created using a crimping tool to connect the RJ-45 and RJ-11 connectors to the end of the cable. 

Wire CutterWire cutters are hand-tools used to cut wire such as sterling silver, copper, and

gold-filled.

Cable Testeris an electronic device used to verify the electrical connections in a cable or other

wired assembly.

10

Page 12: Cblm Front

Materials

Operating System Installeris an interface between hardware and user which is responsible for the

management and coordination of activities and the sharing of the resources of the computer that acts as a host for computing applications run on the machine.

Startup DiskA boot disk will allow you to boot from the diskette in place of

your hard disk. This diskette can be used to fix problems that may come during the lifetime of your computer

Device Driversis a computer program allowing higher-level computer programs to interact with a

hardware device.

Technical Education and Skills Development Authority

11

Page 13: Cblm Front

Philippine International Technological School

Self – Check 1.1

A. Direction: write your answer on the space provided for:

1. Write the minimum system of the following Operating Systems?CPU Memory Hard disk Video

Windows 98Windows 2000Windows XP professional

B. Direction: Name the following measuring tools and materials:

1. 2. 3.

4. 5.

12

Page 14: Cblm Front

Technical Education and Skills Development AuthorityPhilippine International Technological School

Jose Abad Santos St., Digos City

Activity Sheet 1.1

Identifying Computer Tools and Materials

Supplies and Materials Activity Sheet Paper and Pencil

Tools and Materials Computer Networking tools Computer Software Installation Materials

Direction: the following exercises required you to write notes, label and to draw sketches to describe the Computer Networking tools and materials.

Write your description on this side

Draw your illustration on this side

Crimper

Cable Tester

Motherboard Driver

Module Title : Configuring Computer Systems and NetworksLo1 : Plan and Prepare For Configuration

Technical Education and Skills Development Authority

13

Page 15: Cblm Front

Philippine International Technological SchoolJose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC IIUnit of Competency : Configure Systems and NetworksModule Title : Configuring systems and Networks

Learning Outcome 2: Configure computer systems and networks

Assessment Criteria:

1. Appropriate Personal Protective Equipment are used and OHS policies and procedures followed

2. Normal function of systems and networks checked in accordance with manufacturer’s instructions

3. Fault or problem in the systems and networks diagnosed in line with the standard operating procedures.

4. Computer systems and networks configured in line with the standard operating procedures.

References:

Module Title : Configuring Computer Systems and NetworksLO 2 : Configure computer systems and networks

Republic of the Philippines

14

Page 16: Cblm Front

Technical Education and Skills Development AuthorityPhilippine International Technological School

Jose Abad Santos St., Digos City

LEARNING EXPERIENCES / ACTIVITIES:

Learning Outcome 2: Install Device / System/ Equipments

Learning Activities Special Instructions

1. Read Operation Sheet 2.1 and watch the video about FDISK

2. Do the Self-Check 2.1 Do not write anything on the module Prepare a separate sheet of paper on the

Self-Check and Activity.3. Perform operation sheet 2.1 to 2.2 about installing Operating System Windows XP and Windows 98.4. Perform Operation Sheet 2.1 about how to install Drivers5. read information Sheet 2.1 about Computer networking6. Perform Operation Sheet 2.3 about how to install Drivers

OPERATION SHEET No. 2.1

15

Page 17: Cblm Front

Microsoft's Windows 98 SE - CD Install on Blank Hard Drive

INTRODUCTION

What you will require to do this walkthrough is 

1. A Windows 98 CD

2. A Computer with CD-ROM access

To start this Windows install. First check that the first boot device in your system BIOS is set to the  CD-ROM Drive.

( To find out how to access the BIOS please refer to your motherboard manual or the manufacturer of your computer. (The system bios can usually be entered on boot, usually by pressing the F1, F2, F8, F10

or DEL key. Make sure you save the settings before exiting))

If you are unsure or don't want to enter the BIOS then just test the computer by putting the CD-ROM in the drive and rebooting the computer. This is the recommended way to install windows.

You will know that your computer will/has booted of CD-ROM when the following screen appears.

  

PART 1

  To begin the Windows 98 install select Option 2 (Boot from CD-Rom)

16

Page 18: Cblm Front

The following screen will appear next. Select Option 1. (Start Windows 98 Setup from CD-ROM)

17

Page 19: Cblm Front

Your CD-ROM driver will now install, be patient this may take a few moments.

18

Page 20: Cblm Front

Now press Enter to continue, or F3 to exit.

19

Page 21: Cblm Front

Setup will now perform checks on your system, press Enter to continue.

20

Page 22: Cblm Front

Next Scandisk will run, let this complete or setup.

21

Page 23: Cblm Front

Now setup will copy important files for the install.

22

Page 24: Cblm Front

 

PART 2

 

Setup has now begun, the mouse should now be active, press Continue to proceed. If you have a change of mind then press Exit Setup. If the mouse is not active press "ENTER" on the keyboard.

23

Page 25: Cblm Front

The wizard will now start. Be patient this may take a few moments.

24

Page 26: Cblm Front

Now select the directory you wish to install Windows into. By default C:\Windows will be selected. You can change this, but it is not advised. Click on Next to Continue.

25

Page 27: Cblm Front

Setup will now prepare the directory, be patient this may take a moment.

26

Page 28: Cblm Front

Setup now checks disk space. 

27

Page 29: Cblm Front

What do you wish to install. We recommend Typical, which is the default. So click Next to continue.

28

Page 30: Cblm Front

Windows Components to be installed will now be listed. Leave at default and press Next.

29

Page 31: Cblm Front

If a Network card has been detected the following will appear. Fill in the details and click Next.

30

Page 32: Cblm Front

Now your country settings, select as needed and then press Next.

31

Page 33: Cblm Front

Windows will now copy files, this will take sometime. Be patient

32

Page 34: Cblm Front

 

PART 3

 

After sometime you will be prompted to restart, Windows will do it itself, you can click on Restart Now to quicken the process.

33

Page 35: Cblm Front

The CD-ROM boot menu will appear. Select option 1 (Boot from Hard Disk)

34

Page 36: Cblm Front

Booting for first time screen will appear.

35

Page 37: Cblm Front

Now enter your name, company is optional. Click on Next to continue.

36

Page 38: Cblm Front

Now the License Agreement. Read and if you agree click on "I accept the Agreement" and click next. If you select ""I don't accept the Agreement" then setup will end. 

37

Page 39: Cblm Front

Now input your product key or certificate authenticity code. This is 16 digits and is located on the back of your CD case or on the Windows 98 Book. If you have an OEM computer then it could be on the side or back of your computer. Click next to continue. 

38

Page 40: Cblm Front

Next click on Finish.

39

Page 41: Cblm Front

 

PART 4

 

Setup will now finalize the hardware and install settings.

40

Page 42: Cblm Front

Plug and Play Devices.....

41

Page 43: Cblm Front

Your computer will prompt to restart....

42

Page 44: Cblm Front

The CD boot menu will appear. Select option 1 (Boot from Hard Disk) and press enter.

43

Page 45: Cblm Front

Windows is booting.

44

Page 46: Cblm Front

and continuing the install of devices. 

45

Page 47: Cblm Front

 

PART 5

 

Now select your date/time settings, using the down arrow beside GMT -0800.

46

Page 48: Cblm Front

Once selected click on apply and then OK.

47

Page 49: Cblm Front

Windows will continue to setup Windows items.

48

Page 50: Cblm Front

The computer will now need restarted again.

49

Page 51: Cblm Front

 

PART 6

 

The CD-ROM boot menu will appear. Select Option 1 (Boot from Hard Disk) and press enter.

50

Page 52: Cblm Front

Windows will continue to load.

51

Page 53: Cblm Front

and update System Settings.

52

Page 54: Cblm Front

At long last you have arrived at the desktop. 

53

Page 55: Cblm Front

If you are lucky you will have no drivers to install, but chances are the next step will be to install them. Check out device manager for unknown devices, likely items are Network Cards, Sound Cards, Printers, Scanners, Graphics Cards, Digital Cameras, plus  any other item you have. 

 

THE END

 

 

54

Page 56: Cblm Front

Operation Sheet 2.2

Windows XP Installation

1. Start the computer from the CD.

2. You can press F6 if you need to install additional SCSI adapters or other mass-storage devices. If you do you will be asked to supply a floppy disk with the drivers and you CANNOT browse it (or a CD for that matter). Make sure you have one handy.

3. If you want, you can press F2 to run the ASR sequence. For that you need a good backup created by the Windows XP backup program, and the ASR floppy disk. If you plan to install a new copy of XP - don't do anything.

55

Page 57: Cblm Front

4. Setup will load all the needed files and drivers.

5. Select To Setup Windows XP Professional Now. If you want, and if you have a previous installation of XP, you can try to fix it by pressing R. If not, just press ENTER.

56

Page 58: Cblm Front

6. Read and accept the licensing agreement and press F8 if you accept it.

7. Select or create the partition on which you will install Windows XP Professional. Depending upon your existing disk configuration choose one of the following:

57

Page 59: Cblm Front

If the hard disk is unpartitioned, you can create and size the partition on which you will install Windows XP Professional.

If the hard disk is already partitioned, but has enough unpartitioned disk space, you can create an additional partition in the unpartitioned space.

If the hard disk already has a partition that is large enough, you can install Windows XP Professional on that partition. If the partition has an existing operating system, you will overwrite that operating system if you accept the default installation path. However, files other than the operating system files, such as program files and data files, will not be overwritten.

If the hard disk has an existing partition, you can delete it to create more unpartitioned space for the new partition. Deleting an existing partition erases all data on that partition.

If you select a new partition during Setup, create and size only the partition on which you will install Windows XP Professional. After installation, use Disk Management to partition the remaining space on the hard disk.

8. Select a file system for the installation partition. After you create the partition on which you will install Windows XP Professional, you can use Setup to select the file system with which to format the partition. Windows XP Professional supports the NTFS file system in addition to the file allocation table (FAT) and FAT32 file systems. Windows Server 2003, Windows XP Professional, Windows 2000, and Windows NT are the only Microsoft operating systems that you can use to gain access to data on a local hard disk that is formatted with NTFS. If you plan to gain access to files that are on a local Windows XP Professional partition with the Microsoft Windows 95 or Windows 98 operating systems, you should format the partition with a FAT or FAT32 file system. We will use NTFS.

58

Page 60: Cblm Front

9. Setup will then begin copying necessary files from the installation point (CD, local I386 or network share).

10.Note: If you began the installation process from an MS-DOS floppy, make sure you have and run SMARTDRV from the floppy, otherwise the copying process will probably last more than an hour, perhaps even more. With SMARTDRV (or if setup was run by booting from CD) the copying will probably last a few minutes, no more than 5 max.

11.The computer will restart in graphical mode, and the installation will continue.

59

Page 61: Cblm Front

Step #4: The GUI-based portion of the Setup program

The setup process reboots and loads a GUI mode phase.

It will then begin to load device drivers based upon what it finds on your computer. You don't need to do anything at this stage.

60

Page 62: Cblm Front

1. Click Customize to change regional settings, if necessary.

Current System Locale - Affects how programs display dates, times, currency, and numbers. Choose the locale that matches your location, for example, French (Canada).

Current Keyboard Layout - Accommodates the special characters and symbols used in different languages. Your keyboard layout determines which characters appear when you press keys on the keyboard.

If you don't need to make any changes just press Next.

61

Page 63: Cblm Front

If you do need to make changes press Customize and add your System Locale etc.

62

Page 64: Cblm Front

Note for Hebrew users: Unlike W2K, it is SAFE and it is OK for you to install Hebrew language support at this phase.

To install Hebrew support:

After pressing Customize go to the Languages tab and select the "Install files for complex script and right-to-left languages".

63

Page 65: Cblm Front

A warning message will appear. Press Ok.

64

Page 66: Cblm Front

Warning: You must now press Apply!!!

Setup will copy the necessary files from the installation point.

65

Page 67: Cblm Front

You can now go to the Regional Options tab and select Israel in the Location drop-down list, and Hebrew in the Standards and Formats drop-down list. Click Ok.

66

Page 68: Cblm Front

2. Type your name and organization.

3. Type the product key.

67

Page 69: Cblm Front

4. Type the computer name and a password for the local Administrator account. The local Administrator account resides in the SAM of the computer, not in Active Directory. If you will be installing in a domain, you need either a pre-assigned computer name for which a domain account has been created, or the right to create a computer account within the domain.

68

Page 70: Cblm Front

5. Select the date, time, and time zone settings.

69

Page 71: Cblm Front

6. Setup will now install the networking components.

70

Page 72: Cblm Front

After a few seconds you will receive the Networking Settings window. BTW, if you have a NIC that is not in the HCL (see the What's the HCL? page) and XP cannot detect it, or if you don't have a NIC at all, setup will skip this step and you will immediately go to the final phase of the setup process.

Press Next to accept the Typical settings option if you have one of the following situations:

You have a functional DHCP on your network. You have a computer running Internet Connection Sharing (ICS).

You're in a workgroup environment and do not plan to have any other servers or Active Directory at all, and all other workgroup members are configured in the same manner.

71

Page 73: Cblm Front

Otherwise select Custom Settings and press Next to customize your network settings.

72

Page 74: Cblm Front

7. One thing you CAN do (you don't have to do it, it's your call - read more about it on the Increase Internet Connection Speed in Windows XP page) is to uninstall the Qos Packet Scheduler. Click it and press the Uninstall button. If you want to keep it you can simply remove the mark from the QoS check-box. In anyway you can later install or uninstall it if you want.

Keep the TCP/IP, Client for Microsoft Networks and the File and Print Sharing options selected.

8. Highlight the TCP/IP selection and press Properties.

73

Page 75: Cblm Front

In the General tab enter the required information. You must specify the IP address of the computer, and if you don't know what the Subnet Mask entry should be - you can simply place your mouse pointer over the empty area in the Subnet Mask box and click it. The OS will automatically select the value it thinks is good for the IP address you provided.

74

Page 76: Cblm Front

If you don't know what these values mean, or if you don't know what to write in them, press cancel and select the Typical Settings option. You can easily change these values later.

9. In the Workgroup or Domain window enter the name of your workgroup or domain.

A workgroup is a small group of computers on a network that enables users to work together and does not support centralized administration.

A domain is a logical grouping of computers on a network that has a central security database for storing security information. Centralized security and administration are important for computers in a domain because they enable an administrator to easily manage computers that are geographically distant from each other. A domain is administered as a unit with common rules and procedures. Each domain has a unique name, and each computer within a domain has a unique name.

If you're a stand-alone computer, or if you don't know what to enter, or if you don't have the sufficient rights to join a domain - leave the default entry selected and press Next.

75

Page 77: Cblm Front

If you want to join a domain (NT 4.0 domain of W2K/2003 Active Directory domain) enter the domain's name in the "Yes, make this computer a member of the following domain" box.

76

Page 78: Cblm Front

To successfully join a domain you need the following:

The person performing the installation must have a user account in Active Directory. This account does not need to be the domain Administrator account.

and

The computer must have an existing computer account in the Active Directory database of the domain that the computer is joining, and the computer must be named exactly as its domain account is named.

or

The person performing the installation must have appropriate permission to create a domain account for the computer during installation.

Also, you need to have connectivity to the domain's domain controllers (only to the PDC if on an NT 4.0 domain) and a fully functional DNS server (only in AD domains). Read the Joining a Domain in Windows XP Pro and Requirements when Joining a Domain pages for more on this issue.

Enter the Active Directory domain name (in the form of xxx.yyy, for example: DPETRI.NET) or the NetBIOS name of the NT 4.0 domain (in the form of xxx, for example: DPETRI). Press Next.

Note: If you provide a wrong domain name or do not have the correct connectivity to the domain's DNS server you will get an error message.

A username/password window will appear. Enter the name and password of the domain's administrator (or your own if you're the administrator on the target domain).

77

Page 79: Cblm Front

Note: Providing a wrong username or password will cause this phase to fail.

10.Next the setup process will finish copying files and configuring the setup. You do not need to do anything.

78

Page 80: Cblm Front

11.After the copying and configuring phase is finished, if XP finds that you have a badly configured screen resolution it will advise you to change it and ask you if you see the new settings right.

79

Page 81: Cblm Front

BTW, the minimum supported screen resolution in XP is 800X600.

12.Setup finishes and boots Windows XP.

80

Page 82: Cblm Front

13.A Welcome screen is the first thing you see. The computer checks your Internet connectivity (required for the mandatory Activation and voluntary Registration processes).

81

Page 83: Cblm Front

You will be asked to register your copy of XP. You can decline if you want.

82

Page 84: Cblm Front

14.XP will ask you for the default username that will log onto this computer. You can enter as many as 5 users, but you can create more after the installation is finished.

BTW, the Administrator is not shown as a valid logon option (read more about it on the Add the Administrator's Account to the Welcome Screen in XP Pro page).

15.That's it! you're done!

83

Page 85: Cblm Front

OPERATION SHEET 2.3Installing Driver

Steps:

1. Right click My Computer

2. Click Manage (the Computer management will open)

3. Click Device Manager (devices with “?” indicates that the drivers are not installed)

84

Page 86: Cblm Front

4. Insert the motherboard driver into CD ROM.

5. Wait until the menu auto runs and presents us with a few options along the top including drivers and utilities.

6. click the driver you want to install then click next

85

Page 87: Cblm Front

7. if this window appears don’t click, let it disappears after few seconds

8. Click Next until the finest button appears

9. Remove the motherboard Driver and Let it restart.

86

Page 88: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

INFORMATION SHEET No. 2.4

Computer NetworkingBasics & Troubleshooting

Computer Network

What is meant by the term “Computer Network?”

Computers linked together.

To connect two or more computers together with the ability to communicate with each other.

“Computer Network” is an interconnected collection of autonomous computers.

2 or more computers are said to be interconnected if they are able to exchange information.

Note:-By requiring the computers to be autonomous means ‘there is no master/slave’ relationship. If one computer can forcibly start, stop or control other, the computers are not autonomous.

A computer network is a system for communication between computers. These networks may be fixed (cabled, permanent) or temporary (as via modems).

In the simplest sense, networking means connecting computers so that they can share files, printers, applications, and other computer-related resources.

We connect the computers to share:

• Folders

• Peripheral Devices

• Messages

• Applications

• Database

Other devices give capability for sharing above, but they do not get shared.

87

Page 89: Cblm Front

Goals of computer networking:

Increased manageability

Security

Efficiency

Cost-effectiveness

Categorizing Computer Networks

Local Area Networks

Metropolitan Area Networks

Wide Area Networks

Network Category

Client - Server

Peer To Peer (P2P)

Local Area Network

A local area network (LAN) is a computer network covering a small local area, like a home, office or small group of buildings such as a college. Current LANs are most likely to be based on switched Ethernet or Wi-Fi technology running at from 10 to 1000Mb/s (megabits per second).

Metropolitan Area Network

Metropolitan Area Networks (MAN) are large computer networks usually spanning a campus or a city. They typically use wireless infrastructure or optical fiber connections to link their sites.

Wide Area Network

A wide area network (WAN) is a computer network covering a wide geographical area, involving a vast array of computers. This is different from personal area networks (PANs), metropolitan area networks (MANs) or local area networks (LANs) that are usually limited to a room, building or campus. The best example of a WAN is the Internet.

WANs are used to connect local area networks (LANs) together, so that users and computers in one location can communicate with users and computers in other locations.

Client - Server

The Client/Server is a scalable architecture, whereby each computer or process on the network is either a client or a server. The no. of client computers is more than the Server Computers in such networks.

Server software generally runs on powerful computers dedicated for running an application.

88

Page 90: Cblm Front

Client software generally runs on common PCs or workstations. Clients get most of their information and rely on the application server for things such as files, business application programs, or to offload compute-intensive application tasks back to the server in order to keep the client computer free to perform other tasks.

Properties of a server:

• Passive (Slave)

• Waiting for requests

• On requests serves them and send a reply

Properties of a client:

• Active (Master)

• Sending requests

• Waits until reply arrives

Client - Server

A typical example for a Client – Server architecture is an FTP server where the client and server programs are quite distinct, clients initiate the download/uploads and the servers respond to requests.

Another example for a Client – Server architecture is Domain trees & forests of active directory.

Peer to Peer ( P2P)

Peer-to-Peer, or abbreviated P2P, is a type of network in which each workstation has equivalent capabilities and responsibilities.

This differs from client/server architectures, in which some computers are dedicated to serving the others. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads.

A pure peer-to-peer network does not have the notion of clients or

servers, but only equal peer nodes that simultaneously function as both

"Clients" and "servers" to the other nodes on the network. This model

89

Page 91: Cblm Front

Of network arrangement differs from the client-server model where

Communication is usually to and from a central server.

It relies on the computing power and bandwidth of the participants in

the network rather than concentrating it in a relatively few servers.

P2P networks are typically used for connecting nodes via largely ad hoc connections. Such networks are useful for many purposes, like haring content files containing audio, video, data or anything in digital format.

An example of Peer-to-peer networking is the implementation of a

Workgroup consisting of computers running Microsoft Windows or

any other network operating system.

Comparison

P-2-P (Workgroup)

• Easy Administration

• No Sys. Admin required

• Low cost

• Group of small

• No or Low Security

• Segregated Resources & Management

Client-Server

• Difficult administration

• Needs Sys Admin

• High Cost

• Very large

• High Security

• Centralized Resource & management

Domain & Workgroup

Workgroup: A logical grouping of networked computers that can share resources with each other. Also called peer-to-peer n/w. A user who wants to log on to a computer must have an account in that computer’s local security database. A user with an account on one computer doesn’t necessarily have any permissions or rights to resources on other computers.

Domain: a collection of computers that share a common domain database and security policy. The domain database is stored by one or more Servers called “domain controller”. Workstations are members of domain. Administrator can control users, computers & other resources centrally from DC.

As the data is stored centrally, a user can use his account name & password to log on to any member computer (provided he has rights to do so).

Network Topology

A network topology is the pattern of links connecting pairs of nodes of a network. A given node has one or more links to others, and the links can appear in a variety of different shapes.

90

Page 92: Cblm Front

Difference b/w LAN & WAN

The defining characteristics of LANs in contrast to WANs are:

• much higher data rates,

• smaller geographic range, and

• they do not involve leased telecommunication lines.

OSI Reference Model

Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. OSI was developed in 1984 by the International Organization for Standardization (ISO), a global federation of national standards organizations representing approximately 130 countries. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network.

Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities.

Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.

Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.

Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network.

Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here.

91

Page 93: Cblm Front

Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined.

Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing.

The OSI Reference Model is really just a guideline. Actual protocol stacks often combine one or more of the OSI layers into a single layer.

TCP/IP Model

The TCP/IP architectural model has four layers that approximately match six of the seven layers in the OSI Reference Model. The TCP/IP model does not address the physical layer, which is where hardware devices reside. The next three layers—network interface, internet and (host-to-host) transport—correspond to layers 2, 3 and 4 of the OSI model. The TCP/IP application layer conceptually “blurs” the top three OSI layers.

Protocol

A set of rules for sending information over a network. Protocols can include rules concerning any or all of the following functions:

Data transmission mechanisms

Communication session initialization and termination

Addressing and routing

Authentication and verification

Encryption and compression

Error correction

Note:-Protocols are usually classified according to the layer they correspond to in the Open Systems Interconnection (OSI) reference model for networking.

Protocol Stacks

92

Page 94: Cblm Front

A protocol stack is a group of protocols that all work together to allow software or hardware to perform a function. The TCP/IP protocol stack is a good example. It uses four layers that map to the OSI model as follows:

Layer 1: Network Interface - This layer combines the Physical and Data layers and routes the data between devices on the same network. It also manages the exchange of data between the network and other devices.

Layer 2: Internet - This layer corresponds to the Network layer. The Internet Protocol (IP) uses the IP address, consisting of a Network Identifier and a Host Identifier, to determine the address of the device it is communicating with.

Layer 3: Transport - Corresponding to the OSI Transport layer, this is the part of the protocol stack where the Transport Control Protocol (TCP) can be found. TCP works by asking another device on the network if it is willing to accept information from the local device. Protocols : UDP, TCP.

Layer 4: Application - Layer 4 combines the Session, Presentation and Application layers of the OSI model. Protocols for specific functions such as e- mail (Simple Mail Transfer Protocol, SMTP) and file transfer (File Transfer Protocol, FTP) & HTTP reside at this level.

Protocols

HTTP

FTP

SMTP

TCP

UDP

IP

ARP

ICMP Internet Control Message Protocol

IP Address

A 32-bit (for IPv4) logical address for a host on a TCP/IP network. Each host on a TCP/IP network needs a unique IP address for communication to take place reliably on the network.

The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255 (with some restrictions). For example, 1.160.10.240 could be an IP address.

A Typical IP address looks like this: 216.27.61.137

To make it easy to remember, IP addresses are normally expressed in decimal format as a " dotted decimal number" like the one above. But computers communicate in binary form. Look at the same IP address in binary:

11011000.00011011.00111101.10001001

The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers. Since each of the eight positions can have two different states (1 or 0) the total number of possible combinations per octet is 28 or 256. So each octet can contain any value between 0 and 255. Combine the four octets and you get 232 or a possible 4,294,967,296 unique values!

93

Page 95: Cblm Front

Address Resolution Protocol (ARP)

A TCP/IP network layer protocol responsible for resolving IP addresses into MAC addresses.

When a TCP/IP-aware application tries to access another TCP/IP host using its IP address, the destination host’s IP address must first be resolved into a MAC address so that the frame can be addressed and placed on the wire and then be recognized by the destination host’s network interface card (NIC). This is because network interface cards operate at the physical layer (layer 1) and data-link layer (layer 2) of the Open Systems Interconnection (OSI) reference model and must use physical addresses (such as MAC addresses) instead of logical addresses (such as IP addresses) for network communication.

IP Address

The IP address of a host is partitioned by the network’s subnet mask into two parts, a network ID and a host ID.

What is SUBNET MASK?

Subnet Mask

Subnet masks are used by TCP/IP services and applications to determine whether a given IP address on an internet work is a local network address or a remote network address. It’s a 32-bit number that is used to partition IP addresses into a network ID and a host ID.

How Subnet mask Works

A subnet mask consists of 32 binary digits, the first n of which are 1s and the remaining of which are 0s. When the subnet mask is logically ANDed with a 32-bit IP address of a TCP/IP host, the result is the network ID of the host—the portions of the host’s IP address that identifies which network the host is on. When the inverse of the subnet mask (for example, NOT mask) is logically ANDed with the IP address of the host, the result is the host ID of the host—the portion of the host’s IP address that uniquely identifies the host on its network.

IP Address Classes

The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet. There are five IP classes plus certain special addresses:

94

Page 96: Cblm Front

Default Network - The IP address of 0.0.0.0 is used for the default network.

Class A - This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.

Net Host or Node

115. 24.53.107

Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.

Class B - Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.

Net Host or Node

145.24. 53.107

Class C - Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.

Net Host or Node

195.24.53. 107

Class D - Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net Host or Node

224. 24.53.107

95

Page 97: Cblm Front

Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.

Net Host or Node

240. 24.53.107

Broadcast - Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255.

Networks that are directly connected to the Internet must have their IP addresses assigned by the Internet Network Information Center (InterNIC) or some other authority. Businesses usually obtain these addresses through their local Internet service provider (ISP). However, firewall and proxy server combinations, which are popular on today’s networks, hide a network’s IP addresses from other hosts on the Internet. These private networks can use any IP addresses they choose, although InterNIC recommends the following IP address blocks for private networks:

Class A networks: 10.x.y.z

Class B networks: 172.16.y.z through 172.31.y.z

Class C networks: 192.168.0.z through 192.16.255.z

Note the following considerations for valid IP addressing:

The network ID cannot be 127.

The network ID and host ID cannot both be 255.

The network ID and host ID cannot both be 0.

The host ID must be unique for a given network ID.

Computer Names

Host Name

NetBIOS Name

(Microsoft Windows 2000 & later do not need the NetBIOS names; however, previous version of Windows require NetBIOS to support networking capabilities.)

Host Name

An alias given to a computer on a TCP/IP network to identify it on the network.

Host names are a friendlier way of identifying TCP/IP hosts than IP addresses, and host names can be resolved into IP addresses by host name resolution using a DNS server or hosts files.

Host names can include the characters a–z, A–Z, 0–9, period, and dash (-). To ensure full compatibility with the Domain Name System (DNS), do not use any other special characters in host names.

96

Page 98: Cblm Front

TIP: To find out the host name of a computer running Windows NT or Windows 2000, type hostname at the command prompt.

NetBIOS Name

NetBIOS: Network Basic Input/Output System, a specification created by IBM and Microsoft that allows distributed applications to access each other’s network services independent of the transport protocol used.

NetBIOS Name: A 16-byte name for a networking service or function on a machine running Microsoft Windows NT. NetBIOS names are a more friendly way of identifying computers on a network than network numbers and are used by NetBIOS-enabled services and applications. NetBIOS names are used by Windows NT applications such as Windows Explorer and Network Neighborhood as well as by the Windows NT net commands.

Each service that is NetBIOS-enabled requires a unique NetBIOS name to identify it on the network. This NetBIOS name consists of a name assigned to the computer during installation, which can be up to 15 characters, along with a 1-byte hexadecimal sixteenth character that identifies the type of service or function. The 15-character name can be the computer name, the domain name, or the name of the user who is logged on.

TIP: To view the NetBIOS names registered for your computer, use the nbtstat command.

Domain Name System (DNS)

A hierarchical system for identifying hosts on the Internet or on a private, corporate TCP/IP internetwork. The Domain Name System (DNS) provides

A method for identifying hosts with friendly names instead of IP addresses

A distributed mechanism for storing and maintaining lists of names and IP addresses of hosts

A method for locating hosts by resolving their names into their associated IP addresses so that network communication can be initiated with the host.

The DNS is implemented as a distributed database using name servers located at various points on the Internet. Clients called resolvers can perform name lookups by contacting these name servers, which resolve host names into IP addresses.

Each name server on the Internet is responsible for a subset of the DNS namespace known as a zone of authority. Each zone of authority can consist of one or more domains and subdomains.

The most important name servers on the Internet are the dozen or so root name servers, which are responsible for maintaining the infrastructure of the domain name system. These root name servers are maintained mostly by the Internet Network Information Center (InterNIC) and by U.S. military agencies

Although DNS is used mainly for the Internet, large private TCP/IP internetworks can also use DNS internally with their own name servers. The main advantage of doing this is that host names are friendlier than IP addresses. On smaller TCP/IP networks, hosts files can be used instead of DNS, while on Windows NT–based networks, Windows Internet Naming Service (WINS) is often used for NetBIOS name resolution. Windows NT Server has an installable service called the Microsoft DNS Service, which allows Windows NT servers to function as name servers called DNS servers.

Gateway

Gateways are essentially devices that direct network traffic in some fashion and translate that information.

97

Page 99: Cblm Front

They are commonly used to provide connectivity between two different protocol stacks that might be running on different systems.

Router

A networking device that is used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using dedicated leased lines.

Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI) reference model for networking to move packets between networks using their logical addresses (which, in the case of TCP/IP, are the IP addresses of destination hosts on the network).

Firewall

Any system or device that allows safe network traffic to pass while restricting or denying unsafe traffic. Firewalls are usually dedicated machines running at the gateway point between your local network and the outside world, and are used to control who has access to your private corporate network from the outside—for example, over the Internet. More generally, a firewall is any system that controls communication between two networks.

A firewall is essentially a kind of router or computer with two network interface cards that filters incoming network packets. This device is often called a packet-filtering router.

Patch Cables

A short cable, usually unshielded twisted-pair (UTP) cabling, that connects a port on a patch panel to a port on a hub or a switch. Patch cables are usually terminated at both ends with RJ-45 connectors.

Patch Cables are of two types:

• Parallel Cable: To connect 2 dissimilar devices,

• Cross Cable: To connect 2 similar devices.

Parallel/Straight cables

98

Page 100: Cblm Front

Crossover Cable

Cableing

Network Interface Cards

99

Page 101: Cblm Front

An adapter card that plugs into the system bus of a computer and allows the computer to send and receive signals on a network. A network interface card (NIC) is also known as a network adapter card or simply a network card.

NICs can have one or more connectors for cabling to be attached, such as

• RJ-45 connector for twisted-pair cabling (the most common type)

• BNC connector for thinnet cabling

• DB15 connector for connecting drop cables to thicknet cabling.

Switch

Any device that can control the flow of electrical signals.

In the context of controlling data flow within a network, the term “switch” is also used to describe a data-link layer device that routes frames between connected networks.

Local area network (LAN) switches: Used to route Ethernet frames over a TCP/IP internetwork; also called Ethernet switches

Hub

Also called a repeater hub, the basic networking component used in traditional 10-Mbps Ethernet networks to connect network stations to form a local area network (LAN). Hubs can be used for

• Connecting about a dozen computers to form a workgroup or departmental LAN

• Connecting other hubs in a cascaded star topology to form a larger LAN of up to roughly a hundred computers

The hub receives signals from each station and repeats the signals to all other stations connected to the hub.

Hubs thus perform the function of a repeater and are sometimes called multiport repeaters.

Work on Physical Layer.

Stations wired into a hub form a star topology.

Troubleshooting & Commands

Network Components

There are 4 components required in a machine to be in a network:

• Adapter

• Client Service

• Protocol

• Service

Adapter is the NIC, needed to physically connect to the network.

Client service is used to access server/resource on the network.Eg: Client for Microsoft Networks, Client for NetWare Networks.

Protocol is a set of rules for sending information over a network. Eg: TCP/IP, NetBEUI, IPX/SPX.

Service is background process in an os that provides some specific functionality. Eg: Server service in Microsoft Windows NT and Windows 2000 and File and Printer Sharing for Microsoft Networks in Microsoft Windows 95 and Windows 98, both of which enable sharing of resources over the network.

A Microsoft Windows 95, Windows 98, and Windows 2000 networking component that makes it possible to access file and print services on Windows 95, Windows 98, Windows NT, Windows 2000, Windows for Workgroups, and LAN Manager dedicated servers and peer servers. Client for Microsoft Networks works with any combination of NetBEUI, IPX/SPX-Compatible Protocol, and TCP/IP protocols. Client for Microsoft Networks cannot be used for accessing non-Microsoft servers such as Novell NetWare servers. You must install Client for NetWare Networks to access these servers. Windows 95 and Windows 98 allow you to install more than one client at a time to access different kinds of servers on the network.

How It Works: Use the Network utility in Control Panel to install Client for Microsoft Networks on a computer running Windows 95 or Windows 98. Then use the property sheet of Client for Microsoft Networks to configure the computer to either participate in a workgroup or log on to a Windows NT or Windows 2000 domain.

Commands

100

Page 102: Cblm Front

PING

IPCONFIG

NBTSTAT

REPAIR

TRACERT

PING

Stands for Packet Internet Groper, a TCP/IP utility that verifies the integrity of a network connection with a host on a TCP/IP network. The ping command is one of the first commands to use to troubleshoot communication problems on a TCP/IP network.

The usual procedure for using ping to troubleshoot a TCP/IP network follows:

• Verify that TCP/IP is installed and running by pinging the local loopback address using ping 127.0.0.1.

• Ping your own IP address and host name.

• Ping the IP address of the default gateway for your local network.

• Ping the IP address of a host on a remote network.

Ipconfig

Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

Syntax: Ipconfig

Parameters:

• /all : Displays the full TCP/IP configuration for all adapters. Without this parameter, ipconfig displays only the IP address, subnet mask, and default gateway values for each adapter. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections.

• /renew [Adapter] : Renews DHCP configuration for all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter is available only on computers with adapters that are configured to obtain an IP address automatically.

• /release [Adapter] : Sends a DHCPRELEASE message to the DHCP server to release the current DHCP configuration and discard the IP address configuration for either all adapters (if an adapter is not specified) or for a specific adapter

Few Troubleshooting Steps

Check the IP Address.

Check the Subnet mask, default gateway, DNS.

Ping loopback ip, self ip, gateway, then remote machine.

Disable firewalls & IEEE authentication.

Drivers & other things like lan cable, port etc.

Network: A collection of computers, display terminals, printers, and other devices linked either by physical or wireless means.

Computer Networking

• Internet: A world-wide network connecting millions of computer networks for the purpose of exchanging data and communications using special rules of communication.

• internet: (lower case i) Any network connecting two or more computer networks.

Starting of Networking

101

Page 103: Cblm Front

• 1966: ARPA (Advanced Research Projects Agency) State Defense Department’s research organization.

– Focused major development effort on computer networking.

– ARPA’s Goal: To promote research in advanced future technologies by funding university and industry research proposals.

– Result: Thousands of databases became available to the public

Types of connections of computers into networks: Physical versus Wireless connections

The first type: The Physical Connection.

Physically connect computers together.

Use of wires or optical cables.

The connections are called network links.

Three most common physical links:

Twisted pair

Coaxial cable

Fiber-optic cable

1:- Twisted pair

• Two wires twisted together.

– Makes them less susceptible to acting like an antenna and picking up radio frequency information or appliance noise.

• Telephone Company uses twisted-pair copper wires to link telephones.

2:- Coaxial cable

• Also two wires:

– One of the wires is woven of fine strands of copper forming a tube.

– The wire mesh surrounds a solid copper wire that runs down the center.

– Space between has a non-conducting material.

– Makes them more impervious to outside noise.

3:- Fiber-optic cable

• Light is electromagnetic.

102

Page 104: Cblm Front

• Can transmit more information down a single strand.

– It can send a wider set of frequencies.

• Each cable can send several thousand phone conversations or computer communications.

Second type of connections of computers into networks: Wireless connections

• The link is made using electromagnetic energy that goes through space instead of along wires or cables.

• Three types of wireless communications commonly used in networking:

– Infrared

– Radio frequency

– Microwave

1:- Infrared

• Commonly used in TV and VCR remote controls.

• Use infrared frequencies of electromagnetic radiation that behave much like visible light.

• Must be in the line of sight.

• Often used to connect keyboards, mice, and printers.

2:- Radio frequency

• Uses radio frequencies.

– Function even though line of sight is interrupted.

103

Page 105: Cblm Front

• Not commonly used because of the possible interference from other sources of electromagnetic radiation such as old electric drills and furnace motors.

3:- Microwave

• Often used to communicate with distant locations.

• Must be line of sight.

• Satellite communications use microwaves.

Properties of Transmission

Five basic properties of both the physical and wireless links:

1. Type of signal communicated (analog or digital).

2. The speed at which the signal is transmitted (how fast the data travels).

3. The type of data movement allowed on the channel (one-way, two-way taking turns, two-way simultaneously).

4. The method used to transport the data (asynchronous or synchronous transmission).

5. Single channel (baseband) and multichannel (broadband) transmission.

Type of signal communicated (analog or digital).

• Analog:

Those signals that vary with smooth continuous changes.

– A continuously changing signal similar to that found on the speaker wires of a high-fidelity stereo system.

• Digital:

Those signals that vary in steps or jumps from value to value. They are usually in the form of pulses of electrical energy (represent 0s or 1s).

104

Page 106: Cblm Front

The speed at which the signal is transmitted (how fast the data travels).

• In digital systems: Speed is measured in...

– Bits per second (bps).

• The number of bits (0’s and 1’s) that travel down the channel per second.

– Baud rate

• The number of bits that travel down the channel in a given interval.

• The number is given in signal changes per second, not necessarily bits per second.

MODEM - Modulator Demodulator

• Outgoing: Converts binary data from computer (digital) into telephone compatible signals (analog).

• Incoming: Converts telephone signal (analog) into binary data for the computer (digital).

• Can be an external or internal device (usually a “card”).

The type of data movement allowed on the channel.

• Simplex transmission - One way transmission.

• Half-duplex transmission - Flows only one way at a time.

• Full-duplex transmission - Two-way transmission at the same time.

105

Page 107: Cblm Front

4. The method used to transport the data.

Two types of data transmission, each requiring a different modem.

a:-Asynchronous transmission -

Information is sent byte by byte.

Cheaper and more commonly used.

b:-Synchronous transmission -

Data is sent in large blocks rather than in small pieces.

Preceded by special information, concerning error detection and block size.

These modems are expensive but very fast.

Single channel versus multichannel transmission

• Channel - A path of a signal.

• Single channel - Capable of only sending/receiving one signal at a time.

– Phone line: Single line = single phone call at a time.

• Multichannel - Capable of more than one channel at a time.

– Fiber-optic cable, microwaves, Satellite transmissions

How is it possible to measure the capacity of communications links?

• Bandwidth: Digital

– Number of bits per second (bps) that can be sent over a link.

– The wider the bandwidth, the more diverse kinds of information can be sent.

– Simplest is voice, most sophisticated is moving videos.

• Bandwidth: Analog

– The difference between the highest and lowest frequencies that can be sent over an analog link (like phone lines).

– Measurement is given in hertz (Hz).

• For both: The wider the bandwidth, the more information can flow over the channel.

Node: The generic name given to all devices hooked up to a network.

• Each node must have a unique address assigned to them by the network.

106

Page 108: Cblm Front

• Networks are either direct-connected or those that are not directly linked.

– Direct-connected network: Those whose nodes have direct connections through either physical or wireless links.

• Point-to-point: Simplest version of direct-connected network. Connecting two computing systems.

» Example of point to point: Home to ISP.

– Example of a network that is not directly linked: Internet.

The bus network –

• A continuous coaxial cable to which all the devices are attached.

• All nodes can detect all messages sent along the bus.

The ring network -

• Nodes linked together to form a circle.

• A message sent out from one node is passed along to each node in between until the target node receives the message.

The star network –

• Each node is linked to a central node.

• All messages are routed through the central node, who delivers it to the proper node.

107

Page 109: Cblm Front

The tree network - (hierarchical network)

• Looks like an upside-down tree where end nodes are linked to interior nodes that allow linking through to another end node.

LAN (Local Area Network)

• A collection of nodes within a small area.

• The nodes are linked in a bus, ring, star, tree, or fully connected topology network configuration.

• Benefits of LANs:

– Sharing of hardware resources.

– Sharing of software and data.

– Consolidated wiring/cabling.

– Simultaneous distribution of information.

– More efficient person-to-person communication.

MAN (Metropolitan Area Network)

• Consists of many local area networks linked together.

• Span the distance of just a few miles.

WAN (Wide Area Network)

• Consists of a number of computer networks including LANs.

• Connected by many types of links.

Security of a Network

• Enterprise and intranet networks: Corporations, government agencies, and other organizations have created their own internal networks.

– Firewall: A set of programs that monitor all communication passing into and out of a corporation’s intranet.

• Helps prevent, but doesn’t eliminate, unauthorized access.

General Networking

 

 1.  Q:  What is an IP Addresses?

 

108

Page 110: Cblm Front

IP Stands for Internet Protocol.  An IP Address is the identifier where other computers on the network can contact your computer, when you are connected to the network using the TCP/IP protocols.  The format of IP addresses are 32bit numerical addresses in 4 groups of 3.  It is ranged from 0-255.  For example: 255.255.255.255.  This number allows your computer to be unique on the same network, and able to communicate with other computers on the network. 

2. Q:  What is Dynamic IP Addressing?

 

Dynamic IP Addressing is where the computer will automatically be assigned a new IP Address.  This IP Address will be unique to the network that it is working on, and should not be the same as any other computer on the same network. 

 

3. Q:  What is Static IP Addressing?  

Static IP Addressing is where the computer will have a preconfigured IP Address.  This Address will never change, and will always be the same.  This scheme should be used if you want to keep the same settings on each computer all the time.  If the subnet of the network changes (subnet is the first 3 groups of the IP) the subnet of the static computer must also change. 

109

Page 111: Cblm Front

Technical Education and Skills Development AuthorityPhilippine International Technological School

Jose Abad Santos St., Digos City

OPERATION SHEET 2.1

CHANGING OR CONFIGURING IP ADDRESS, SUBNET MASK, GATE WAY AND DNS SERVER

Steps:1. Right click Network places icon

2. Click Properties

110

Page 112: Cblm Front

3. Right click local area connection icon then click properties.4.

5. Click internet protocol (TCP/IP) from the list box.6.

7. Click use the following IP ADDRESS type the following:IP Address : 192.168.2. # of computerSubnet mask : ‘just press tab after configuring IP address’Default gateway : 192.168.2.1 (router IP address)Preferred DNS Server : ‘ask your ISP’ or you can used your

router IP Address8. Click ok button

111

Page 113: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Self – Check 1.1

A. Direction: write your answer on the space provided for:

Fill the blank

1. the act or practice of dividing the storage space of a hard disk drive into separate data areas

2. Possible number in first octet in class C IP address3. The recommended type of installation4. Describe the format of IP Address 5. type of network in which each workstation has equivalent

capabilities and responsibilities.

112

Page 114: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Activity Sheet 2.1

INSTALLING OPERATING SYSTEM AND DRIVERS

Supplies and materials Activity Sheet UTP RJ45

Materials, tools and Equipment Operating System Motherboard driver Cable tester Crimper Wire Cutter Functional Computer Switch Hub

Direction: the following exercises required you to install the operating system and drivers

1. Install operating system using Windows XP or Related operating system using NTFS as file system with the partition of : 60% for drive C: and 40% for Drive D:

2. Install all driver drivers.3. Configure TCP\IP address using Class C.4. Crimp STRAIGHT THROUGH and perform sharing of printer and do

PRINT TEST to functional computer.5. Crimp Cross Over and perform Sharing of folder.6. Back up My Documents using Daily Back up.

Module Title : Configuring Computer Systems and NetworksLO 2 : Configure computer systems and networks

Republic of the Philippines

113

Page 115: Cblm Front

Technical Education and Skills Development AuthorityPhilippine International Technological School

Jose Abad Santos St., Digos City

Program / Course : Computer Hardware Servicing NC IIUnit of Competency : Configure Computer Systems and NetworksModule Title : Configuring Computer Systems and Networks

Learning Outcome 3: Inspect and test configured computer systems and networks.

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the configuration done on the systems and networks conforms with the manufacture’s instruction/manual

2. Computer systems and networks are checked to ensure safe operation.3. Report is prepared and completed according to company requirements.

References:

Module Title : Configuring Computer Systems and NetworksLo3 : Inspect and test configured computer systems and networks.

114

Page 116: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

LEARNING EXPERIENCES / ACTIVITIES:

Learning Outcome 3: Inspect and test configured computer systems and networks.

Learning Activities Special Instruction

1. Read operation Sheet 3.1 to 3.3

2. perform operation sheet 3.1 to 3.3

3. Do the Self Check Do not write anything on the module Prepare a separate sheet of paper on the

Self-Check and Activity.

2. Read activity sheet 1.1 and perform

115

Page 117: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Operation Sheet 3.1

Task manager

Checking OS performance using Task Manage

Steps:1. Press Ctrl + Alt + Del

2. Click Application Tab( you can see the running and not responding programs)

116

At the bottom you can choice to end the process to switch the process to other program or to open a new task.

Page 118: Cblm Front

3. Click Process Tab

4. Click Performance Tab

5. Click Networking TAB

117

You can select process program and you can end the process

You can see the performance of your system

Page 119: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Operation Sheet 3.2

Testing Patch Cable

Steps:

1. Get the patch cable.

2. insert the patch cable to RJ45 port to cable tester

3. Observe the light of cable tester if the 1 to 8 led are lighted equally.Note: if Straight through the 1 to 8 led of cable tester are lighted concurrently.

If Cross over the light of No. 1 is No. 3 to the other end No. 2 is No. 6 to the other endNo. 3 is No. 1 to the other end No. 2 is No. 6 to the other end

The other end No. is simultaneously.

118

Page 120: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Self – Check 3.1

A. Direction: write your answer on the space provided for:

Enumeration:1. Keys to open Task manager

a. b. c.

2. Light of cable testera. Straight trought

1 to 2 to 3 to 4 to 5 to 6 to 7 to 8 to

b. Cross over1 to 2 to 3 to 4 to 5 to 6 to 7 to 8 to

119

Page 121: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Activity Sheet 3.1

Checking Operating System And Network

Supplies and materials Activity Sheet UTP RJ45

Materials, tools and Equipment Cable tester Crimper Wire Cutter Switch Hub

Direction: the following exercises required you to check the OS and Cable

1. Check the processes and terminate the process of the suspicious viruses2. Check the patch cable ether the patch cable is Cross over or Straight

Trough.

Module Title : Configuring Computer Systems and NetworksLo3 : Inspect and test configured computer systems and networks.

120

Page 122: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Assessment Plan

Program / Course : Computer Hardware Servicing NC IIUnit of Competency : Configure Computer Systems and NetworksModule Title : Configuring Computer Systems and Networks

Assessment Criteria

Assessment Methods

Dem

onst

rati

on

Ob

serv

atio

n

Ora

l Q

ues

tion

ing

Wri

te T

est

Wor

k S

amp

le

LO 1. PLAN AND PREPARE FOR CONFIGURATION

1. Configuring computer systems and networks identified from the Job/Service Order or instructions.

2. Planning and preparing job requirements.3. Followed OHS policies and procedures of job

requirements.4. Checking computer systems and networks

configuration with specified requirements.5. Checking necessary tools, equipment materials as

per job requirements

LO 2. CONFIGURE COMPUTER SYSTEMS AND NETWORKS

1. Appropriate Personal Protective Equipment are used and OHS policies and procedures followed

2. Checking normal function of systems and networks in accordance with manufacturer’s instructions

3. Diagnosing fault or problem in the systems and networks in line with the standard operating procedures.

4. Configuring computer systems and networks in line with the standard operating procedures.

LO 3. INSPECT AND TEST CONFIGURED COMPUTER SYSTEMS AND NETWORKS

1. undertaking final inspections to ensure that the configuration done on the systems and networks conforms with the manufacture’s instruction/manual

2. Checking computer systems and networks to ensure safe operation as per job requirements.

3. Completing report is prepared according to company requirements.

121

Page 123: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Observation Checklist

Trainees’ Name:Trainer’s Name:Name of School:Competency Standards:Unit of Competency:Instructions for the trainer:

1. Observe the trainee [insert description of activity being observed].2. Describe the assessment activity and the date of which it was undertaken.3. Place a tick in the box to show that the student completed each aspect of

the activity to the standard expected in the enterprise.4. Complete the feedback sections of the form.

Date of ObservationDescription of assessment activityLocation of assessment activityThe Trainee…. If yes, tick the

box CanDid the trainees overall performance meet the standard? Yes No

Feedback to trainee:Trainer’s Signature: Date:

Module Title : Installing Computer Systems and NetworksAssessment Plan

122

Page 124: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Observation and Questioning Checklist

Trainees’ Name:Trainer’s Name:Name of School:Competency Standards:Unit of Competency:Instructions for the trainer:

1. Observe the trainee [insert description of activity being observed].2. Describe the assessment activity and the date of which it was undertaken.3. Place a tick in the box to show that the student completed each aspect of

the activity to the standard expected in the enterprise.4. Ask the student a selection of the questions from the attached list to

confirm his/her underpinning knowledge.5. Place a tick in the box to show that the student answered the questions

correctly.6. Complete the feedback sections of the form.

Date of ObservationDescription of assessment activityLocation of assessment activityThe Trainee…. If yes, tick the

box CanDid the trainees overall performance meet the standard? Yes No

Feedback to trainee:Trainer’s Signature: Date:

Module Title : Installing Computer Systems and NetworksAssessment Plan

123

Page 125: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Demonstration

Trainees’ Name:Trainer’s Name:Name of School:Competency Standards:Unit of Competency:Instructions for the trainer:

Given the necessary materials the trainee must be able to:

Materials and Equipment:

The Trainee…. to show if evidence is demonstration

During the demonstration of skills, did the student: Yes No N/AThe trainee’s demonstration was:] Satisfactory Not Satisfactory

Module Title : Installing Computer Systems and NetworksAssessment Plan

124

Page 126: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Written Report

Trainees’ Name:Trainer’s Name:Name of School:Competency Standards:Unit of Competency:TaskYour Task is to: [insert description of task]

Submission date:Use the checklist before as a basis for judging whether the trainee’s report meets the required competency standards.The trainee’s report…. If yes, tick the

box CanDid the trainees overall performance meet the standard? Yes No

Comments:

Trainee’s Signature: Date: Trainer’s Signature Date:

Module Title : Installing Computer Systems and NetworksAssessment Plan

Republic of the Philippines

125

Page 127: Cblm Front

Technical Education and Skills Development AuthorityPhilippine International Technological School

Jose Abad Santos St., Digos City

Performance TestTrainee’s Name: Date:Competency : Test Attempt

1st 2nd 3rd

Directions:

CALL TRANEER, ask trainer to assess your performance in the following critical task and performance critical below.

You will be rated based on the overall evaluation on the right side

OVERALL EVALUATIONLevel Achieved

PERFORMANCE LEVEL

4 – Can perform this skills without supervision and with initiative and adaptability to problem situations.3 – Can perform this skill satisfactorily without assistance or supervision.2 - Can perform this skill satisfactorily, but requires some assistance and / or supervision1 - Can perform this skill satisfactorily, but requires considerable assistance and / or supervision

Teacher will initial level achieve

Performance Yes No N/AFor acceptable achievement, all items should receive a “Yes” or “No” response.Get from performance criteria of the module

Module title Installing Computer Systems and NetworksAssessment

Republic of the Philippines

126

Page 128: Cblm Front

Technical Education and Skills Development AuthorityPhilippine International Technological School

Jose Abad Santos St., Digos City

Answer key 1.1

1. Write the minimum system of the following Operating Systems?CPU Memory Hard disk Video

Windows 98 a 486DX 66

megahertz (MHz)

16 MB 175 MB VGA(16 bit)

Windows 2000 133 MHz 64 MB 2GB VGAWindows XP professional 300

MHz64 MB 1.5 GB Super VGA

(800 x 600)

B. Direction: Name the following measuring tools and materials:

1. Crimper 2. Wire Cutter 3. Cable Tester

4. Start up Disk 5. Motherboard Driver

127

Page 129: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Answer key 2.1

Fill the blank

1. Disk Partitioning the act or practice of dividing the storage space of a hard disk drive into separate data areas

2. 192- 223 Possible number in first octet in class C IP address3. Typical Installation The recommended type of installation4. Compose of 32 bits and 4 octet every octet compose of 8 bits Describe the

format of IP Address 5. Peer to Peer type of network in which each workstation has equivalent

capabilities and responsibilities.

128

Page 130: Cblm Front

Republic of the PhilippinesTechnical Education and Skills Development Authority

Philippine International Technological SchoolJose Abad Santos St., Digos City

Answer key 3.1

Enumeration:1. Keys to open Task manager

a. CTRLb. ALTc. DELETE

2. Light of cable testera. Straight thought

1 to 1 2 to 2 3 to 3 4 to 4 5 to 5 6 to 6 7 to 7 8 to 8

b. Cross over1 to 3 2 to 6 3 to 1 4 to 4 5 to 5 6 to 2 7 to 7 8 to 8

129