SHS CSS PPE Grade 12 4th Week
SHS CSS PPE Grade 12 4th Week
Computer System
Servicing
First Quarter – Week 4
Setting Network Configuration
CSS – Grade 12
Curriculum Guide – Based Exemplar First Edition, 2020
Quarter 1 – Week 4: Setting Network Configuration
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such
agency or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this exemplar are owned by their respective copyright holders. Every effort
has been exerted to locate and seek permission to use these materials from their respective
copyright owners. The publisher and authors do not represent nor claim ownership over them.
1
Most Essential Learning Competency:
LO 1. Setting Network Configuration (TLE_IACSS9-12SUCN-Ia-e-34)
Sub-competency:
1.1 Diagnose and repair any problem or fault in the network system in line with standard
operating procedures.
Objectives
Using the Portfolio Assessment Template provided by your teacher along with this exemplar,
accomplish now your weekly goal setting. Refer to the objectives above. Think of positive
and realistic goals that you can considerably achieve with this exemplar. List them as your
plans. Remember: Do not proceed with this exemplar unless you have accomplished your
goal setting.
What I Know
2. A command line tool which allows the user to trace the route taken by a packet from one
source host to the target host is called _____________.
A. Cmd
B. Iperf
C. Ping
D. Tracert
3. A windows tool which also allows to forced DHCP lease renewal via the /release and
/renew switches.
A. Iperf
B. Ipconfig
C. Ping
D. Tracert
4. It is a open source, cross-platform tool which measures network throughout from one host
to another, allowing the user to confirm that their network is transferring at the expected
rate.
A. Cmd B. DHCP
C. Iperf
D. Ipconfig
5. The advantage of using a _______________ server is that will automatically manage the
distribution of IP addresses to every device connected to your network.
A. DCHP
B. DNS
C. Server
D. TCP
What is It
3
TESTING & TROUBLESHOOTING OF NETWORK
Introduction
Home networking equipment has reached a point of such ubiquity that it will soon be
counted among common household appliances such as your TV, microwave and refrigerator.
Unfortunately, it seems that the extent of most people's troubleshooting knowledge ends with
rebooting their router and whining at the closest person they consider their personal tech
support representative. This guide aims to provide a series of tools which can help you repair
problems yourself, thus alleviating the pressure placed on those around you with any tech
knowledge at all.
The ping tool, one of the simplest network troubleshooting tools available, is present in most
common operating systems. It provides the ability to monitor attempts to transfer and return a
network packet from one point in the network to another, thus proving that basic
communication is possible.
Tracert (Windows command)
A command line tool which allows the user to trace the route taken by a packet from
the source host to the target host. The IP address and hostname of each host are listed, along
with the return time in milliseconds, allowing the user to find the source of delays in their
network infrastructure, good sources for download mirrors and deciding which DNS server to
use. A similar tool is available for Linux and MacOS and is known as traceroute.
4
ipconfig (Windows command)
A Windows tool which displays IP configuration information via the command line.
A robust version of the network configuration options available via the Control Panel,
ipconfig also allows for forced DHCP lease renewal via the /release and /renew switches.
Some of the information display features of ipconfig are available on MacOS and Linux
distrubutions using a tool called ifconfig.
iperf
Iperf is an open source, cross-platform tool which measures network throughput from one
host to another, allowing the user to confirm that their network is transferring at the expected
rate.
Angry IP Scanner
5
Confirming Basic Connectivity
All network troubleshooting is predicated on the assumption that your basic network
connectivity is working as expected. The following are some simple checks that you can
perform to confirm the presence of staple network connectivity. Check Your Link Lights
On a cabled network, the simplest way to confirm a physical connection is to check that the
link lights on the devices at each end of each cable are lit. If a light isn’t lit, check the plugs at
each end to ensure that they’re securely pressed into the network sockets. Link lights are
usually found on the network socket, or on the front of devices such as switches or LAN-
capable routers.
By default, your router will act as a DHCP (Dynamic Host Configuration Protocol) server.
The advantage of using a DHCP server is that it will automatically manage the distribution of
IP addresses to every device connected to your network. In Windows, check that your IP
address is correctly configured by bringing up a command prompt (Windows Key+R, cmd,
Enter) and typing ipconfig. Your router most likely defaults to providing addresses in either
the 192.168.xxx.xxx, or 10.0.x.x ranges. If the IP address for your primary network adaptor is
listed as something other than these ranges use ipconfig /release, then ipconfig /renew to
renew your IP lease with the DHCP server.
Ping Internal and External Hosts
6
Using your Ping tool, attempt to confirm your connection to an internal host. Your router is a
good option because if you can ping it, there is nothing between it and you that should be
causing Internet connectivity issues. To do so, bring up a command prompt and enter ping
[the IP address of your router]. By default, your router will most likely be found at
192.168.0.1, or 10.0.0.1. Having successfully pinged an internal host, attempt to ping a host
external to your network using the command "ping google.com".
Having proven that a physical and logical connection exists for your network, it’s time to
check the higher functioning services such as file sharing and media streaming. Attempt to
copy a file from your current machine to another on the network. Use a small, but reasonably
sized file for this to ensure that transfer rates are performing as expected. Next, attempt to
stream media in much the same way. This time, use a large file like HD video to confirm that
the network is able to maintain the transfer at a steady rate. Using iperf to confirm your
network transfer rates is also suggested.
The most common and arguably the most frustrating problem that faces users of any network
is loss of access to the Internet. Right in the middle of an important IM conversation, gaming
session or video stream, access can evaporate without warning or reason. There are a plethora
of potential causes for this sort of outage, so the best approach is a systematic one. Check
your local machine’s network connectivity. Is the operating system reporting that your
machine is still connected to your local network? Check your physical cable or wireless
connection to confirm whether or not local network access has been affected.
If you are still connected to your local network, the next step is to confirm connectivity to
your router. Do this by attempting to navigate to its administration panel using a web
browser. Simply type the IP address of the router into your address bar. Note that some
brands of routers require the user to specify the network port for access to the admin panel.
Do this by appending the necessary port number to the IP address in your address bar using a
colon. Most routers that require a defined port will default to :8080.
Now that you’ve logged into your router’s admin panel, it is possible to determine whether
external hosts are accessible from that point. Most good routers will have a ping tool built
into the admin panel, often included in a diagnostics tab. If your router can successfully ping
external hosts, while you cannot from your local machine the you can confirm that the
problem exists within your
network and can subsequently be
fixed. As opposed to problems
which exist outside of your
network, and thus are out of your
control.
7
hosts are accessible from that point. Most good routers will have a ping tool built into the
admin panel, often included in a diagnostics tab. If your router can successfully ping external
hosts, while you cannot from your local machine the you can confirm that the problem exists
within your network and can subsequently be fixed. As opposed to problems which exist
outside of your network, and thus are out of your control.
With Remote Desktop Connection, you can connect to a computer running Windows from
another computer running Windows that's connected to the same network or to the Internet.
For example, you can use all of your work computer's programs, files, and network resources
from your home computer, and it's just like you're sitting in front of your computer at work.
To connect to a remote computer, that computer must be turned on, it must have a network
connection, Remote Desktop must be enabled, you must have network access to the remote
computer (this could be through the Internet), and you must have permission to connect. For
permission to connect, you must be on the list of users. Before you start a connection, it's a
good idea to look up the name of the computer you're connecting to and to make sure Remote
Desktop connections are allowed through its firewall.
If you're user account doesn't require a password to sign in, you'll need to add a password
before you're allowed to start a connection with a remote computer.
1. Open System by clicking the Start button , right-clicking Computer, and then
clicking Properties.
2. Click Remote settings. If you're prompted for an administrator password or
confirmation, type the password or
provide confirmation.
8
6. In the Select Users or Groups dialog box, do the following:
o To specify the search location, click Locations, and then select the location you
want to search. o In Enter the object names to select, type the name of the user
that you want to add, and then click OK.
The name will be displayed in the list of users in the Remote Desktop Users dialog
box. Click OK, and then click OK again. Note
• You can’t connect to a computer that's asleep or hibernating, so make sure the settings
for sleep and hibernation on the remote computer are set to Never. (Hibernation is not
available on all computers.) For information about making those changes, see Change,
create, or delete a power plan (scheme).
1. On the remote computer, open System by clicking the Start button , right-clicking
Computer, and then clicking Properties.
2. Under Computer name, domain, and workgroup settings, you can find your computer
name, and its full computer name if your computer is on a domain.
Your network administrator might also be able to give you the name of the computer.
If you're having trouble connecting, Remote Desktop connections might be getting blocked
by the firewall. Here's how to change that setting on a Windows PC. If you're using another
firewall, make sure the port for Remote Desktop (usually 3389) is open.
Your user account must have a password before you can use Remote Desktop to connect to
another computer.
• To find the Remote Desktop Connection shortcut, click the Start button
, click All Programs, and then click Accessories. To quickly open Remote Desktop
Connection, click the Start button , type mstsc in the search box, and then press
Enter.
• Redirecting a device on your computer makes it available for use in a Remote
Desktop session. If a Remote Desktop Connection dialog box appears after you click
Connect and enter your credentials, you can redirect local devices and resources, such
as your local drives or Clipboard. Click Details, and then select the check box for each
item you want to redirect.
In Windows 7, Windows 8 and Windows 8.1, there are many ways to access your Remote
Desktop settings, but there's one method that works the same in all three operating systems:
open the Control Panel and go to System and Security -> System.
In the System window, in the column on the left side, click the link that says "Remote
settings".
10
You can also use search. In Windows 7, search for remote settings and click
the search result that says "Allow
remote access to your computer".
11
sections: Remote Assistance and Remote Desktop. The settings that interest us for this tutorial
are in the latter.
Above you can see the System Properties window as it looks in Windows 8 and Windows
8.1. In Windows 7, the options are the same but organized and named slightly different.
At this point, you can click or tap OK and clients will be able to log in to your computer
via Remote Desktop Connection using the login credentials for administrator level users.
12
You are back to the Remote Desktop Users window. Here, click or tap OK.
Now, the user you added will be able to connect via Remote Desktop Connection to your
computer with his/her login credentials.
Conclusion
After completing the above steps, users will be able to connect to your Windows computer,
provided that your computer is powered on and connected to a network. Computers running
Linux, Mac OS X or Windows can connect using the Remote Desktop protocol. We show you
how to connect to a computer and what you can do once you're connected in the tutorials
recommended below.
13
What I Can Do 1
Direction:
Match the column A to Column B. Write the letter before the number that corresponds
to the right column.
A B
_________4. Ping
_________10. Windows Logo + R
troubleshooting that is present in most common
_________5. Angry IP scanner operating system.
B. A command line tool which allows the user
to trace the route taken by a packet from the
_________6. Ifconfig source host to the target host.
C.A windows tool which displays IP
configuration information via the command
line.
_________7. Traceroute D.Is an open source, cross platform tool which
measures network from one host to another.
14
E. Is an open source application used G.Tracert that is available for Linux and Mac
for traversing a subnet and OS.
providing information on each of its H. The advantage of using this server is that it
active hosts. will automatically manage the distribution
F. IPconfig that is available for Linux of IP address to every device.
and Mac OS. I. It is a device that acts as DHCP Server.
J. Shortcut key for command prompt
What I Can Do 3
Direction:
List down below the steps by step procedure on how to allow Remote Desktop connections
through a Windows Firewall.
Direction:
Choose the letter of the best answer. Write chosen letter on a separate sheet of paper.
1. Tracert command line tool allows the user to trace the route taken by a packet from the
source host to the target host. A similar tool is available for Linux and Mac OS and is
known as _________________.
A. Iproute
B. Iperf
C. Mactracert
D. Traceroute
16