TVL12 Ict-Css W3
TVL12 Ict-Css W3
Technical-
Vocational-
Livelihood (TVL)
ICT – Computer Systems Servicing
Quarter 1 - Week 3
i
Technical-Vocational Livelihood – Grade 12
Self-Learning Module
Week 3 - Module 3
First Edition, 2020
Republic Act 8293 section 176 states that: No copyright shall subsist in
any work of the Government of the Republic of the Philippines. However, prior
approval of the government agency or office wherein the work is created shall
be necessary for exploitation of such work for profit. Such agency of office
may, among other things. Impose as a condition the payment of royalties.
Management Team:
Schools Division Superintendent : Dr. Wilfreda D. Bongalos CESO V
Assistant Schools Div. Superintendent : Dr. Marcelita S. Dignos CESO VI
Chief Education Supervisor, CID : Dr. Oliver M. Tuburan
Education Program Supervisor, LRMDS: Mrs. Teresita A. Bandolon
Education Program Supervisor, TLE : Reynold Q. Velos
ii
Property of DepED-Division of Lapu-Lapu City | www.depedlapulapu.net.ph | (032) 340-7354
INTRODUCTORY MESSAGE
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21 st century skills while taking
into consideration their needs and circumstances.
As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners’ progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the module.
The hand is one of the most symbolized part of the human body. It is
often used to depict skill, action and purpose. Through our hands we may
learn, create and accomplish. Hence, the hand in this learning resource
signifies that you as a learner is capable and empowered to successfully
achieve the relevant competencies and skills at your own pace and time. Your
academic success lies in your own hands!
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.
iii
HOW TO USE THE MODULE
1. Use the module with care. Do not put unnecessary mark/s on any part of
the module. Use a separate sheet of paper in answering the exercises.
4. Observe honesty and integrity in doing the tasks and checking your
answers.
6. Return this module to your teacher/facilitator once you are through with
it.
iv
Lesson 3 – Set Network Configuration
This lesson is designed and written with you in mind. It is here to help
you understand on how to set network configuration. The scope of this
module permits it’s to be used in many different learning situations. The
language used recognizes the diverse vocabulary level of students. The
lessons are arranged to follow the standard sequence of the course.
At the end of this module, you should be able to:
Content Standards:
A. demonstrate an understanding of concepts and principle in setting
up computer networks.
Performance Standards:
A. set up computer networks based established procedures and system
requirements for hardware.
Learning Competency:
1. Check network connectivity of each terminal in accordance with
network design.
A. TRUE OR FALSE
Write True if the statement is correct and False if it is wrong.
B. MULTIPLE CHOICE
Direction: Read the statements carefully. Encircle the letter of the correct
answer.
1. What permission level can view shared files and run shared programs,
but cannot change or delete files?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users
2. What permission level that is available only for shared folders (not shared
files), allows the user to view all files, add files, and change or delete files that
the user adds?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users
3. Which permission level that has the same privileges that you do as the
Owner: They can view, change, add, and delete files in a shared folder?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users
5. Which access permission allows users to create, read, write, rename, and
delete files in the folder and its subfolders?
A. Change C. Read
B. Full Control D. Write
6. What network issue that shows errors such as the network parth cannot
be found,
IP Address could not be found, or DNS name does not exist?
A. DNS Problems
B. Duplicate IP Addresses
C. Local Network in Unable to Connect to the internet
D. Unable to Connect to Local File or Printer Shares
10. What network issue that when two devices attempt to share a single IP,
you see the dreaded "Address Already in Use" error with no ability to access
the network?
A. IP Address Exhaustion C. Duplicate IP Addresses
B. DNS Problems D. Slow Internet Performance
Refer to Answer Key
TVL 12-Computer Systems Servicing 3 DepED-Division of Lapu-Lapu City
What’s In
This is a brief drill or review to help you link the current lesson with the
previous one.
What Is It
This section provides a brief discussion of the lesson. This aims to help you
discover and understand new concepts and skills.
Here are a few simple tests you can conduct to make sure your network
is functional.
Check that the Link light — the little red or green light next to the RJ-
45 port — is lit on every computer. You must check this light both on
the computer itself and on the switch or router the computer is plugged
into. If this light is not on, you have a connection problem — most likely
a bad cable.
When you’re sure the physical connections are good, you should
attempt to log on to each of your network computers using a valid
domain user account.
Using ipconfig
In execute the command, click the Start button, type cmd and press
Enter. From the command prompt, type ipconfig to run the utility with
default options. The output of the default command contains the IP
address, network mask, and gateway for all physical and
virtual network adapters.
This command will spit out numerous lines of information. The line
you’re looking for should resemble this:
IPv4 Address. . . . . . . . . . . : 10.0.0.2(Preferred)
If this part of the output does not show a valid IP address, you need to
check that your IP configuration is set correctly and that your DHCP
server is working.
This message indicates that no Reply messages were received within the
default time of 1 second. This can be due to many different causes; the
most common include network congestion, failure of the ARP request,
packet filtering, routing error, or a silent discard. Most often, it means
that a route back to the sending host has failed. This might be because
the destination host does not know the route back to the sending host,
or one of the intermediary routers does not know the route back, or even
that the destination host's default gateway does not know the route
back. Check the routing table of the destination host to see whether it
has a route to the sending host before checking tables at the routers.
This error message indicates that the requested host name cannot be
resolved to its IP address; check that the name is entered correctly and
that the DNS servers can resolve it.
This message indicates one of two problems: either the local system has
no route to the desired destination, or a remote router reports that it has
no route to the destination. The two problems can be distinguished by
the form of the message. If the message is simply "Destination Host
Unreachable," then there is no route from the local system, and the
packets to be sent were never put on the wire. Use the Route utility to
check the local routing table.
Do several ping tests. First, make sure that TCP/IP is up and running by having
the computer try to ping itself. Open a command prompt and type ping localhost.
The output from this command will indicate whether or not the ping was
successful.
With Windows 7, you don’t have to wait for an error to occur to use the
built-in diagnostics. You can launch a troubleshooting session anytime from
Figure 1. Opening the Troubleshooting item in Control Panel produces this screen.
If you click on the Network and Internet selection, you’ll get the dialog
box shown in Figure 2. There you can choose from seven options that start
sessions for troubleshooting several types of issues: Internet-connection
difficulties, problems accessing files and folders on other computers, and
network-printing troubles.
Choosing any of the seven options launches a wizard that steps you
through diagnosis of the problem, and if possible, automated or manual
correction. The troubleshooter also records an Event Tracing Log (ETL). If the
Each item in the history list represents a separate troubleshoot ing session.
Double-clicking on a session displays the results for it.
To view the details of the detection, click the Detection details link,
and you’ll see a window like the one in Figure 5.
Near the top of the dialog, you’ll see the name of the ETL file that
contains the information from the troubleshooting session. If you want to send
a copy to support staff or Microsoft for analysis, you can save the file by
clicking on its name, which will bring up the File Download dialog.
You can view and analyze ETL files with Network Monitor 3.3. You can
also view the files with Event Viewer and the Tracerpt.exe tool as well as by
converting them to XML or text files with the netsh trace convert command.
You can save the details of the troubleshooting session in a CAB file by right-
clicking the session in the Troubleshooting History window and then selecting
Save As. Just as with ETL files, you can send the CAB file to support staff for
analysis.
Figure 6. Using Network Monitor 3.3 to view the network traffic recorded in an ETL file.
With this new capability, capturing network traffic requires neither end
users nor helpdesk staff to install and use Network Monitor on the computer
having the problem. Note that by default the ETL files generated for
troubleshooting sessions from Control Panel | Troubleshooting do not contain
network traffic information.
You can also use Netsh.exe tracing in conjunction with Control Panel |
Troubleshooting. First, use the appropriate Netsh.exe command to enable
tracing for the scenario. For example, use the netsh trace
scenario=internetclient report=yes command. Use Control Panel |
Troubleshooting to run the Connect to the Internet troubleshooting session.
When complete, run the netsh trace stop command. Now, when you view the
history of the troubleshooting session, you’ll be able to access the CAB file.
To start tracing for more than one scenario, you can specify all of the
appropriate scenarios, such as netsh trace start scenario=File Sharing
scenario=Direct Access. You can create a CAB file with a formatted report by
including the report=yes parameter. Use trace file=parameter to specify a
name and location for the ETL and CAB files. If you want to record network
traffic in the ETL file, include the capture=yes parameter.
For example, here’s the command that will start a trace for the WLAN
scenario, create a CAB file with a formatted report, capture network traffic,
and store the files with the name WLAN Test in the C:\Tshoot folder: netsh
trace start scenario=WLAN capture=yes report=yes trace
file=c:\tshoot\WLANtest.etl. To stop tracing, use the netsh trace stop
command. For more information, see Netsh Commands for Network Trace in
Windows Server 2008 R2.
Before Network Monitor 3.3 can fully display the ETL files generated by
Windows 7, you must configure full Windows parsers. By default, Network
Monitor 3.3 uses stub Windows parsers. To configure full Windows parsers,
click Tools | Options | Parsers. In the list of parsers, click Windows | Stubs
to disable stub parsers and enable full parsers, then click OK.
The first thing that must be done is to gain access to the Network and
Sharing Center in Windows 7. This can be done in one of two ways; the first
way to access it is via the control panel.
Select the Windows 7 or on the bottom left-hand corner and select the
control panel option as shown below:
The second way to gain access to the Network and Sharing Center is to utilize
the network icon which is displayed in the system tray when a network
interface has been enabled.
When this icon is right-clicked the option to open the Network and
Sharing Center is given as shown below:
Once the Network and Sharing Center is open there is an option which
allows the change of adapter settings which is shown in the upper left hand
corner of the window. This is shown highlighted in the following figure (click
on the image to enlarge):
For the purposes of this article the wired interface will be used as the
interface being given a static IP Address.
The first thing that must be done on the first computer used is the
creation of a HomeGroup. This is done through the Choose HomeGroup and
Sharing Options in the Network and Sharing Center window.
The following figure shows how the HomeGroup window will display
when there is an existing HomeGroup on the network. Once this is shown,
simply press theJoin now button and select the local shared options and enter
the HomeGroup password.
When using the Home location, network discovery and HomeGroup are
enabled which allows the easy networking of Windows machines. The Work
location is similar to the Home location but disables the use of the
HomeGroup functionality. The Public location is the most secure and disables
the various sharing functionalities which are enabled then in the other
locations.
Conclusion
If you chose one of the last two options, then you’ll need to click on
Advanced System Settings on the left menu:
Click on the “Change” button to rename the computer, which will pop up this
dialog:
Now you can finally change the name of the computer. You could also change
the name of the workgroup to something more descriptive as well. You’ll have to
reboot after you make this change.
To share items in your Public folder and its subfolders with other users
of your computer, you don’t need to do a thing. By default, all users with an
account on your computer can log on and create, view, modify, and delete files
in the Public folders. The person who creates a file in a Public folder (or copies
an item to a Public folder) is the file’s Owner and has Full Control access. All
others who log on locally have Modify access. For more information on access
levels, see what are permissions?
To share items in your Public folder with network users, click the Start
button , click Network, and then click Network and Sharing Center. Turn on
Public Folder Sharing (for information on how to do this, see sharing files with
the Public folder). You can’t select which network users get access, nor can
you specify different access levels for different users. Sharing via the Public
folder is quick and easy—but it’s rigidly inflexible.
Whether you plan to share files and folders with other people who share
your computer or with those who connect to your computer over the network
(or both), the process for setting up shared resources is the same as long as
the Sharing Wizard is enabled. We recommend that you use the Sharing
Wizard even if you normally disdain wizards. It’s quick, easy, and almost
certain to make all of the correct settings for network shares and NTFS
permissions—a sometimes daunting task if undertaken manually. Once
you’ve configured shares with the wizard, you can always dive in and make
changes manually if you want.
To make sure the Sharing Wizard is enabled, click the Start button ,
type “folder” in the Search box, and then click Folder Options. Click the View
tab. In the Advanced settings box, scroll down the list and make sure the Use
Sharing Wizard (Recommended) check box is selected.
With the Sharing Wizard at the ready, follow these steps to share files or
folders:
1. In Windows Explorer, select the folders or files you want to share. (You
can select multiple objects.)
3. With the Sharing Wizard, it’s quick and easy to share files or folders with
other people
4. In the file sharing box, enter the name of the user with whom you want to
share files or folders, and then click Add. You can type a name in the box or
click the arrow to display a list of available names. Repeat for each person
you want to add. The list includes all of the users who have an account on
your computer, plus everyone. If you want to grant access to someone who
doesn’t appear in the list, you need to create a user account for that person
(for information on how to do this, see Create a user account).
• Reader Users with this permission level can view shared files and
run shared programs but cannot change or delete files. Selecting
Reader in the Sharing Wizard is equivalent to setting NTFS
permissions to Read & Execute.
Note: You might see other permission levels if you return to the Sharing
Wizard after you set up sharing. The Custom permission level identifies
NTFS permissions other than Read & Execute, Modify, and Full Control.
The Mixed permission level appears if you select multiple items, and
those items have different sharing settings. Owner, of course, identifies
the owner of the item.
5. Click Share. After a few moments, the wizard displays a page similar to the page
shown in the following illustration.
The Sharing Wizard displays the network path for each item you’ve shared.
6. In the final step of the wizard, you can do any of the following:
• Send an e-mail message to the people with whom you’re sharing. The
message includes a link to the shared file or folder
Creating a share requires privilege elevation. But, after a folder has been
shared, the shared folder is available to network users no matter who is logged
on to your computer—or even when nobody is logged on.
Confusingly, when you share one of your profile folders (or any other
subfolder of %SystemDrive%\Users), Windows Vista creates a network share
for the Users folder—not for the folder you shared. This isn’t a security
problem; NTFS permissions prevent network users from seeing any folders or
files except the ones you explicitly share. But it does lead to some long UNC
paths to network shares. For example, if you share the My Received Files
subfolder of Documents (as shown after step 5 in the previous section), the
network path is \\CARLPC\Users\Carl\Documents\My Received Files. If
this same folder had been anywhere on your computer outside of the Users
folder, no matter how deeply nested, the network path would instead be
\\CARL-PC\My Received Files. Other people to whom you’ve granted access
wouldn’t need to click through a series of folders to find the files in the
intended target folder. Network users, of course, can map a network drive or
save a shortcut to your target folder to avoid this problem. But you can work
around it from the sharing side, too: Use advanced sharing to share the folder
directly. (Do this after you’ve used the Sharing Wizard to set up permissions.)
Note: Make sure the share name you create doesn’t have spaces. Eliminating
spaces makes it easier to type a share path that works as a link.
The Stop sharing option removes access control entries that are not
inherited. In addition, the network share is removed; the folder will no longer
be visible in another user’s Network folder
Note: The Sharing tab is part of the properties dialog box for a folder, but
not for files. Also, when the Sharing Wizard is disabled, the Share button
The Share button summons the Sharing Wizard, but it’s available only
when the Sharing Wizard is enabled.
Note:
If the folder is already shared, and you want to add another share
name (perhaps with different permissions), click Add, and then type the
name for the new share. The share name is the name that other users will
see in their own Network folders. Windows initially proposes to use the
folder’s name as its share name. That’s usually a good choice, but you’re not
obligated to accept it. If you already have a shared folder with that name,
you’ll need to pick a different name.
When you share a folder, you also make that folder’s subfolders
available on the network. If the access permissions you set for the folder aren’t
appropriate for any of its subfolders, either reconsider your choice of access
permissions or restructure your folders to avoid the problem
7. In the Group or user names box, select the name of the user or
group you
want to manage. The share permissions for the selected user or
group appear in the permissions box.
8.
• Full Control Allows users to create, read, write, rename,
and delete files in the folder and its subfolders. In addition,
users can change permissions and take ownership of files
on NTFS volumes.
• Change Allows users to read, write, rename, and delete files
in the folder and its subfolders, but not create new files.
• Read Allows users to read files but not write to them or
delete them. If you select neither. allow nor Deny, it is still
possible that the user or group can inherit the permission
through membership in another group that has the
permission. If the user or group doesn’t belong to another
such group, the user or group is implicitly denied
permission.
Note:
To remove a name from the Group or user names box, select the name, and
then click Remove. To add a name to the list, click Add. Enter the names of
the users and groups you want to add.
1. Duplicate IP Addresses
When two devices attempt to share a single IP, you see the dreaded
“Address Already in Use” error — with no ability to access the network.
The Quick Fix: The blame for this often rests with your router’s default
DHCP configuration. DHCP is probably trying to assign your new device an
address at the beginning of your subnet, and another device may already
occupy these low-numbered addresses with static IPs. If you’ve just
introduced a new device or server to your network, it may have its own DHCP
server. Simply disable the DHCP server on that device to restore sanity to your
network.
The Preventive Measure: You can take one simple step to avoid IP
conflicts by modifying your router’s configuration to begin assigning DHCP
2. IP Address Exhaustion
The Quick Fix: Some users on cable internet might not have a local
router, in which case IP addresses are assigned on a limited basis directly
from your ISP. You have probably run out of allowed IP addresses from your
ISP. The solution to this is to purchase either a standalone router or WiFi
access point with an integrated router. This creates your own local pool of
internal addresses, ensuring you won’t run out.
If you already have a local router with DHCP, the default address pool
might be too small for your network. By accessing the DHCP settings on the
router, you can adjust the size of the address pool to meet your network’s
needs.
3. DNS Problems
If that doesn’t solve the problem, check any firewall software on the
device to ensure that necessary ports are open to the external network.
Common ports include 80 and 443 for web traffic, plus 25, 587, 465, 110,
and 995 for email.
The Preventive Measure: It’s usually best to leave all workstation TCP/IP
settings to “Automatically assigned.” Use a DHCP server to hand out a
uniform configuration to all devices on the network. If a static IP is needed on
a particular workstation or server, most DHCP servers allow the ability to
create static IP mappings.
The Quick Fix: We can cure sharing problems most efficiently by drilling down
through the possibilities in this order:
3. Ensure all workstations are on the same subnet. This problem typically
only appears on complex networks, however, even simple networks
sometimes have static-IP equipment with an improperly configured
subnet. The result is that external traffic will move about just fine, while
internal traffic will hit unexpected roadblocks.
4. All Windows network adapters will need File and Printer Sharing for
Microsoft Networks, Client for Microsoft Networks, and NetBIOS over
TCP/IP enabled.
The Quick Fix: A router and modem reboot is the first order of business.
The tracert then utility can be used to identify communication breaks. It will
clearly hiccup on the particular router hop that is causing the problem.
Contact your ISP with your findings, providing screenshots as necessary.
The Quick Fix: Use speed test websites, conducting tests from
geographically remote servers. This can pinpoint areas of congestion on the
ISP’s network. In the case of cable internet, the local network is shared
amongst your neighbors, committing your ISP to a costly bandwidth upgrade
when saturation occurs. Report your findings to your ISP so that they can
take steps to resolve the issue.
2. Give simple tests you can conduct to make sure your network is
functional.
Assessment
This is a task which aims to evaluate your level of mastery in
achieving the learning competency.
Self-Check 3.1
A. TRUE OR FALSE
Direction: Write True if the statement is correct and False if it is wrong.
5. Request timed out message indicates that the requested host name
cannot be resolved to its IP address.
9. To show the list of trace providers within a scenario, type netsh trace
show scenario Name.
B. Multiple Choice
Direction: Read the statements carefully. Encircle the letter of the correct
answer.
1. What permission level can view shared files and run shared programs,
but cannot change or delete files?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users
2. What permission level that is available only for shared folders (not shared
files), allows the user to view all files, add files, and change or delete files that
the user adds?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users
3. Which permission level that has the same privileges that you do as the
Owner: They can view, change, add, and delete files in a shared folder?
A. Contributor C. Reader Users
B. Co-owner Users D. Writer Users
5. Which access permission allows users to create, read, write, rename, and
delete files in the folder and its subfolders?
A. Change C. Read
B. Full Control D. Write
6. Which access permission allows users to read, write, rename, and delete
files in the folder and its subfolders, but not create new files.
A. Change C. Read
B. Full Control D. Write
7. It allows users to read files but not write to them or delete them.
A. Change C. Read
B. Full Control D. Write
8. What are you going to use in for you to change sharing permissions or to
stop sharing a file or folder?
A. Customize wizard C. Security wizard
B. General wizard D. Sharing wizard
9. It’s a permission that prevent network users from seeing any folders or
files except the ones you explicitly share.
A. CMD C. FAT
B. DOC D. NTFS
10. Which of the following is NOT the steps on how to create or modify a
network share using advanced settings?
A. Click on the “Change” button to rename the computer
B. Select the Share this Folder check box.
C. Accept or change the proposed share name
D. On the Sharing tab, click Advanced Sharing
Column A Column B
A._______________ B._______________
C._______________ D._______________
E._______________
A.__________________ B.__________________
C.__________________ D.__________________
E.__________________ F.__________________
G.__________________
Module
Module for SET-UP COMPUTER NETWORKS
https://www.slideshare.net/mobile/RoseMaryGaniban/2-
setupcomputernetworks?qid=db730e32-6c89-4f67-be3f-
dba3adffdcc6&v=&b=&from_search=5
Internet
https://www.lifewire.com/ip-config-818377
https://kb.netgear.com/989/Testing-network-connectivity-with-ping
https://www.dummies.com/programming/networking/testing-your-computer-
network/
https://www.cisco.com/c/en_ph/solutions/small-business/resource-
center/networking/networking-basics.html
https://www.cbtnuggets.com/blog/technology/networking/7-common-network-
issues-and-how-to-resolve-them-fast
https://www.techopedia.com/definition/25766/network-
configuration#:~:text=Network%20configuration%20is%20the%20process,other%20
supporting%20devices%20and%20components.
http://tutorial.wmlcloud.com/windows_7/sharing-resources-with-older-windows-
versions-(part-2)---sharing-files-with-public-folders---sharing-files-and-folders-from-
any-folder.aspx
http://tutorial.wmlcloud.com/windows_7/Sharing-Resources-with-Older-Windows-
Versions-(part-3)---Setting-Advanced-Sharing-Properties.aspx
http://www.littlepenang.com.my/
https://beckybeach.net/business/change-your-computer-name-in-windows-7-or-
vista-by-computer-aid/
https://brickmaxx.web.fc2.com/web-acappella-serial-number-mac.html
https://flexdms.zendesk.com/hc/en-us/articles/115009101167-Allowing-Access-to-
the-Accounting-Passwords-Menu-for-Non-Accounting-Users
https://h30434.www3.hp.com/t5/Desktop-Wireless-and-Networking/Network-
adapter-won-t-work/td-p/6752655
https://haftomdesbele.wordpress.com/2015/08/
https://haftomdesbele.wordpress.com/2015/08/26/course-that-should-read-by-
student-of-computer-science/
https://ntrkb.wordpress.com/2014/05/07/using-netsh-trace/
https://ntrkb.wordpress.com/category/tools/
https://quizlet.com/199405024/70-680-windows-7-config-flash-cards/