Sie sind auf Seite 1von 32

12

TVL – ICT - CSS


Quarter 1 – Module 9:
Setup Network Configuration
TVL – ICT – CSS – Grade 12
Alternative Delivery Mode
Quarter 1 – Module 9: Setup Network Configuration
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writer: Gic G. Deciar
Editors: Reynald M. Manzano
Reviewers: Louelyn M. Lajot and Reynald M. Manzano
Typesetter: Mark Joeben L. Casal
Management Team: Senen Priscillo P. Paulin, CESO V Rosela R. Abiera
Fay C. Luarez, TM, Ed.D., Ph.D. Maricel S. Rasid
Adolf P. Aguilar Elmar L. Cabrera
Nilita L. Ragay, Ed.D
Antonio B. Baguio, Jr., Ed.D

Printed in the Philippines by ________________________

Department of Education –Region VII Schools Division of Negros Oriental

Office Address: Kagawasan, Ave., Daro, Dumaguete City, Negros Oriental


Tele #: (035) 225 2376 / 541 1117
E-mail Address: negros.oriental@deped.gov.ph
12

TVL – ICT – CSS


Quarter 1 – Module 9:
Setup Network Configuration
Introductory Message
For the facilitator:

Welcome to the TVL 12- Computer Systems Servicing Alternative Delivery


Mode (ADM) Module on Setup Network Configuration!

This module was collaboratively designed, developed and reviewed by


educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social, and economic
constraints in schooling.

This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.

In addition to the material in the main text, you will also see this box in the
body of the module:

Notes to the Teacher


This contains helpful tips or strategies that
will help you in guiding the learners.

As a facilitator, you are expected to orient the learners on how to use this
module. You also need to keep track of the learners' progress while allowing
them to manage their own learning. Furthermore, you are expected to
encourage and assist the learners as they do the tasks included in the module.

ii
For the learner:

Welcome to the Computer Systems Servicing Grade 11 Alternative Delivery


Mode (ADM) Module on Setup Network Configuration!

This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and time.
You will be enabled to process the contents of the learning resource while
being an active learner.

This module has the following parts and corresponding icons:

This will give you an idea of the skills or


What I Need to Know competencies you are expected to learn in the
module.

This part includes an activity that aims to


check what you already know about the
What I Know
lesson to take. If you get all the answers
correct (100%), you may decide to skip this
module.
This is a brief drill or review to help you link
What’s In the current lesson with the previous one.

In this portion, the new lesson will be


What’s New introduced to you in various ways; a story, a
song, a poem, a problem opener, an activity
or a situation.
This section provides a brief discussion of the
What is It lesson. This aims to help you discover and
understand new concepts and skills.

This comprises activities for independent


practice to solidify your understanding and
What’s More
skills of the topic. You may check the
answers to the exercises using the Answer
Key at the end of the module.
This includes questions or blank
What I Have Learned sentence/paragraph to be filled in to process
what you learned from the lesson.
This section provides an activity which will
What I Can Do help you transfer your new knowledge or skill
into real life situations or concerns.

iii
This is a task which aims to evaluate your
Assessment level of mastery in achieving the learning
competency.
In this portion, another activity will be given
Additional Activities to you to enrich your knowledge or skill of the
lesson learned.

Answer Key This contains answers to all activities in the


module.
At the end of this module you will also find:

References This is a list of all sources used in developing


this module.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the
module. Use a separate sheet of paper in answering the exercises.
2. Don’t forget to answer What I Know before moving on to the other activities
included in the module.
3. Read the instruction carefully before doing each task.
4. Observe honesty and integrity in doing the tasks and checking your answers.
5. Finish the task at hand before proceeding to the next.
6. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not
hesitate to consult your teacher or facilitator. Always bear in mind that you are
not alone.

We hope that through this material, you will experience meaningful learning and
gain deep understanding of the relevant competencies. You can do it!

iv
What I Need to Know

This module was designed and written with you in mind. This will help you
understand the computer systems. The scope of this module permits its to be used
in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course.

In this module, explore on how to make your packaging design attractive and
marketable.

The module has three lessons, namely;


 Lesson 1 – Understanding System Configuration
 Lesson 2 – IP Configuration
 Lesson 3 – Understanding DHCP and Ping

After going through this module, you are expected to:


1. Check network connectivity of each terminal in accordance with
network design.
2. Diagnose and repair any problem or fault in the network system in line
with standard operating procedures.
3. Configure Network Interface Card (NIC) in accordance with the network design.
4. Carry out communication check between terminals in accordance with
operating systems network configuration guides.
5. Respond to unplanned events or conditions in accordance with
established procedures.

1
Lesson
Understanding System
1 Configuration

What I Know
I.

Direction: Read each item carefully and use your notebook to write
your answers.

Write TRUE if the statement is correct and FALSE if otherwise.


___________ 1. In every personal computer, it is necessary to install a network
driver.

___________ 2. The default subnet mask is, 255.255.0.0.


___________ 3. Assigning an IP Address must be unique.
___________ 4. In setting up Time, you can set time automatically.

___________ 5. DHCP is a Command Prompt command used to test the ability of the
source computer to reach a specified destination computer.
___________ 6. The key to a well-tuned computer system is the proper configuration.

___________ 7. In installing a network driver, compatibility on PC must be


considered.
___________ 8. IP addressing is a number that is used to identify a device on the
network.
___________ 9. The shortcut of Microsoft Configuration is Ipconfig.
___________10. Configuration is the way a system is set up.

Note: If you get 100% correct in this pre- assessment, skip the lesson but if
not and only get 50% to 99% correct, then proceed with the lesson.

2
What’s In

System Configuration is the way a system is set up. It is the collection of


components that make up the system. Configuration can refer to either hardware
or software, or the combination of both. For instance, a typical configuration for a
PC consists of 32MB (megabytes) main memory, a hard disk, a modem, a CD-ROM
drive, a VGA monitor, and the Windows Operating System.

Many software products require that the computer has a certain minimum
configuration. For example, the software might require a graphics display monitor
and a video adapter, a particular microprocessor, and a minimum amount of main
memory capacity.

When you install a new device or program, you sometimes need to configure
it, which means that you need to set various switches and jumpers (for hardware)
and to define values of parameters (for software). For example, the device or
program may need to know what type of video adapter you have and what type of
printer is connected to the computer.

3
What’s New

Direction: Read each item carefully and use your notebook to write your answers.

Write TRUE if the statement is correct and FALSE if otherwise.

_______ 1. A server can run on a workstation computer.

_______ 2. Network services do not include messaging.


_______ 3. UTP is the cheapest cabling choice.
_______ 4. Wireless networking is insecure.
_______ 5. A hub connects two different LANs.

What is It

IP Addressing

An IP address is a number that is used to identify a device on the network.


Each device on a network must have a unique IP address to communicate with other
network devices. Network devices are those that move data across the network,
including hubs, switches, and routers. On a LAN, each host (device that sends or
receives information on the network) and network device must have an IP address
within the same network to be able to communicate with each other.

A person’s name and fingerprints usually do not change. They provide a label
or address for the person’s physical aspect—the body. A person’s mailing address,
on the other hand, relates to where the person lives or picks up mail. This address
can change. On a host, the Media Access Control (MAC) address is assigned to the
host Network Interface Card (NIC) and is known as the physical address. The physical
address remains the same regardless of where the host is placed on the network in
the same way that fingerprints remain with someone regardless of where he or she
goes.

An IP address consists of a series of 32 binary bits (1s and 0s). It is very


difficult for humans to read a binary IP address. For this reason, the 32 bits are
grouped into four 8-bit bytes called octets. An IP address, even in this grouped
format, is hard for humans to read, write, and remember. Therefore, each octet is
presented as its decimal value, separated by a decimal point or period. This format

4
is called dotted-decimal notation. When a host is configured with an IP address, it is
entered as a dotted-decimal number, such as 192.168.1.5.

The logical 32-bit IP address is hierarchical and is composed of two parts. The
first part identifies the network, and the second part identifies a host on that network.
Both parts are required in an IP address. For example, if a host has an IP address of
192.168.18.57, the first three octets, 192.168.18, identify the network portion of the
address, and the last octet, 57, identifies the host. This is called hierarchical
addressing, because the network portion indicates the network on which each unique
host address is located. Routers only need to know how to reach each network, not
the location of each individual host.

Subnet Mask

The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 1 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:

 255.0.0.0: Class A, which indicates that the first octet of the IP


address is the network portion
 255.255.0.0: Class B, which indicates that the first two octets of the
IP address are the network portion
 255.255.255.0: Class C, which indicates that the first three octets
of the IP address are the network portion

Table 1. Default Subnet Masks for Usable IP Addresses

Class A Network Host


Octet 1 2 3 4

Class B Network Host


Octet 1 2 3 4

Class C Network Host


Octet 1 2 3 4

Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are reserved
for research use only.

5
What I Have Learned

I have learned that ____________________________________________


I have realized that ___________________________________________
I will apply ___________________________________________________

Assessment

Direction: Identify what is being asked. Write your answers in you notebook.

_________1. It is a number that is used to identify a device on the network.


_________2. It is the way a system is set up.
_________3. The IP address class which indicates that the first octet of the IP address
is the network portion.
_________4. The IP address class which indicates that the first two octets of the IP
address are the network portion.
_________5. This indicates the network portion of an IP address.
_________6. It is the 32 binary bits which are grouped into four 8-bit bytes.
_________7. An IP address class which is reserved for research use only.
_________8. The address 255.255.255.0 belongs to what class of IP address?
_________9. An IP address class used for multicast groups.
_________10. A notation or a method of writing IP addresses with where value of each
byte is given as a decimal number, and each byte separated by a dot.

6
7
Assessment What’s New What I Know
Lesson 1 Lesson 1 Lesson 1
1. IP Address 1. True 1. True
2. System Configuration 2. False 2. True
3. Class A 3. True 3. True
4. Class B 4. True 4. True
5. Subnet Mask 5. False 5. False
6. Octets 6. True
7. Class E 7. True
8. Class C 8. True
9. Class D 9. False
10. Dotted-decimal 10. True
Notation
Answer Key
Lesson

2 IP Configuration

What I Know
I.

Directions: Write the letter of the correct answer in a clean sheet of paper.
1. Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
2. In which of the following IP address classes does 192.168.1.105 belong to?
a. Class A c. Class C
b. Class B d. Class D
3. Which of the following is a number used to identify a device on a network?
a. Default gateway c. IP address
b. DNS Server d. Subnet mask
4. What command is used to test the ability of the source computer to reach a
specified destination computer?
a. Ipconfig c. Regedit
b. Msconfig d. Ping
5. Which of the following the node in a computer network using the internet
protocol suite that serves as the forwarding host (router) to other networks?
a. Default gateway c. IP address
b. DNS Server d. Subnet mask

Note: If you get 100% correct in this pre- assessment, skip the lesson but if
not and only get 50% to 99% correct, then proceed with the lesson.
What’s In

IpConfig

Ipconfig is a command used to find out the IP address of a certain network


you are connected to.

How to use the ipconfig command?

1. Click on Start Button, then type cmd (command prompt) on the search box.
2. A black screen will appear as shown in the figure below.

Figure 1: Command Prompt Window

3. Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window
will be useful because it shows the IP address, subnet mask and default
gateway of a network you are connected to.

Figure 2: IP Configuration in CMD Window


What’s New

Direction: Give the expanded form of the following acronyms. Write your answer
on your notebook.
1. TCP/IP 6. ISP
2. APIPA 7. NIC
3. DNS 8. ICMP
4. DHCP 9. LAN
5. MAC 10. IP

What is It

Assigning a static IP Address

In a home network with several computers and devices, it is ideal to assign


each of them a specific address. This is for the purpose of avoiding problems when
you do troubleshooting which requires figuring out the IP address of each of them. It
is also a means to prevent address conflicts between the devices. You can also
manage them with ease if you have assigned their own addresses.

Here are the procedures in assigning an IP Address on a windows base


computer system:

1. Open the Control Panel’s Network Connections icon.


2. Open the icon representing your computer’s network connection.

3. Click the Properties button in the Status dialog box.

4. From the list of items, choose Internet Protocol (TCP/IP).


5. Click the Properties button. The Internet Protocol (TCP/IP) Properties
dialog box appears.
.

6. Type the IP address for your computer. Enter the appropriate IP Address
in the IP address section.
7. Type a subnet mask. The value used on a local network is commonly
255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so
type the router’s address. Figure 54 shows an example of assigning an IP
Address, Subnet mask and default gateway.
9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
10. Type the address for the alternate DNS server. The alternate Domain Name
System (DNS) server’s IP address is something that your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.
Assigning a Dynamic IP Address

If more than a few computers comprise the LAN, manually configuring IP


addresses for every host on the network can be time-consuming and prone to errors.
In this case, using a Dynamic Host Configuration Protocol (DHCP) server would
automatically assign IP addresses and greatly simplify the addressing process.

Figure 3: Assigning a Dynamic IP Address

What’s More

Direction: Answer the following questions briefly and write your answer on your
notebook
1. What is an IP address? Explain.
2. Discuss the 4 classes of IP address.
3. Why is it necessary to assign IP address?
4. Compare static IP address from a dynamic IP address.
What I Have Learned

I have learned that ____________________________________________


I have realized that ___________________________________________
I will apply ___________________________________________________

Assessment

Directions: Choose the best letter of your answer and write it on you notebook.

1. Which two components are configured via software in order for a PC to participate
in a network environment?
a. MAC address and IP address c. IP address and kernel
b. shell and subnet mask d. IP address and subnet mask
2. Which of the following IP addresses is public?
a. 10.1.1.1 c. 172.16.4.4
b. 128.107.0.7 d. 192.168.5.5
3. Which of the following class of IP provides a maximum of only 254 host addresses
per network ID?
a. Class A b. Class B c. Class C d. Class D
4. There is _____ Classes of IP address version 4.
a. 5 b. 4 c. 3 d. 2
5. What range of addresses can be used in the first octet of a Class C address?
a. 129-192 c. 1-127
b. 192-223 d. 204-223
6. Which of the following is the INCORRECT IP address?
a. 213.231.56.4 c. 253.251.256.0
b. 176.9.59.4 d. 188.40.139.40
7. The IP 123.213.321.1 belongs to what class?
a. Class A b. Class B c. Class C d. None of these
8. To which IP Class does 236.128.192.142 belong?
a. Class A b. Class B c. Class C d. Class D
9. Which option shows the proper notation for an IPv6 address?
a. 2001,0db8,3c55,0015,abcd,ff13 c. 2001.0db8.3c55.0015.abcd.ff13
b. 2001-0db8-3c55-0015-abcd-ff13 d. 2001:0db8:3c55:0015::abcd:ff13
10. Which device should be used for enabling a host to communicate with another
host on a different network?
a. switch b. hub c. router d. host
What’s More Assessment
Lesson 2 Lesson 2
1. Answers may vary 1. d
2. Answers may vary 2. b
3. Answers may vary 3. c
4. Answers may vary 4. a
5. b
6. c
7. d
8. d
9. d
10. c
What’s New What I Know
Lesson 2 Lesson 2
1. Transmission Control 1. a
Protocol/Internet Protocol 2. c
2. Automatic Private IP Addressing 3. c
3. Domain Name System 4. d
4. Dynamic Host Configuration 5. a
Protocol
5. Media Access Control
6. Internet Service Protocol
7. Network Interface Card
8. Internet Control Message
Protocol
9. Local Area Network
10. Internet Protocol
Answer Key
Lesson
Understanding DHCP
3 and PING

What I Know
I.

Directions: Write the letter of the correct answer on your notebook.


1. Which of the following is the default subnet mask for the class A IP address?

a. 255.0.0.0 c. 255.255.0.0
b. b. 255.255.255.0 d. 255.255.255.255
2. The IP address class of 150.255.255.254.

a. Class A b. Class B c. Class C d. Class D


3. The IP address 192.168.4.50 is
a. Public address c. Private address

b. Multicast address d. Class E address


4. Which of the following is the default subnet mask for the class B IP address?
a. 255.255.0.0 c. 255.0.0.0

b. 255.255.255.0 d. 255.255.255.255
5. An IP address is divided into what two parts?
a. Physical and logical c. Network and subnet

b. Physical and emotional d. Network and host

Note: If you get 100% correct in this pre- assessment, skip the lesson but if
not and only get 50% to 99% correct, then proceed with the lesson.
What’s In

Dynamic Host Configuration Protocol (DHCP) is a software utility used to


dynamically assign IP addresses to network devices. This dynamic process eliminates
the need to manually assign IP addresses. A DHCP server can be set up and the hosts
can be configured to automatically obtain an IP address. When a computer is set to
obtain an IP address automatically, the other entire IP addressing configuration
boxes are dimmed or disabled. The server maintains a list of IP addresses to assign,
and it manages the process so that every device on the network receives a unique IP
address. Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins the
network.

These are the IP address information that a DHCP server can assign to hosts:
 IP address
 Subnet mask
 Default gateway
 Optional values, such as a Domain Name System (DNS) server address

The DHCP server receives a request from a host. The server then selects IP
address information from a set of predefined addresses that are stored in a database.
After the IP address information is selected, the DHCP server offers these values to
the requesting host on the network. If the host accepts the offer, the DHCP server
leases the IP address for a specific period of time.

Using a DHCP server simplifies the administration of a network because the


software keeps track of IP addresses. Automatically configuring TCP/IP also reduces
the possibility of assigning duplicate or invalid IP addresses. Before a computer on
the network can take advantage of the DHCP server services, the computer must be
able to identify the server on the local network. You can configure a computer to
accept an IP address from a DHCP server by clicking the Obtain an IP address
automatically option in the NIC configuration window, as shown in Figure 1.

If your computer cannot communicate with the DHCP server to obtain an IP


address, the Windows operating system automatically assigns a private IP address.
If your computer is assigned an IP address in the range of 169.254.0.0 to
169.254.255.255, it can communicate with only other computers in the same range.
An example of when these private addresses would be useful is in a classroom lab
where you want to prevent access outside to your network. This operating system
feature is called Automatic Private IP Addressing (APIPA). APIPA continually requests
an IP address from a DHCP server for your computer.
Figure 1: Assigning a Dynamic IP Address

What is It

Ping

The ping is a Command Prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually
used as a simple way to verify that a computer can communicate over the network
with another computer or network device.

The ping command operates by sending Internet Control Message Protocol


(ICMP) Echo Request messages to the destination computer and waiting for a
response. How many of those responses are returned, and how long it takes for them
to return, are the two major pieces of information that the ping command provides.

Table 2. Ping Command Syntax

Syntax Description
-t Using this option will ping the target until you force it to stop using
Ctrl-C.
-a - This ping command option will resolve, if possible, the hostname of
an IP address target.
-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request packet
from 32 to 65,527. The ping command will send a 32 byte echo
request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target. The
-f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count Use this ping command option to specify the number of hops
between the computer and the target computer or device that you
would like to be recorded and displayed. The maximum value for
count is 9 so use the tracert command instead. If you are
interested in viewing all hops between two devices.
-s count Use this option to report the time, in Internet Timestamp format,
that each echo request is received and echo reply is sent. The
maximum value for count is 4 which means that only the first four
hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with the -4
option, is only necessary when pinging a hostname.
target This is the destination you wish to ping, which is either an IP
address or a hostname.
/? Use the help switch with the ping command to show detailed
help about the command's several options.

What’s More

Using the ping Command

Ping is one of your most important tools in troubleshooting Internet problems.


It shows you whether the Domain Name Server is working, whether the computer
you are trying to talk to is reachable, and how long it takes to get there. It does this
at a very low level — only the most basic Internet functions have to be up and
running.
Here are the steps:

1. Click on Start Button, then type cmd (command prompt) on the search box.
2. A black screen will appear as shown in the figure below.
3. Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.

Figure 2: Step 3

Figure 3: Pinging

This output shows several things:

 Decoding names to network addresses — A domain name server (DNS)


resolves machine names to numeric addresses. A single machine can have
many names, all of which resolve to the same Internet address. In the example
just given, the name www.google.com resolves to the Internet address
122.2.152.23.

 Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client machine sent
out the ping message until a reply came back (1 ms is 1 millisecond, or one
thousandth of a second). The variability in the times you see reflects that
networks do not always respond identically. Differing amounts of traffic on the
communication lines or differing loads on the server are common causes.
You will see very different response times depending on the access equipment
you use.

 Routing hop count — The part of the replies that says TTL=50 tells you about
the route the message took from one point to another. The acronym TTL
stands for Time to Live, which is a measure of how many rerouting from one
point to another the packet has to go through before IP declares it
undeliverable. The number following TTL (called the hop count) is a number
that usually starts at 255 and counts down by one every time the message
gets rerouted through an intermediary computer.

What I Have Learned

I have learned that ____________________________________________


I have realized that ___________________________________________
I will apply ___________________________________________________

Assessment

OPTION A: Configure an Ethernet NIC to use DHCP

Direction: Configure an Ethernet NIC to use DHCP to obtain an IP address. You


need to follow the procedures given below and apply safety precautions in
accomplishing this task. While doing the activity, you have to answer activity
questions written after every step. Write your answer in a clean sheet of paper.
Your performance will be rated based on the performance rubrics below.
Rubrics for Configuration

A
B D AP P Total
Criteria (90-
(70-74) (75-79) (80-84) (85-89) (=score x %)
100)
Proper
Configuration (30%)
(The configured
hardware was
properly configured
according to job
specification.)
Adherence to the
Procedures (30%)
(The specified job was
done by following the
procedures. Safety
measures were
observed during the
activity.)
Quality of Work
(30%)
(The device was
configured properly.)
Comprehension
(10%)
(Interview/Guide
questions were
answered correctly
according to the job
requirements.)

TOTAL

Legend:
B – Beginner
D – Developing
AP – Approaching Proficiency
P – Proficient
A – Advance
Procedures:

Step 1
 Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.
 Plug the other end of the Ethernet patch cable into the network port on the
NIC in your computer.
 Plug in the power cable of the router if it is not already plugged in.
 Turn on your computer and log on to Windows as an administrator.
 Open Control Panel and go to Network and Sharing Center.
Step 2
 Right-click Local Area Connection, and then choose Properties.
 The Local Area Connection Properties window appears.

Activity Questions. Write your answer on your notebook.


1. What is the name and model number of the NIC in the “Connect using:” field?
2. What are the items listed in the “This connection uses the following items:”
field?

Step 3
 Choose Internet Protocol (TCP/IP).
 Click Properties.
 The Internet Protocol (TCP/IP) Properties window appears.

Activity Questions. Write your answer on your notebook.


3. What is the IP address, Subnet mask, and Default gateway listed in the fields
of the Use the following IP address: area? Answers may vary. If the
computer is configured to obtain an IP address automatically, there will be
no information in the fields.
 Click the Obtain an IP address automatically button.
 Click OK. The Internet Protocol (TCP/IP) Properties window closes.
 Click OK.
 Restart your computer.
Step 4
 Log on to Windows as an administrator.
 Check the lights at the back of the NIC. These lights will blink when there is
network activity.
 Run cmd.
 Type ipconfig/all, and then press the Enter key.
 Ipconfig/all appears.

Activity Questions. Write your answer on your notebook.


4. What is the IP address and subnet mask of the Ethernet Adapter Local
Area Network Connection?
5. What is the IP address of the DHCP server?
6. On what date was the Lease obtained?
7. On what date will the Lease expire?

OPTION B: Direction: Write the letter of the correct answer on your notebook.
1. Which of the following is the default subnet mask for the class A IP address?
a. 255.0.0.0 c. 255.255.0.0

b. b. 255.255.255.0 d. 255.255.255.255
2. The IP address class of 150.255.255.254.
a. Class A b. Class B c. Class C d. Class D

3. The IP address 192.168.4.50 is


a. Public address c. Private address
b. Multicast address d. Class E address
4. Which of the following is the default subnet mask for the class B IP address?
a. 255.255.0.0 c. 255.0.0.0

b. 255.255.255.0 d. 255.255.255.255
5. An IP address is divided into what two parts?
a. Physical and logical c. Network and subnet

b. Physical and emotional d. Network and host

Answer Key

What I Know vary may Answers 7.


Lesson 3 vary may Answers 6.
vary may Answers 5.
1. a vary may Answers 4.
2. b vary may Answers 3.
3. c vary may Answers 2.
4. a vary may Answers 1.
5. d
Lesson 3
Option A
Assessment

d 5.
a 4.
c 3.
b 2.
a 1.

Lesson 3
Option B
Assessment
References
Lesson 1:
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTER_SYSTEMS_AND_NET
WORKS_Content_Standard_Performance_Standard

Lesson 2:
https://www.premiumexam.net/ccna-2-v6-0-rse/ccna-2-rse-6-0-pretest-exam-answers-2018-2019-
100/
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTER_SYSTEMS_AND_NET
WORKS_Content_Standard_Performance_Standard
http://www.certiology.com/quizzes/ip-address-classes-quiz.html

Lesson 3:
https://www.academia.edu/37529638/MODULE_3_CONFIGURING_COMPUTER_SYSTEMS_AND_NET
WORKS_Content_Standard_Performance_Standard

For inquiries or feedback, please write or call:

Department of Education – Schools Division of Negros Oriental


Kagawasan, Avenue, Daro, Dumaguete City, Negros Oriental

Tel #: (035) 225 2376 / 541 1117


Email Address: negros.oriental@deped.gov.ph
Website: lrmds.depednodis.net

Das könnte Ihnen auch gefallen