100% found this document useful (1 vote)
407 views57 pages

Competency-Based Learning Material: Sector Qualification Title Unit of Competency Title

This document provides guidance on using a competency-based learning material for the unit of competency "Set-up Computer Networks". It outlines the learning outcomes covered in the module, including installing network cables, setting network configurations, and testing computer networks. Learners are instructed to complete learning activities and assessments independently, with help from a facilitator as needed. The material also provides information on recognizing prior learning and maintaining a learner diary to document skills and work experience.

Uploaded by

Ryan Nofuente
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
407 views57 pages

Competency-Based Learning Material: Sector Qualification Title Unit of Competency Title

This document provides guidance on using a competency-based learning material for the unit of competency "Set-up Computer Networks". It outlines the learning outcomes covered in the module, including installing network cables, setting network configurations, and testing computer networks. Learners are instructed to complete learning activities and assessments independently, with help from a facilitator as needed. The material also provides information on recognizing prior learning and maintaining a learner diary to document skills and work experience.

Uploaded by

Ryan Nofuente
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 57

COMPETENCY-BASED LEARNING

MATERIAL

Sector : Electronic
Qualification
: COMPUTER SYSTEM SERVICING NC II
Title
Unit of
: Set-Up Computer Networks
Competency
Module
: Setting-Up Computer Networks
Title

CABAY NATIONAL HIGH SCHOOL


Brgy. Cabay,Tiaong, Quezon
CBLM on Computer Date Developed: Document No.: 1
System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 2 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
HOW TO USE THIS COMPETENCY BASED LEARNING
MATERIAL

Welcome to the module in “Setting-Up Computer Networks”. This


module contains training materials and activities for you to complete.

The unit of competency "Set-up Computer Networks" deals with the skills,
knowledge and attitude to install computer system and networks.

This unit covers the outcomes required in setting-up computers networks for
LANs and small-office home-office (SOHO) systems. It consists of competencies to
install network cables, set network configuration, set router/Wi-Fi/ wireless access
point/repeater configuration as well as to inspect and test the configured computer
networks.

You are required to go through a series of learning activities in order to complete


each learning outcome of the module. Each learning outcomes is provided with
Information Sheets (Reference Materials for further reading to help you better
understand the required activities). Follow these activities on your own and answer
the self-check at the end of each learning outcome. You may remove a blank Answer
sheet at the end of each module (or get one from your facilitator/trainer) to write your
answers for each self-check. If you have questions, don’t hesitate to ask your
facilitator for assistance.

Recognition of Prior Learning (RPL)

You may already have some or most of the knowledge and skills covered in this
learner's guide because you have:
 been working for some time
 already completed training in this area.

If you can demonstrate to your trainer that you are competent in a particular skill
or skills, talk to him/her about having them formally recognized so you don't have to
do the same training again. If you have a qualification or Certificate of Competency
from previous trainings, show it to your trainer. If the skills you acquired are still
current and relevant to the unit/s of competency they may become part of the
evidence you can present for RPL. If you are not sure about the currency of your
skills, discuss this with your trainer.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 3 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
At the end of this module is a Learner’s Diary. Use this diary to record important
dates, jobs undertaken and other workplace events that will assist you in providing
further details to your trainer or assessor. A Record of Achievement is also provided
for your trainer to complete once you complete the module.

This module was prepared to help you achieve the required competency, in Setting
up computer network. This will be the source of information for you to acquire
knowledge and skills in this particular trade independently and at your own pace,
with minimum supervision or help from your instructor.

 Talk to your trainer and agree on how you will both organize the Training of
this unit. Read through the module carefully. It is divided into sections, which
cover all the skills, and knowledge you need to successfully complete this
module.

 Work through all the information and complete the activities in each section.
Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.

 Most probably your trainer will also be your supervisor or manager. He/she is
there to support you and show you the correct way to do things.

 Your trainer will tell you about the important things you need to consider when
you are completing activities and it is important that you listen and take notes.

 You will be given plenty of opportunity to ask questions and practice on the
job. Make sure you practice your new skills during regular work shifts. This
way you will improve both your speed and memory and also your confidence.

 Talk to more experience workmates and ask for their guidance.

 Use the self-check questions at the end of each section to test your own
progress.

 When you are ready, ask your trainer to watch you perform the activities
outlined in this module.

 As you work through the activities, ask for written feedback on your progress.
Your trainer keeps feedback/ pre-assessment reports for this reason. When
you have successfully completed each element, ask your trainer to mark on
the reports that you are ready for assessment.
CBLM on Computer Date Developed: Document No.: 1
System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 4 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
 When you have completed this module (or several modules), and feel confident
that you have had sufficient practice, your trainer will arrange an appointment
with accredited competency assessor to assess you. The results of your
assessment will be recorded in your competency Achievement Record.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 5 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
COMPETENCY BASED LEARNING MATERIALS

COMPUTER SYSTEM SERVICING NC II


CORE COMPETENCIES

No Unit of Competency Module Title Code

Install and configure Installing and configuring


1 ELC724331
computer systems computer systems

Set-up Computer Setting-up Computer


2 ELC724332
Networks Networks

Set-up Computer Setting up Computer


3 ELC724333
Servers Servers

Maintain and Repair


Maintaining and Repairing
4 Computer Systems and ELC724334
Computer Networks
Networks

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 6 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
TABLE OF CONTENTS
TOPICS Pages

How to use CBLM ………………………………. 3-5

Core competencies ………………………………. 6

Table of Contents ………………………………. 7-8

Module content ………………………………. 9

Competency summary ………………………………. 10-12

Introduction ………………………………. 13 - 14

Learning experiences ………………………………. 15

Information sheet 2.1-1 ………………………………. 16-21


Computer Network Concepts

Self-check 2.1-1 ………………………………. 22-23

Answer key 2.1-1 ………………………………. 24

Information sheet 2.1-2 ………………………………. 25-31


Tools, Equipment and Testing

Self-check 2.1-2 ………………………………. 32

Answer key 2.1-3 ………………………………. 33

Information sheet 2.1-3


Occupational Health and Safety ………………………………. 34-36
(OHS) Policies and Procedures

Self-check 2.1-3 ………………………………. 37

Answer key 2.1-3 ………………………………. 38

Information sheet 2.1-4


Prepare Network Copper Cable and ………………………………. 39-45
Testing

Self-check 2.1-4 ………………………………. 46


CBLM on Computer Date Developed: Document No.: 1
System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 7 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
Answer key 2.1-4 ………………………………. 447

Operation Sheet 2.1-4 ………………………………. 48

Job sheet no. 2.1-4 ………………………………. 49

Performance criteria checklist 2.1-4 ………………………………. 50

Information sheet 2.1-5 ………………………………. 51-53


Network Cable Installation

Self-check 2.1-5 ………………………………. 54

Answer key 2.1-5 ………………………………. 55

Task sheet no. 2.1-5 ………………………………. 56

Performance criteria checklist 2.1-5 ………………………………. 57

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 8 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
MODULE CONTENT
Learning Progress Training
Learning Content
Outcome Check Duration
Install network  Computer network concepts 20 hours
cables  Occupational Health & Safety
(OHS) Policies and Procedures
 Copper and Fiber optic cable
splicing installation
requirements and cable testing
 Network cable installation
Set network  network design 20 hours
configuration o addressing
o subnetting
o topology
 IPV4 and IPV6
Set router/Wi-  Router/Wi-Fi/ wireless access 20 Hours
Fi/ wireless point/repeater configuration
access  Network interface card (NIC)
point/repeater settings
 network cables
configuration
 cable raceways/ducts
 Device systems settings
configuration
 Local area network (LAN) port
configuration
 Wide area network (WAN) port
configuration
 Wireless settings configuration
 Security/Firewall/Advance
settings configuration
 Cloud computing
Inspect and  Network connectivity testing 20 Hours
test the  Philippine Electrical Code
configured relevant to data connection
computer  OHS standards and 5S
principles
networks
 Practicing 3Rs – reduce, re-use,
recycle/recover
 3Rs environmental policies
 Managing waste from electrical
and electronic equipment
(WEEE)

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 9 of 57
Up Computer Guinto, Jewel CNHS.
Networks Lucky Lyn R. Tiaong
COMPETENCY SUMMARY

Unit of
SET-UP COMPUTER NETWORKS
Competency

Module Title SETTING-UP COMPUTER NETWORKS

Module Descriptor This unit covers the outcomes required in setting- up


computers networks for LANs and small-office home-
office (SOHO) systems. It consists of competencies to
install network cables, set network configuration, set
router/Wi-Fi/ wireless access point/repeater
configuration as well as to inspect and test the
configured computer networks.

Nominal Duration 80 HOURS

Learning LO1. Install network cables


Outcomes
LO2. Set network configuration

LO3. Set router/Wi-Fi/ wireless access


point/repeater configuration

LO4. Inspect and test the configured computer


networks

Assessment 1. Determined and planned cable routers in accordance


with network design and actual installation site.
Criteria 2. Identified network materials necessary to complete
the work and obtained in accordance with established
procedures and checked against system
requirements.
3. Obtained tools, equipment and testing devices needed
to carry out the installation work in accordance with
established procedures and checked for correct
operation and safety.
4. Used appropriate personal protective equipment and
followed OHS policies and procedures.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 10 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
5. Performed copper cable splicing based on Electronic
Industries Alliance/Telecommunications Industry
Association (EIA/TIA) standards.
6. Installed cables and cable raceway in accordance with
established procedure and installation requirements.
7. Performed and checked installation work to ensure no
unnecessary damage has occurred and complies with
requirements.
8. Followed OHS standards and 5S principles according
to enterprise requirements.
9. Disposed excess components and materials based on
WEEE directives and 3Rs waste management
program.
10. Checked network connectivity or each terminal in
accordance with network design.
11. Diagnosed any fault or problem in the network system
and remedied in line with the standard operating
procedures.
12. Configured network interface card (NIC) settings in
accordance with network design.
13. Carried out communication checking between
terminals in accordance with OS network
configuration guides.
14. Responded to unplanned events or conditions in
accordance with established procedures.
15. Configured client device systems settings in
accordance with manufacturer’s instructions and
end-user preferences.
16. Configured local area network (LAN) ports in
accordance with manufacturer’s instructions and
network design.
17. Configured wide area network (WAN) ports in
accordance with manufacturers’ instructions and
network design.
18. Configured wireless settings in accordance with
manufacturer’s instructions, network design and
end-user preferences.
19. Configured security/firewall advance settings in
accordance with manufacturers’ instructions and
end-user preferences.
20. Undertaken final inspection to ensure that the
configuration done on the computer networks
conforms with the manufacturer’s
instruction/manual.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 11 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
21. Checked computer networks to ensure safe
operation.
22. Prepared/Completed reports according to
company requirements.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 12 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
LEARNING OUTCOME 1 : Install Network Cables

CONTENT:
Computer network concepts
Occupational Health & Safety (OHS) Policies and Procedures
Copper cable splicing and cable testing
Network cable installation

ASSESSMENT CRITERIA:
1. Determined and planned cable routers in accordance with network design and
actual installation site.
2. Identified network materials necessary to complete the work and obtained in
accordance with established procedures and checked against system
requirements.
3. Obtained tools, equipment and testing devices needed to carry out the
installation work in accordance with established procedures and checked for
correct operation and safety.
4. Performed copper cable splicing based on Electronic Industries
Alliance/Telecommunications Industry Association (EIA/TIA) standards.
5. Installed cables and cable raceway in accordance with established procedure
and installation requirements.
6. Performed and checked installation work to ensure no unnecessary damage
has occurred and complies with requirements.
7. Followed OHS standards and 5S principles according to enterprise
requirements

CONDITIONS:

Student/ trainee must be provided with the following

Tools: Crimping tools, Pliers, Screw drivers, Protective eyewear, Cable Tester,
Network Interface Card, Router, Modem
Equipment: PC or Workstations
Materials and Supplies: Occupational Health and Safety policies and
procedure manual, device manual, hardware diagrams, UTP cables, RJ45
connector, appropriate software applications and programs

METHODOLOGY:
Lecture / Discussion
Modular / Self-Paced Method
Demonstration

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 13 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
ASSESSMENT METHOD:
Demonstration with oral questioning
Interview
Written Test
Portfolio

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 14 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
LEARNING EXPERIENCE
Learning Outcome 1
Install Network Cables

Learning Activities Special Instructions

1. Read Information Sheet 2.1-1 The Competency Install Network


Computer Network Concepts Cables deals the preparation of
2. Answer Self Check 2.1-1 to measure computer cable for networking.
your Knowledge on the topic This Learning Outcome will
discuss computer network concepts,
3. Read Information Sheet 2.1-2 Tools,
identify the different tools, equipment
Equipment and Testing
and testing devices, the steps in
4. Answer Self Check 2.1-2 to measure preparing network cable which are
your Knowledge on the topic essential in the installing network
5. Read Information Sheet 2.1-3 cables.
Occupational Health & Safety (OHS) The Information Sheets gives you
Policies and 5S Principles. information on the installation of
6. Answer Self-Check 2.1-3 to measure network computer cable that you will be
your Knowledge on the topic using in working with the Self Check.
Compare answers with the Answer
7. Read Information Sheet 2.1-4
Key. You are required to get all the
Prepare Network Copper Cable and
answers correct. If not, read the
Testing
Information Sheet again to answer all
8. Answer Self Check 2.1-4 to measure questions correctly.
your Knowledge on the topic Perform Job Sheets, Operation
9. Perform Job Sheet 2.1-4 Prepare Sheets and use the Performance
Network Copper Cable & Testing. Checklist as your guide in doing the
10. Evaluate your performance with activity.
Performance Criteria Checklist 2.1-4 The Network Cable is the output of
11. Perform Operation Sheet 2.1-4 Use this LO. This network cable should be a
Cable Tester. Straight-Through Cable A, Straight-
Through Cable B, and Cross-over Cable.
12. Read Information sheet 2.1-4
It shall be used as one of your portfolio
Network Cable Installation
for your Institutional Competency
13. Answer Self check 2.1-4 to measure Evaluation for Set-up Computer
your Knowledge on the topic Network.
After completing all the activities of
this LO, you are ready to proceed to the
next learning outcome on Setting-up
Computer Networks.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 15 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
INFORMATION SHEET 2.1-1
Computer Network Concepts

Learning Objectives:

After reading this information sheet, you must be able to:

1. Understand the use of computer networking


2. List the various types of network and network categories
3. Identify the different network hardware used in computer systems and networks

A computer network is a group of computer systems and other computing


hardware devices that are linked together through communication channels to
facilitate communication and resource-sharing among a wide range of users.
Computers in a network are called nodes. A connection between computers can be
done through cabling most commonly the internet cable or wirelessly through radio-
waves.
Networks are used to:

 Facilitate communication via email, video conferencing, instant messaging, etc.


 Enable multiple users to share a single hardware device like a printer or scanner
 Enable file sharing across the network
 Allow for the sharing of software or operating programs on remote systems
 Make information easier to access and maintain among network users

A server is the computer on the network that manages the network resources,
such as the shared files, programs and printers.
Local Area Network (LAN) is a computer network covering a small geographic
area, like a home, office, or group of buildings.
The majority of networking, particularly at the corporate level, is done using
the internet standard. At the center of the basic diagram of a wired network is either
a hub or a switcher and computers are connected to the hub, much like spokes of a
wheel or star. Each connection is called a port.

FOUR BASIC NETWORK CATEGORIES


Personal Area Network (PAN) - it let devices communicate over the range of a
person. A common example is a wireless network that connects a computer
with its peripherals. Almost every computer has an attached monitor,
keyboard, mouse, and printer.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 16 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
So many new users have a hard
time finding the right cables and
plugging them into the right little holes
(even though they are usually color
coded) that most computer vendors
offer the option of sending a technician
to the user’s home to do it. To help these
users, some companies got together to
design a short-range wireless network
called Bluetooth to connect these
components without wires. The idea is
that if your devices have Bluetooth,
then you need no cables. You just put Bluetooth PAN Configuration
them down, turn them on, and they
work together.

 Local Area Network (LAN) – the smallest of the three network types, consists
of PCs connected together within a limited area, such as within the same
building, floor or department.
A sample LAN layout is given below:

 Metropolitan Area Network (MAN) – is a network that spans no more than


50 miles. It is design to connect LANs spanning a town or city.
A MAN usually spans multiple buildings or even a city. For e.g. a MAN
can connect multiple campuses of the same university spread across different
parts of the city. MAN usually spans an area larger than LAN but lesser than
a MAN.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 17 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
A sample MAN layout is given below:

 Wide Area Network (WAN) – is used to distribute information of miles among


thousands of users. This also called as Internet.
Typically, any network hop that is larger 10km is classified as a WAN, but
this distance is not very strictly adhered to. Even the last mile link that
connects a home network to a local ISP (Internet Service Provider) is considered
as a WAN link. A WAN is a wired or wireless telecommunication link that has
the capability to carry data over long distances.
A sample WAN layout is given below:

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 18 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Network Terms:
 Network Server – is a powerful
computer whose sole purpose is to
serve network clients.

 Host – any computer sharing the


same protocol layer with another
computer.
 Peers – any computer whether
mainframe, server or even PC that
acts as an information source on a
network.
 Workstation – any network
computer that connects to and
request resources from network
 Protocol – refers to the specific
standards governing the sending
and receiving of data.

Types of Network
 Server / Client Network – use a network operating system to manage the
entire work. A client server network is one where a client machine requests for
a specific service from a server and the server responds back with the
requested service
A typical client server message interaction is given in the diagram below:

 Peer-to-Peer Network – no centralized computer oversees the networks, no


server, and computer simply connect with each other in a network group to
share files, printers, and internet across.
CBLM on Computer Date Developed: Document No.: 1
System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 19 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
A typical peer-to-peer network message exchange is given below:

The Basic Rule


The basic rule for network design is known as the 5-4-3 rule. It states that in a
10mbps Ethernet network:
 You can have a maximum of five cable segments between any two computers.
 You can have a maximum of four repeaters (hubs, switchers, wireless access
points, etc.) between any two computers.
 Of the five cable segments (maximum) between any computers, only three of
these can terminate in computers.

Network Hardware
 Network Interface Card (NIC) – a printed circuit board, an adapter that plugs
into the computer’s motherboard when connected with a network cable,
provides the physical link between your computer and the network.
 Network Hub – a hardware that all PCs on a network are connected to by
cabling. The hub manages receiving and transmitting data from networked
services.
 Wireless Hubs - are hubs designed for the home.
o Standalone Hubs – are single products with a number of ports. It is
usually include some method of linking them to other standalone hubs
for network expansion.
o Stackable Hubs – work just like standalone hubs, except that several
of them can be “stacked” (connected) together, usually by short lengths
of cable.
o Modular Hubs – are popular in networks because they are easily
expanded and always management option. It is purchased as chassis,
or card cage, with multiple card slots, each of which accepts a
communication card, or module.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 20 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
3 Basic Hub Types
 Passive Hubs – simply connects various cables
 Active Hubs – amplify or boost signals
 Intelligent Hubs – select which path a specific signal will travel

 Repeater – a device that strength signals and allow them to stay clear over
longer distances.
 Network Bridge – divides network into smaller, more manageable sections
helping reduce network traffic.
 Network Switch – it helps determine how data moves over large networks.
 Router – a device that forwards data packets between Local or Wide Area
Network groups.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 21 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
SELF-CHECK 2.1-1

A. MULTIPLE CHOICE

Directions: Write the letter of the correct answer.

1. The type of network that do not have a computer server, and


computer simply connect with each other in a network group is called
a. Mesh c. Client/Server
b. Peer-to-Peer d. Standalone Hub

2. Which network that spans no more than 50 miles and design to


connect LANs spanning a town or city?
a. MAN c. LAN
b. PAN d. WAN

3. Which among the network hardware forwards data packets between


Local or Wide Area Network groups?
a. Network Hubs c. Repeater
b. Network Switch d. Router

4. What network hardware strengthens signals and allows then to stay


clear over longer distances?
a. Network Hubs c. Repeater
b. Network Switch d. Router

5. Which of the following is the collection of computers and related


equipment that are connected so that data can move between them?
a. Nodes c. Protocol
b. Network d. Router

6. Which provides the physical link between your computer and the
network?
a. Network Hubs c. Network Switch
b. Network Interface Cards d. Router

7. What is a hardware that all PCs on a network are connected to by


cabling that manages receiving and transmitting data from networked
services?
a. Modem c. Network Bridge
b. Network Hub d. Copper Cable

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 22 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
8. The powerful computer whose sole purpose is to serve network clients
is called
a. Network Hub c. Network Switch
b. Network Server d. Network Protocol

B. ENUMERATION
Directions: Give the 3 Basic Hub Types
1.
2.
3.

Directions: Give the 4 Basic Network Categories


1.
2.
3.
4.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 23 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
ANSWER KEY 2.1-1
A. MULTIPLE CHOICE
1. A
2. A
3. D
4. C
5. B
6. B
7. B
8. B
B. ENUMERATION

3 Basic Hub Types


1. Passive Hubs
2. Active Hubs
3. Intelligent Hubs

4 Basic Network Categories


1. Personal Area Network (PAN)
2. Metropolitan Area Network (MAN)
3. Local Area Network (LAN)
4. Wide Area Network (WAN)

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 24 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
INFORMATION SHEET 2.1-2
Tools, Equipment and Testing

Learning Objectives

After reading this information sheet, you must be able to:

1. Identify the different tools and equipment used in computer systems and
networks
2. Determine the different use and functions of these tools and equipments

One important thing to consider before executing a well-planned computer


installation is that one must be knowledgeable in the different tools and equipments
used in computer systems and networks. Furthermore, the idea on how these tools
and equipments are properly used is another important consideration in installing
computer systems.

Hardware Tools / Equipments


Illustrations
and their Functions

Protective Eyewear

enclose or protect the eye area in


order to prevent particulates,
infectious fluids, or chemicals from
striking the eyes

Multi-tester or Multi-meter

A multi-meter or a multi-tester,
also known as a VOM (Volt-Ohm
meter), is an electronic measuring
instrument that combines several
measurement functions in one unit

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 25 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Pliers (Assorted)

Pliers is a hand tool used to hold


objects firmly, for bending,
or physical compression.

Screwdriver

A screwdriver is a tool for


driving screws and often rotating
other machine elements with the
mating drive system

Soldering Gun

A soldering gun is
a tool for soldering metals using tin-
based solder to achieve a highly
conductive contact

Desoldering Tool

Desoldering tools are used for


removing the molten solder so that
the joint may be separated.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 26 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Allen Wrench

A hex key, Allen key, or Allen


wrench (also known by various
other synonyms) is a tool of
hexagonal cross-section used to
drive bolts and screws that have a
hexagonal socket in the head
(internal-wrenching hexagon drive)

Flashlight

A flashlight (or torch in British


English) is a hand-held portable
electric-powered light source.
Usually the light source is a
small incandescent light
bulb or light-emitting diode (LED)

IC Insertion and Extraction Tool

Used for extracting and inserting


BIOS Chip

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 27 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Mirror

In hardware servicing a mirror is


used for inspecting the peripherals

Tweezers

Tweezers are tools used for picking


up objects too small to be easily
handled with the human hands

Antistatic Wrist Strap

An antistatic wrist strap, ESD


wrist strap, or ground bracelet is
an antistatic device used to
safely ground a person working on
very sensitive electronic equipment,
to prevent the buildup of static
electricity on their body, which can
result in electrostatic
discharge (ESD)

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 28 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Gloves

A gloves are garments for covering


and protecting the whole hand

Printer

a printer is a peripheral which


produces a text or graphics of
documents stored in
electronic form, usually on physical
print media such as paper or
transparencies

Computer

A computer is
a programmable machine designed
to automatically carry out a
sequence of arithmetic or logical
operations

Windows Operating System


CD/DVD

An operating system is used as an


intermediary between hardware and
software

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 29 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Device Driver CD/DVD

An application used to install the


device and peripherals of a
computer systems and networks

RS 232 pin insertion/extraction


tool

RS232 and D-Sub Pin Insertion


and Removal Tool

Computer Networking Tools and


Device and their Functions
Illustrations

Crimping Tool

A crimping tool is a tool designed


to crimp or connect a connector to
the end of a cable. For example,
network cables and phone cables are
created using a crimping tool to
connect the RJ-45 and RJ-
11 connectors to the end of the
cable. In the picture to the right, is
an example of what a crimping tool
looks like. This example shows a tool
capable of crimping both RJ-11 and
RJ-45 connectors.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 30 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Etherner Cable Tester / LAN
Tester

A device used for testing network


cable connectivity

UTP Unshielded Twisted Pair Cat 5


Cable

A cable used for computer


networking

RJ 45 Connector

A plastic connector used for UTP


Cable to connect computers in a
network

Ethernet Switch

A network switch or switching


hub is a computer networking
device that connects network
segments or network devices

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 31 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
SELF-CHECK 2.1-2

A. TRUE OR FALSE.
Directions: Identify the Precautions and Procedures write TRUE if the
statement is correct and FALSE if the statement is wrong.

1. Protective Eyewear enclose or protect the nose area in order to


prevent particulates, infectious fluids, or chemicals

2. Uni-tester is an electronic device for measuring instrument that


combines several measurement and functions

3. Fliers are hand tool used to hold objects firmly for bedding or physical
compression

4. A screw is a tool for driving screws and often rotating other machine
elements with the mating drive system

5. A Soldering Gun is a tool for soldering metals using tin-based solder


to achieve a highly conductive contact

B. MATCHING TYPE
Direction: Select your answer on the choices below that will correspond on the
statement. Write the letter of your answer on the space provided.

1. Mirror
2. Flash light
3. Gloves
4. Tweezers
5. IC Insertion and Extracting Tool

1. A hand held portable electric light source


2. Used for inspecting peripherals
3. Intended for picking up objects too small for human hands
4. Used for hand protection

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 32 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
ANSWER KEY 2.1-2

A. IDENTIFICATION

1. FALSE
2. FALSE
3. FALSE
4. FALSE
5. TRUE

B. MULTIPLE CHOICE

1. G
2. J
3. F
4. I

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 33 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
INFORMATION SHEET 2.1-3
Occupational Health and Safety (OHS) Policies and Procedures
Learning Objectives:

After reading this information sheet, you must be able to:

1. Identify 5S of good housekeeping.


2. Recognize safety rules and regulations3.
3. Plan installation of computer systems and networks according to industry
standards4.
4. Prepare for installation of computer systems and networks according to
industry standards5.
5. Follow policies and procedures and that work is appropriately sequenced in
accordance with the industry standards

Occupational Health and Safety Policy

In the school as a computer teacher you must be aware of how your students
behave when they are working in the computer laboratory, as well as implementing a
safe way of accomplishing every task. Safety practices should be learned early and
always adhered to when working with any electrical device, including personal
computers and peripherals. This is for the protection of not only the people working
with them, but also for the devices themselves. The basis for this process begins with
your Occupational Health and Safety Policies.

Occupational health and safety (OHS) is a planned system of working to


prevent illness and injury where you work by recognizing hazards and risks. Health
and safety procedure is the responsibility of all persons in the computer and
technology industries. You must identify the hazards where you are working and
decide how dangerous they are. Eliminate the hazard or modify the risk that it
presents.

Safety Procedure is a common task. It is a general knowledge in our


workplace. In most cases, one must be trained to apply safety procedures in
particular place or in an environment of a certain work, such as factory where there
is heavy machineries, electronics and high voltage facilities.

Safety Procedures may be able to promote a great stability of a company, to


ensure safety of their own products, their facilities and most especially their
personnel during and after work responsibility. Therefore, itis our goal and
responsibility as a worker, in any field of our skills and even in our great profession,
to have these skill and knowledge for future application in our workplace.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 34 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
5S OF GOOD HOUSE KEEPING

Japanese English Brief Explanation


S- sieri Sort Take out unnecessary items and dispose
S- seiton Systematize Arrange necessary items in good order for use
S- seiso Sweep Clean your workplace
S- seiketsu Sanitize Maintain high standard of housekeeping
S- shitsuke Self-discipline Do things spontaneously without being told

GENERAL SAFETY PRECAUTIONS

1. Remove power from the circuit or equipment before working on it.


2. Remove and replace fuses only after the power to the circuit has been de-
energized.
3. Make use all equipment is properly grounded.
4. Use extreme caution when removing or installing batteries containing acid.
5. Use cleaning fluids only in well-ventilated spaces.
6. Dispose of cleaning rags and other flammable materials in tightly closed metal
containers.
7. In case of an electrical fire, deenergize the circuit and report it immediately to
the appropriate authority.

HIGH VOLTAGE SAFETY PRECAUTIONS


1. Consider the result of each act.
2. Keep away from live circuits.
3. Do not work alone.
4. Do not tamper with interlocks.
5. Do not ground yourself.
6. Never energize equipment in the presence of water leakage.

PERSONAL SAFETY PRECAUTIONS


1. Work only in clean dry areas.
2. Do not wear loose or flapping clothing.
3. Wear only nonconductive shoes.
4. Remove all rings, wristwatches, bracelets, ID chains and tags, and similar
metal items.
5. Do not use bare hands to remove hot parts.
6. Use a shorting stick to remove high voltage charges on capacitors.
7. Make certain that the equipment being used is properly grounded.
8. Remove power to a circuit prior to connecting alligator clips.
9. When measuring voltages over 300 volts, do not hold the test probes.

FIRST AID PROCEDURES


1. Don’t panic! Determine if there is any immediate danger to the injured person.
2. Never move an unconscious person without cause, lay the person flat.
3. Keep person warm to prevent shock.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 35 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
4. Never try to force liquids on an unconscious person.
5. If the person is breathing normally, keep him or her still comfortable until
medical aid arrives.
6. Severe electrical shock or other types of accidents may interrupt breathing. A
procedure such as artificial respiration (mouth-to-mouth resuscitation) or CPR
(Cardiopulmonary Resuscitation) can be used to stimulate the breathing
process.
7. Check for a swallowed tongue before applying artificial respiration. This
procedure should be administered by a trained person if possible and
continued until medical help arrives.
8. Report all injuries to the instructor immediately. Even minor cuts can become
infected and the best first aid supplies, nurses, and doctors cannot help an
unreported injury.

GENERAL SAFE WORK PRACTICES


The trainee shall ensure that all persons working on any facility that is under
their control are protected from risk created by residual materials and workmanship
associated with any construction works, including ensuring all areas are cleaned after
the copper cable work to ensure no sharps or splinters of the wire remain, and the
removal of all sharp and hazardous edges from fittings.

WORK AREAS
Work areas for terminating copper cables and splicing optical fiber cables shall:
a. Have adequate lighting and ventilation
b. Be kept free of debris and other contaminants
c. Ensure copper cable off-cuts are removed from site and disposed of in an
appropriate manner.
d. Ensure sharps and syringes used as part of network cabling are disposed of
in an appropriate sharps container and removed from site.
e. Ensure a medical waste or clinical waste container will meet the
requirements of a sharps container.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 36 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
SELF-CHECK 2.1.3

A. SUPPLICATION
Directions: Complete the table below.

Japenese English Brief Explanation

S- Sort Take out unnecessary items and dispose

S- Systematize

S- Clean your workplace

S- Maintain high standard of housekeeping

S- Self-discipline

B. ENUMERATION

Directions: Give at least Personal Safety Precautions.

1.
2.
3.
4.
5.
6.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 37 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
ANSWER KEY 2.1-3

A. SUPPLICATION

Japenese English Brief Explanation

S- sieri Sort Take out unnecessary items and dispose

S- seiton Systematize Arrange necessary items in good order for use

S- seiso Sweep Clean your workplace

S- seiketsu Sanitize Maintain high standard of housekeeping

S- Shitsuke Self-discipline Do things spontaneously without being told

B. ENUMERATION
Directions: Give at least Personal Safety Precautions

1. Work only in clean dry areas.


2. Do not wear loose or flapping clothing.
3. Wear only nonconductive shoes.
4. Remove all rings, wristwatches, bracelets, ID chains and tags, and similar
metal items.
5. Do not use bare hands to remove hot parts.
6. Use a shorting stick to remove high voltage charges on capacitors.
7. Make certain that the equipment being used is properly grounded.
8. Remove power to a circuit prior to connecting alligator clips.
9. When measuring voltages over 300 volts, do not hold the test probes.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 38 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
INFORMATION SHEET 2.1-4
Prepare Network Copper Cable and Testing

Learning Objectives:

After reading this information sheet, you must be able to:


1. Enumerate the steps in network cable preparation.
2. Prepare network cable
3. Understand the importance of being knowledgeable in network cable preparation.

Materials Tools
6 meters UTP Unshielded Twisted Pair RJ45 Crimping Tool
Cat 5 Cable
Wire cutter
RJ45 crimpable connectors for Cat5e
Stripper or Pliers

Ethernet Cable Tester / LAN Tester

WHAT IS NETWORK COPPER CABLE?

A Network cable is one of the most popular forms of network cable used on
wired networks. Copper cables connect devices on local area networks such as
PCs, routers and switches.

Unshielded Twisted Pair (UTP) cable

A popular type of cable that consists of


two unshielded wires twisted around each
other. Due to its low cost, UTP cabling is used
extensively for local-area networks (LANs) and
telephone connections.

RJ-45 Registered Jack-45


An eight-wire connector used commonly to
connect computers onto a local-area networks
(LAN), especially Ethernets. RJ-45 connectors
look similar to the ubiquitous RJ-11 connectors
used for connecting telephone equipment, but
they are somewhat wider.
CBLM on Computer Date Developed: Document No.: 1
System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 39 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
PREPARE NETWORK COPPER CABLE AND TESTING

1. Unroll the required length of network cable and add a little extra wire, just in
case. If a boot is to be fitted, do so before stripping away the sleeve and ensure the
boot faces the correct way.

2. Carefully remove the outer jacket of the cable. Be careful when stripping the
jacket as to not nick or cut the internal wiring. One good way to do this is to cut
lengthwise with snips or a knife along the side of the cable, away from yourself, about
an inch toward the open end. This reduces the risk of nicking the wires' insulation.
CBLM on Computer Date Developed: Document No.: 1
System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 40 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Locate the string inside with the wires, or if no string is found, use the wires
themselves to unzip the sheath of the cable by holding the sheath in one hand and
pulling sideways with the string or wire. Cut away the unzipped sheath and cut the
twisted pairs about 1 1/4" (30 mm). You will notice 8 wires twisted in 4 pairs. Each
pair will have one wire of a certain color and another wire that is white with a colored
stripe matching its partner (this wire is called a tracer).

3. Inspect the newly revealed wires for any cuts or scrapes that expose the copper
wire inside. If you have breached the protective sheath of any wire, you will need to
cut the entire segment of wires off and start over at step one. Exposed copper wire
will lead to cross-talk, poor performance or no connectivity at all. It is important that
the jacket for all network cables remains intact.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 41 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
4. Untwist the pairs so they will lay flat between your fingers. The white piece of
thread can be cut off even with the jacket and disposed (see Warnings). For easier
handling, cut the wires so that they are 3/4" (19 mm) long from the base of the jacket
and even in length.

5. Arrange the wires based on the wiring specifications you are following. There are
two methods set by the TIA, 568A, 568B and crossover cable. Which one you use will
depend on what is being connected. A straight-through cable is used to connect two
different-layer devices (e.g. a hub and a PC). Two like devices normally require a
cross-over cable. The difference between the two is that a straight-through cable has
both ends wired identically with 568B, while a cross-over cable has one end wired
568A and the other end wired 568B. For our demonstration in the following steps, we
will use 568B, but the instructions can easily be adapted to 568A.
Put the wires in the following order, from left to right:

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 42 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
6. Press all the wires flat and parallel between your thumb and forefinger. Verify
the colors have remained in the correct order. Cut the top of the wires even with one
another so that they are 1/2" (12.5 mm) long from the base of the jacket, as the jacket
needs to go into the 8P8C connector by about 1/8", meaning that you only have a
1/2" of room for the individual cables. Leaving more than 1/2" untwisted can
jeopardize connectivity and quality. Ensure that the cut leaves the wires even and
clean; failure to do so may cause the wire not to make contact inside the jack and
could lead to wrongly guided cores inside the plug.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 43 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
7. Keep the wires flat and in order as you push them into the RJ-45 plug with the
flat surface of the plug on top. The white/orange wire should be on the left if you're
looking down at the jack. You can tell if all the wires made it into the jack and
maintain their positions by looking head-on at the plug. You should be able to see a
wire located in each hole, as seen at the bottom right. You may have to use a little
effort to push the pairs firmly into the plug. The cabling jacket should also enter the
rear of the jack about 1/4" (6 mm) to help secure the cable once the plug is crimped.
You may need to stretch the sleeve to the proper length. Verify that the sequence is
still correct before crimping.

8. Place the wired plug into the crimping tool. Give the handle a firm squeeze. You
should hear a ratcheting noise as you continue. Once you have completed the crimp,
the handle will reset to the open position. To ensure all pins are set, some prefer to
double-crimp by repeating this step.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 44 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
9. Repeat all of the above steps with the other end of the cable. The way you wire
the other end (568A or 568B) will depend on whether you're making a straight-
through, rollover, or cross-over cable.

10. Test the cable to ensure that it will function in the field. Mis-wired and
incomplete network cables could lead to headaches down the road. In addition, with
power-over-Ethernet (PoE) making its way into the marketplace, crossed wire pairs
could lead to physical damage of computers or phone system equipment, making it
even more crucial that the pairs are in the correct order. A simple cable tester can
quickly verify that information for you. Should you not have a network cable tester
on hand, simply test connectivity pin to pin.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 45 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
SELF-CHECK 2.1-4

Directions: Arrange the following steps in network cable preparation (use numbers
1-10). Write you answers on the space provided before each number.

1. Arrange the wires based on the wiring specifications you are


following.
2. Carefully remove the outer jacket of the cable. Be careful when
stripping the jacket as to not nick or cut the internal wiring.
3. Inspect the newly revealed wires for any cuts or scrapes that expose
the copper wire inside.
4. Keep the wires flat and in order as you push them into the RJ-45
plug with the flat surface of the plug on top.
5. Place the wired plug into the crimping tool.
6. Press all the wires flat and parallel between your thumb and
forefinger
7. Repeat all of the above steps with the other end of the cable.
8. Test the cable to ensure that it will function in the field.
9. Unroll the required length of network cable and add a little extra
wire, just in case.
10. Untwist the pairs so they will lay flat between your fingers.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 46 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
ANSWER KEY 2.1-4

1. Unroll the required length of network cable and add a little extra wire, just in
case.
2. Carefully remove the outer jacket of the cable. Be careful when stripping the jacket
as to not nick or cut the internal wiring.
3. Inspect the newly revealed wires for any cuts or scrapes that expose the copper
wire inside.
4. Untwist the pairs so they will lay flat between your fingers.
5. Arrange the wires based on the wiring specifications you are following.
6. Press all the wires flat and parallel between your thumb and forefinger
7. Keep the wires flat and in order as you push them into the RJ-45 plug with the
flat surface of the plug on top.
8. Place the wired plug into the crimping tool.
9. Repeat all of the above steps with the other end of the cable.
10. Test the cable to ensure that it will function in the field.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 47 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
OPERATION SHEET 2.1-4

Title Operate Cable Tester

Performance Connect network copper cable to cable tester to test its


Objectives functionality.
Supplies Network preparation manual

MATERIALS AND EQUIPMENT:

Equipment/Materials Quantity Remarks

Straight through Cable – A working


1 pc
Straight through Cable – B working
1 pc
Cable Tester working
1 set

Steps / Procedure:

1. Turn on your network cable tester.


2. Plug one end of the Network copper cable you are trying to test into the "IN"
Ethernet input on the network cable tester.
3. Plug the other end of your Network copper cable you are trying to test into the
"OUT" input on the network cable tester.
4. Press the "Test" button. The network cable tester will send a signal across the
Ethernet cable. If the signal gets from one end of the cable to the other, a green
light will appear on the device, letting you know that the test was successful. If
the signal does not get from one end of the cable to the other, a red light will
appear on the device, letting you know that the test was not successful and
that the cable is bad.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 48 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
JOB SHEET 2.1-4

Title Prepare Network Copper Cable and Testing

Performance 1. Prepare network copper cable


Objectives 2. Test functionality of the cable
Supplies Network preparation manual

MATERIALS AND EQUIPMENT:

Equipment/Materials Quantity Remarks

UTP cable working


6 meters
RJ-45 connector working
16 pcs
Crimping tool working
1pc
Cable / LAN Tester working
1 set
Steps / Procedure:
Having prepared all the materials and equipment needed, and applying the safety
precautions or the Occupational Health and Safety Policies we can start preparing the
network cable.
1. Unroll the required length of network cable
2. Carefully remove the outer jacket of the cable. Be careful when stripping the
jacket as to not nick or cut the internal wiring.
3. Inspect the newly revealed wires for any cuts or scrapes that expose the copper
wire inside.
4. Untwist the pairs so they will lay flat between your fingers.
5. Arrange the wires based on the wiring specifications you are following.
6. Press all the wires flat and parallel between your thumb and forefinger
7. Keep the wires flat and in order as you push them into the RJ-45 plug with the
flat surface of the plug on top.
8. Place the wired plug into the crimping tool.
9. Repeat all of the above steps with the other end of the cable.
10. Test the cable to ensure that it will function in the field.

Assessment Method:

Performance Criteria Checklist

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 49 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
PERFORMANCE CRITERIA CHECKLIST 2.1-4

Trainee’s Name: Date:

CRITERIA YES NO

Did I…….

 Unroll the required length of network cable.


 Remove the outer jacket of the cable. Be careful when
stripping the jacket as to not nick or cut the internal
wiring carefully.
 Inspect the newly revealed wires for any cuts or scrapes
that expose the copper wire inside correctly.
 Untwist the pairs properly.
 Arrange the wires based on the wiring specifications
you are following.
 Press all the wires flat and parallel between your
thumb and forefinger
 Keep the wires flat and in order as you push them into
the RJ-45 plug with the flat surface of the plug on top.
 Place the wired plug into the crimping tool
 Repeat all of the above steps with the other end of the
cable.
 Test the cable to ensure functionality

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 50 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
INFORMATION SHEET 2.1-5
Network Cable Installation

Learning Objectives:

After reading this information sheet, you must be able to:

1. Learn how to install prepared network cable.


2. Enumerate the steps in network cable installation
3. Apply the steps in network cable installation

TWO METHODS OF NETWORK CABLE INSTALLATION


Method 1: Router Network

1. Install a Network Interface Card (NIC) per computer you want to


connect.
 A NIC is a like a modem for your computer but it is used for a local
area network (LAN). You do not have to get an expensive network card;
as long as it has 100mbps it will work fine.
 To install it you must first unplug your computer and remove the cover
plate. Align the NIC over the slot that has the jack that is facing toward
the outside of the computer. Put the NIC into the slot and press down
firmly to secure. Replace the cover and unplug the computer back in.
 Your NIC should come with a disk that will instruct you how to
complete the software installation for the appropriate drivers. Follow
the instructions to finish the installation of the NIC.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 51 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
2. Connect Network cables to the central location.
 You also need 1 Network patch cable per computer. These Network
cables are blue cables that look like they have phone line plugs at the
end. They will have 4 pairs of plugs rather than 2. Make sure that the
cables that you purchase are long enough to reach from the central
location to the computers. The central location is where all the cables
will go to access the same information and will probably be where your
Internet feed is. The cables will plug into each NIC.

3. Plug all the Network cables to the router.


 A router will make all the computers connected to be part of the
same network. You will need a router that is at least 100mbps. If you
want to be able to access the Internet from all computers, you will
need to have your Internet connection plugged in the router’s uplink
port or WAN port.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 52 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
Method 2: Hub Network

1. Use a crossover cable to connect two computer’s network ports.


 In a hub network, to connect two computers that don't have access to a
shared network, you can use a Network cable to make a direct
connection between the two computer's network ports. You are merely
connecting each device to the medium to the main hub via a crossover
cable. Since there is no router involved in this Network setup, the other
computer is not connected to the Internet. It can share files and
documents from the main computer and print from the same printer.

 Some computers require a special cable called "crossover cable." This is


a specialized cable that is wired in reverse. Ethernet ports have both
inputs and outputs, and the crossover cable is switched so that the
output from one computer connects to the input of the other.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 53 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
SELF-CHECK 2.1-5

A. TRUE OR FALSE
Directions: Write TRUE if the statement is correct and write FALSE its incorrect.
Write your answers in your answer sheets.

1. In Hub Network, crossover cable is used to connect two computer’s


network ports.
2. You will need a router that is at least 50mbps to set-up computer
network.
3. A NIC is a like a network switcher for your computer but it is used for
a local area network (LAN).

B. ARRANGING SEQUENCE
Directions: Arrange the following steps in network cable installation using the
router method (use numbers 1-3). Write you answers on the space provided before
each number.

Router Method
a. Connect Network cables to the central location.
b. Plug all the network cables to the router.
c. Install a Network Interface Card (NIC) per computer you want to
connect.

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 54 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
ANSWER KEY 2.1-5

A. TRUE OR FALSE
A. TRUE
B. FALSE
C. FALSE

B. ARRANGING SEQUENCE
a. 2
b. 3
c. 1

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 55 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
TASK SHEET 2.1-5

Title Install Network Cable

Performance
Objectives Install prepared network cable

Supplies Network preparation manual

MATERIALS AND EQUIPMENT:

Equipment/Materials Quantity Remarks

working
TA 568A Cable 1 pc
working
TA 568B Cable 1 pc
working
Computer Units 2 units

2 set working
Network Interface Card (NIC)
working
Network Router 1 set
Steps / Procedure:
Having prepared all the materials and equipment needed, and applying the safety
precautions or the Occupational Health and Safety Policies we can start preparing the
network cable.

1. Install a Network Interface Card (NIC) per computer you want to connect.
2. Connect Network cables to the central location.
3. Plug all the network cables to the router.

Assessment Method:

Demonstration evaluation using performance criteria checklist

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 56 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG
PERFORMANCE CRITERIA CHECKLIST 2.1-5

Trainee’s Name: Date:

CRITERIA YES NO

Did I…….

 Install a Network Interface Card (NIC) per computer you


want to connect.
 Connect Network cables to the central location.

 Plug all the network cables to the router

CBLM on Computer Date Developed: Document No.: 1


System Servicing NC II
Module Title: Setting- Developed by: Issued by: Page 57 of 57
Up Computer Guinto, Jewel CNHS,
Networks Lucky Lyn R. TIAONG

You might also like