0% found this document useful (0 votes)
463 views

Self-Learning Module: Department of Education Region Iv-A - Calabarzon Schools Division of Calamba City

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
463 views

Self-Learning Module: Department of Education Region Iv-A - Calabarzon Schools Division of Calamba City

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Department of Education Region

IV-A - CALABARZON Schools


Division of Calamba City

SELF-LEARNING MODULE

GRADE 10

Computer System Servicing 10


Quarter 1 – Module 1

Module Development Team

Writer:
Reviewer:
Layout: Cristeta M. Arcos
Management: SDS Susan DL Oribiana
ASDS Rogelio F. Opulencia
CID Chief Dolorosa S. De Castro
EPS-LRMDS Cristeta M. Arcos

Department of Education│R4A│Division of Calamba City


Office Address: DepEd Bldg., City Hall Compound, Brgy. Real, Calamba City

For DepEd Division of Calamba City USE only. Please send your feedback and suggestions to
[email protected] or call 049–554 9830 loc. 14
Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the
government agency or office wherein the work is created shall be necessary
for exploitation of such work for profit. Such agency or office may, among other
things, impose as a condition the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand


names, trademarks, etc.) included in this book are owned by their respective
copyright holders. Every effort has been exerted to locate and seek
permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Dear Parents,
The Schools Division of Calamba City is one with every Filipino family in coping with the
demands of our modern times amidst Covid–19 Pandemic.
The Division initiated Self Learning Module (SLM) aims to meet the most essential learning
competencies required to be learned by your child whether your child opts for online, modular or
blended learning modality. The learning activities in this SLM are arranged chronologically from simple
to complex to lead your child to think critically, act skillfully, and reflect deeply on each lesson and
practice into real life skills. Most importantly, this SLM promotes self-paced learning as your child can
always review the least understood lessons as often as he/she pleases.
Thank you in advance for being one with us! Together, let us envision that, by the end of this
school year, we will see your child as one responsible young person with a heart and mind for humanity,
for nature, for the country, and for God.

Dear Learner,
Welcome to a brand-new year of learning!
This is our gift to you: The Division initiated Self Learning Module (SLM) that will help you
acquire the most essential learning competencies you needed as 21st Century Learner through the Pivot
4 A IDEA Model which compose of 10 parts.

Parts of the LM Description


Introduction

The teacher utilizes appropriate strategies in presenting the MELC and


What I need to know
desired learning outcomes for the day or week, purpose of the lesson,
core content and relevant samples. This allows teachers to maximize
What is new learner awareness of their own knowledge as regards content and skills
required for the lesson
Development

The teacher presents activities, tasks, contents of value and interest to the
What I know
learners. This shall expose the learners on what he/she knew, what he /she
What is in does not know and what she/he wanted to know and learn. Most of the
activities and tasks must simply and directly revolved around the
What is it concepts to develop and master the skills or the MELC.
The teacher allows the learners to be engaged in various tasks and
opportunities in building their KSA’s to meaningfully connect their
Engagement

What is more
learnings after doing the tasks in the D. This part exposes the learner
to real life situations /tasks that shall ignite his/ her interests to meet
What I can do
the expectation, make their performance satisfactory or produce a
What else I can do product or performance which lead him/ her to understand fully the
skills and concepts .
The teacher brings the learners to a process where they shall
What I have learned
Assimilation

demonstrate ideas, interpretation , mindset or values and create


pieces of information that will form part of their knowledge in
What I can achieve reflecting, relating or using it effectively in any situation or context.
This part encourages learners in creating conceptual structures giving
them the avenue to integrate new and old learnings.

Please take time to read and do the activities in these SLM as if you are reporting in school.
Set a regular study schedule for you as much as possible, but keep in mind that these SLM will enable
you to learn at your own pace. If you do not understand a lesson, the SLM would not mind you flipping
back the pages repeatedly for review. Also, remember to keep in touch with your teachers. Send them
a message through your online sessions or write them a note as you do your modular activities.

We wish you good luck in your studies, and we hope that you will remain happy and enthusiastic in
learning!
WEEK

Setting Network Configuration


1-3 Lesson
I
This lesson deals with configuration of network through IP Addressing. This
will also provide a clear concept about Internet Protocol (IP), Internet Protocol (IP)
Address, and Command Prompt. You are expected to configure and check
connectivity between terminals in accordance to network design.

Learning Task 1: Observe the illustration below. In your notebook, tell us what is
happening in the illustration,

D
Learning Task 2: Read and answer the following questions briefly by
choosing the letter of the correct answer. Write your answer in your
notebook
A.
1. Which refers to a set of rules governing communication within and between
computers on a network?
a. Configuration
b. Internet Protocol
c. Networking
d. Protocol
2. Which is a number that is used to identify a device on the network?
a. Home Address
b. IP Address
c. MAC Address
d. Permanent Address
3. Which indicates the network portion of an IP address?
a. IP Address
b. Loopback Address
c. Octet
d. Subnet Mask
4. Which is known as the physical address?
a. Home Address
b. IP Address
c. MAC Address
d. Permanent Address
5. Which of the following is a class C IP Address?
a. 11.11.10.0
b. 130.150.0.15
c. 170.150.19.10
d. 196.168.15.100
B.
1. Which is a command prompt command used to test the ability of the source
computer to reach a specified destination computer?
a. DNS
b. Ipconfig
c. Ping
d. Time To Live
2. Which is an application used to execute entered Commands?
a. Command Prompt
b. MS Office
c. Run Command
d. Web browser
3. Which is a command used to find out the IP address of a certain network
you are connected?
a. DNS
b. Ipconfig
c. Ping
d. Time To Live
4. Which is a measure of how many rerouting from one point to another the
packet must go through before IP declares it undeliverable?
a. Command Prompt
b. Domain Name System
c. Round trip response
d. Time To Live
5. Which shows you how long it took from the time the client machine sent out
the ping message until a reply came back?
a. Command Prompt
b. Domain Name System
c. Round trip response
d. Time To Live
Internet Protocols

Protocols are set of rules.


Internet Protocols (IP) set of rules governing communication within and
between computers on a network. It is the method or protocol by which data is sent
from one computer to another on the internet or network. Each computer (known as
a host) on the internet has at least one IP Address that uniquely identifies it from all
other computers on the internet.

Use of Internet Protocol


The Internet Protocol is a protocol for routing and addressing packets of data
so that they can travel across networks and arrive at the correct destination. Data
traversing the internet is divided into small pieces called packets.

Functions of Internet Protocol


1. Addressing
2. Data encapsulation and formatting / packaging
3. Fragmentation and reassembly
4. Routing / indirect deliver

Commonly used Protocols


• TCP/IP (Transmission Control Protocol/Internet Protocol) --- Suite of protocols
used to transport data over the internet.
• NetBEUI (NetBIOS Extended User Interface) --- A small fast protocol for a
workgroup network that requires no connection to the internet.
• HTTPS (Hypertext Transfer Protocol Over Secure Socket Layer) --- Governs
how files such as text, graphics, and video are exchanged on the www in a
secure way. Former: HTTP (Hypertext Transfer Protocol)
• FTP (File Transfer Protocol) --- Provides services for file transfer and
manipulation.
• DHCP (Dynamic Host Configuration Protocol) --- a protocol which allows the
server to allocate an IP Address to every client or computer on the network
automatically.
• DNS (Domain Name System) --- consists of a relational database which
matches the names of different domains to their respective IP Addresses.
• SIP (VoIP) (Session Initiation Protocol Voice over IP) --- establishes
communications over the internet.
• RTP (VoIP) (Real-time Transfer Protocol Voice over IP) --- used to transfer real-
time data over a network.
• SSH (Secure Shell) - Used to securely connect to a remote computer.
• TELNET (Terminal Network) --- An application used to connect to a remote
computer that lacks security features.
• POP3 (Post Office Protocol) --- Used to download e-mail from a remote mail
server.
• IMAP4 (Internet Message Access Protocol version 4) --- Used to download e-
mail from a remote mail server
• SMTP (Simple Mail Transfer Protocol) --- Used to send e-mail to a remote e-
mail server.
• Apple Talk --- A protocol suite used to network Macintosh computers.
How does an Internet Protocol work?

Illustration 1

Illustration 2
The illustration 1 explains how an Internet Protocol work. This shows the Layers
of protocols, the Application, Transport, Internet, Link, and Physical layer.
The messages that we send are filtered through these layers and broken into
smaller chunks of data called packets.
It all starts at the Application layer by creating message, one example of the
protocol that you may be familiar with is the hypertext transfer protocol (HTTP).
The Transport layer uses the transmission control protocol to encapsulate the data
blocks from the application layer it then moves to the Internet layer where the IP is
used to deliver the packets. These packets are delivered through the Link layer which
is an ethernet cable to the Physical layer which is the basic hardware of your computer
network. The computer that receives these data packets move then through the
protocol stacks in reverse order so that the message can be reconstructed and
understood (Illustration 2).

Internet Protocol (IP) Address

An Internet Protocol address is a numerical label assigned to each device


connected to a computer network that uses the Internet Protocol for communication.
e.g. 192.168.100.10
It is a 32-bit number which is group into 8-bit known as Octet. Each octet is
presented as its decimal value, separated by a decimal point or period. This format is
called Dotted-decimal Notation.
Media Access Control (MAC) Address

A Media Access Control Address (MAC Address) is a unique identifier assigned


to a network interface controller for use as a network address in communications within
a network segment. This use is common in most IEEE 802 networking technologies,
including Ethernet, Wi-Fi, and Bluetooth. It is assigned to the host Network Interface
Card (NIC) and is known as the “Physical Address”.
e.g. ec:f3:42:03:cb:52

How does IP Address work?

Illustration 3

Computers and internet communicate with each other with underground or


underwater cables or wirelessly. If you want to download a file from the internet, then
your computer must have an address so that other computers on the internet can find
and locate your computer. And in internet terms, that is called as Internet Protocol (IP)
Address.

Classification of IP Address

1. Class A Used for large networks, implemented by large companies and


some countries. (1-126)
e.g. 10.10.10.0
2. Class B Used for medium-sized networks, implemented by universities.
(128-191)
e.g. 130.150.0.0
3. Class C Used for small networks, implemented by ISPs for customer
subscriptions. (192-223)
e.g. 192.168.254.254
4. Class D Used for special use for multicasting. (224-239)
e.g. 237.154.127.15
5. Class E Used for experimental testing. (240-255)
e.g. 241.0.0.0

Notes:
• 127.0.0.1 is known as the Loopback Address
• The first octet of the IP Address determines its classification.
Learning Task 3: Classify the following IP address. Write your answer in your
notebook.

1. 192.168.254.254 ____________________
2. 10.10.10.0 ____________________
3. 241.0.0.0 ____________________
4. 130.150.0.0 ____________________
5. 237.154.127.15 ____________________

Subnet Mask
It indicates the network portion of an IP Address. By default, if your device IP
Address is Class A, its subnet mask would be class A also.

Classification of Subnet Mask


indicates that the first octet of the IP Address is the
Class A 255.0.0.0
Network Portion
indicates that the first two octet of the IP Address is the
Class B 255.255.0.0
Network Portion
indicates that the first three octet of the IP Address is the
Class C 255.255.255.0
Network Portion

The Hierarchical Addressing of IP Address

8 Bits 8 Bits 8 Bits 8 Bits


Class A Network Host Host Host
Class B Network Network Host Host
Class C Network Network Network Host
Class D Multicasting
Class E Research
Table 1

The logical 32-bit IP Address is Hierarchical and is composed of two parts:


• the Network
• a Host (on that network)
Network Address and Broadcast Address are two addresses that serve specific
purpose.
In a Class C IP Address, there are 256 IP Addresses available less the 2
addresses for the network and broadcast address = 254 IP Addresses available for the
hosts; therefore in a Class A IP Address which covers the second up to 4th octet, there
would be 256 multiply by 256 = 65,536 multiply by 256 again = 17,777216 less the
network and broadcast addresses, 16,777,214 IP Addresses available for the hosts.

Types of IP Address According to How They Are Assigned


1. Static IP Address – IP Address assigned manually to computers and devices
2. Dynamic IP Address – IP Address assigned automatically
The Command Prompt
The Command Prompt is a command line interpreter application available in
most Windows operating systems. It is used to execute entered commands.

Illustration 4

CMD Command Syntax


Ipconfig is a command used to find out the IP address of a certain network
you are connected. The default gateway also refers to your router or network device.

Illustration 5
• Ping is a command prompt command used to test the ability of the source
computer to reach a specified destination computer. Target is the destination
you wish to ping, which is either an IP address or a hostname.

Illustration 6
Information and Data Shown from pinging a specific destination computer
1. Machine/website names to numeric addresses
2. Round-trip response time
3. Routing hop count

Illustration 7
Machine/Website Names To Numeric Addresses
The Domain Name System (DNS) resolves machine names to numeric
addresses. It is the Internet's system for converting alphabetic names into numeric IP
addresses.

Round-Trip Response Time


The parts of the replies that say things like time=105ms show you how long it
took from the time the client machine sent out the ping message until a reply came
back (1 ms is 1 millisecond, or one thousandth of a second). Common causes of
different variability in the times that networks respond:
• Differing amounts of traffic on the communication lines
• Differing loads on the server

Routing Hop Count


The part of the replies that says TTL=50 tells you about the route the message
took from one point to another. The acronym TTL stands for Time to Live, which is a
measure of how many rerouting from one point to another the packet must go through
before IP declares it undeliverable.
The number following TTL, called the hop count is a number that usually starts
at 255 and counts down by one every time the message gets rerouted through an
intermediary computer.
E
Learning Task 4. Read each statement carefully and identify them. Choose your
answer from the word bank. Write your answers in your notebook.

Command Prompt 1. Its primary job is the delivery of data between devices over an
DHCP internetwork.
Dynamic IP Address 2. It is a protocol which allows the server to allocate an IP
Host
HTTPS Address to every client or computer on the network
IMAP4 automatically.
IP Address 3. It governs how files such as text, graphics, and video are
Ipconfig exchanged on the www in a secure way.
Internet Protocol
4. It is an application used to connect to a remote computer that
Telnet
TCP/IP lacks security features.
Static IP Address 5. It is a suite of protocols used to transport data over the internet.
Subnet Mask 6. It is a number that is used to identify a device on the network.
7. It indicates the network portion of an IP address.
8. It is a command line interpreter application available in most
Windows operating systems.
9. It is a command used to find out the IP address of a certain
network you are connected.
10. It refers to the IP Address assigned manually to computers
and devices.

Learning Task 5. Using your phones/laptop with mobile data or internet connection,
type in this link www.whatismyipaddress.com at your browser. Find out what your
public IPv4 and IPv6 address is revealing about you. My IP address information shows
your location, city, region, and country. Have a screen shot of your IP information or
write it on your answer sheet using the format below. Write your answer on your
notebook

My IP Address Is:
IPv4:
IPv6:

My IP Information
ISP:
City:
Region:
Country:
Learning Task 6. Utilizing Command Prompt. Do what is asked. Write your answer in
your notebook.

A. Prepare the following:


1. Laptop/Desktop/Tablet computer
2. Router/Wi-Fi – preferably with internet connection (make sure your device
is connected to the router/Wi-Fi
3. Notebook and pen

B. Accessing the command prompt


1. Go to search
2. Type cmd →click cmd icon

C. Using command syntax


1. In the open command prompt, type ipconfig then press enter
Based on the data shown, identify the following:
Device’s IP Address ____________________
Subnet Mask ____________________
Router’s IP Address ____________________
2. Type ping <target> (write your Router’s IP Address) then press enter
Based on the data shown, complete the following summary statistics:
Ping statistics for ______________________:
Packets: Sent = _____, Received = _____, Lost = _____ < _____
loss>,
Approximate round trip in milli-seconds:
Minimum = ______, Maximum = ______, Average = _____
3. Type ping /? then press enter
What was shown?
_____________________________________
4. Type ping -t <target> then press enter
Does the pinging stops? ___________. Press ctrl+c
What happened? _________________
Based on the data shown, complete the following summary statistics:
Ping statistics for ______________________:
Packets: Sent = ___, Received = ___, Lost = ___ < ___ loss>,
Approximate round trip in milli-seconds:
Minimum = ______, Maximum = ______, Average = _____

Replace –t with: (observe carefully the data shown)


-n count (count refers to a number)
What difference does it make from -t?
___________________________________________________
-l size (size refers to a number from 32 (default) to 65,535)
What difference does it make from simply pinging a target?
___________________________________________________
-a
What was reveal when pinging a target with -a syntax?
___________________________________________________
5. Type ping facebook.com then press enter
What was reveal when pinging a target with host name?
________________________________________________________
Replace facebook.com with google.com; youtube.com;
seagate.com; instagram.com; twitter.com; yahoo.com;
deped.gov.ph
Based on the data shown, write down their IP Addresses:
• google.com ____________________
• youtube.com ____________________
• seagate.com ____________________
• instagram.com ____________________
• twitter.com ____________________
• yahoo.com ____________________
• deped.gov.ph ____________________

D. Self Reflection. In your notebook, write a short narrative of at least 4-5


sentences of your experience in utilizing the command prompt.

Learning Task 7. Assigning IP Address. Do what is asked. Write your answer in your
notebook.

A. Prepare the following:


1. Laptop/Desktop/Tablet computer
2. Router/Wi-Fi – preferably with internet connection (make sure your device
is connected to the router/Wi-Fi
3. Notebook and pen

B. Assigning Dynamic IP Address


a. Go to desktop;
2. Open any available folder or File Explorer;
3. From the opened window, point network (left side of the window) → right
click → properties (new window will open);
4. Click change adapter setting;
5. Point wi-fi network → right click → properties;
6. Select Internet Protocol Version 4 (TCP/IPv4) → click properties (lower
part of the dialogue box);
7. Click or select Obtain IP Address Automatically → click OK
8. Close all dialog boxes and folders; return to desktop.

C. Assigning Static IP Address


a. Follow steps 1 to 6 of letter B
b. Click or select Use the following IP Address → supply the necessary data
→ click okay
REMEMBER: (see illustration 8)
i. You can view your default gateway through ipconfig in cmd.
ii. Your assigned IP Address must have the same number from Octet
1 to 3 of the default gateway
iii. You cannot use the same number as your default gateway for the
4th Octet
iv. By default, the subnet mask is the same class as the IP Address
v. If your assigning IP Address to several devices on the same network,
each of those devices must have different IP Addresses
vi. IP Address Conflict occurs if two devices have the same IP Address
Illustration 8

D. Self Reflection. In your notebook, write a short narrative of at least 4-5


sentences of your experience in assigning IP Address.

A
Learning Task 8: Do What is asked. Write your answers in your notebook.
Multiple Choice. Letters only.
1. Which ping command syntax allows you to ping the target until you force it to stop?
A. /? B. -l size C. –n count D. -t
2. Which ping command syntax show detailed help about the command's several
options?
A. /? B. -l size C. –n count D. -t

3. Based on the given illustration, what type of IP Address is assigned to the device?
_________________________________________________________________
4. Based on the data given, what is the IP Address of the network device the machine
is connected to? ___________________________________________________

C:\Users\Mnemosyne>ipconfig
Windows IP Configuration
Wireless LAN adapter Wi-Fi 4:
Connection-specific DNS Suffix . :
Link-local IPv6 Address . . . . . : fe80::8b:c785:a471:2ef4%29
IPv4 Address. . . . . . . . . . . : 192.168.254.108
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : fe80::8b:c785:a471:2ef4%29
192.168.254.254

5. Based on the data given, what is the resolve host name of the IP Address
192.168.254.108? ____________________________________________________

C:\Users\amint>ping -a 192.168.254.108
Pinging JNote-1001 [192.168.254.108] with 32 bytes of data:
Reply from 192.168.254.108: bytes=32 time<1ms TTL=128
Reply from 192.168.254.108: bytes=32 time<1ms TTL=128
Reply from 192.168.254.108: bytes=32 time<1ms TTL=128
Reply from 192.168.254.108: bytes=32 time<1ms TTL=128
Ping statistics for 192.168.254.108:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

Learning Task 9:

HANDS ON ACTIVITY
CSS 10

Name:_________________________Section: _______________Date: __________

Topic: IP Address Configuration


Materials Needed: Personal Computer/Laptop, Internet, Pen, Activity Sheet
General Direction: Do What is asked.

Things to do:

I. Assigning IP Address
□ Static IP Address
□ Dynamic IP Address
II. IP Configuration using Command Prompt
□ Access command prompt
□ Use ipconfig
Based on the data shown, what is the:
Subnet Mask ____________________
Default Gateway____________________
Device’s IP Address ____________________
III. Ping
□ Ping Network Device
Based on the data shown, fill out the following:
Ping statistics for ______________________:
Packets: Sent = _____, Received = _____, Lost = _____
< _____ loss>,
Approximate round trip in milli-seconds:
Minimum = ______, Maximum = _____, Average = ____
□ Ping Network Device until forced to stop
Based on the data shown, fill out the following:
Ping statistics for ______________________:
Packets: Sent = _____, Received = _____, Lost = _____
< _____ loss>,
Approximate round trip in milli-seconds:
Minimum = ______, Maximum = ______, Average = ____
□ Ping Network Device with desired number of Echo Request
Based on the data shown, fill out the following:
Ping statistics for ______________________:
Packets: Sent = _____, Received = _____, Lost = _____
< _____ loss>,
Approximate round trip in milli-seconds:
Minimum = ______, Maximum = ______, Average = ____
□ Resolve device IP Address to local host name
Based on the data shown, what is your device local host name?
______________________
□ Ping Network Device with desired byte size; bite size: _____
□ Ping the following website and write the resolve IP Address:
FACEBOOK.COM ______________________
YAHOO.COM ______________________
TECHOPEDIA.COM ______________________
QUIPPER.COM ______________________
COMPUTERHOPE.COM ______________________
□ Show the Ping command’s several options
Based on the data shown, list at least 5 options for ping
command
1. ______________________
2. ______________________
3. ______________________
4. ______________________
5. ______________________
…………………………………………………………………………………………………
…………
Criteria for
performance: Exemplary Accomplished Developing Beginning

Proper configuration 35 32 30 28
Adherence to the
30 27 25 23
procedure
Quality of the work 20 17 15 13
Comprehension 15 12 10 8
Total
WEEK
Networking Hardware Requirements
3 I
Lesson

This lesson focuses on familiarizing oneself with the hardware requirements in


networking. This will further explain the different types of network distributors or devices.
You are expected to be differentiate the network devices according to their functions and
features.

Learning Task 1. Have you ever been in a computer shop or internet shop? Or had a
document typed and printed in the shop? Do you ever observe or even notice “things”
inside a computer shop aside from tables and chairs?
Let’s see how well you know “things” inside a computer shop by identifying the
following. Write your answers in your notebook.

D
Learning Task 2. Answer the following questions. Choose the letter of the best answer.
Write your answer in your notebook.

1. Which is the common connection or central point of devices in a network?


a. Laser Printer c. Table Computer
b. Network Device d. Wireless Keyboard
2. Which network device that boosts a network’s signal as it passes through?
a. Bridge b. Modem c. Repeater d. Router
3. Which network device that filters and forwards data within a network?
a. Hub b. Modem c. Repeater d. Switch
4. Which network device basically use to transfer data?
a. Hub b. Modem c. Router d. Switch
5. Which network device that receives, analyzes, moves, and routes packets to its
destination?
a. Hub b. Modem c. Router d. Switch
6. Which connects two local-area networks (LANs), or two segments of the same
LAN?
a. Bridge b. Modem c. Repeater d. Switch
7. Which network device that allows you to connect to the internet?
a. Modem b. Repeater c. Router d. Switch
8. Which of the following is a type of router that acts as an entry point into the core of
the network?
a. Brouter c. Edge Router
b. Core Router d. Wireless Router
9. Which of the following is a type of router that forwards packets to computer hosts
within a network but not between networks?
a. Brouter c. Edge Router
b. Core Router d. Wireless Router
10. Which of the following is a type of router that enables users to connect to a network
or internet without using network cables?
a. Brouter c. Edge Router
b.Core Router d. Wireless Router

Basic Networking Hardware Requirements

1. Computers/Laptop
2. Computer Accessories and Peripherals
A. Keyboard
B. Mouse
C. Monitors
D. Printers
3. Network cables/Patch cables
4. Network distributors/devices
A. Hub
B. Switch
C. Routers (wired or wireless)
D. Wired Network Cards (Internal or External)
E. Wireless Network Card
F. Modem
G. Bridge
H. Repeater

Learning Task 3. Then following are computer accessories and peripherals. Identify
them whether they are an INPUT DEVICE or OUTPUT DEVICE. Write your answer in
your notebook.

1. Keyboard ___________________
2. LCD monitor ___________________
3. Light pen ___________________
4. Microphone ___________________
5. Mouse ___________________
6. Projector ___________________
7. Scanner ___________________
8. Speaker ___________________
Network Distributors/ Network Devices

To make data transmission more extensible and efficient than a simple peer-to-
peer network, network designers use specialized network devices such as hubs,
switches, routers, and wireless access points to send data between devices. These are
known as Network Distributor or Network Devices. They are the common connection or
the central point of devices in a network

Network Hub

Illustration 1
In Network Hub, the data is transferred in terms of packets on a computer network.
So when a host sends a data packet to a network hub, the hub copies the data packet to
all of its ports. Like this, all the ports know about the data and the port for whom the packet
is intended, claims the packet. However, because of its working mechanism, a hub is not
so secure and safe. Moreover, copying the data packets on all the interfaces or
ports makes it slower and more congested which led to the use of network switch.

Network Switch

Illustration 2

When a packet is received at one of the interfaces of the Network Switch, it filters
the packet and sends only to the interface of the intended receiver. For this purpose, a
switch also maintains a CAM (Content Addressable Memory) table and has its own
system configuration and memory. CAM table is also called as forwarding table or
forwarding information base (FIB).

Routers

Illustration 3
Router is responsible for routing traffic from one to another network. It is designed
to receive, analyze, and move incoming packets to another network and connects your
all your computers to one another.

Notes:
• Throughput is the speed at which a router can transfer data. The common
standard used wireless router is 802.11g (wireless G) and 802.11n
(wireless N)
• Two types of ports present in routers LAN ports and WAN port

Types of Router

a. Bridge Router/BRouter
A bridge router or brouter is a network device that works as a bridge and as
a router. The brouter routes packets for known protocols and simply forwards
all other packets as a bridge would. Brouters operate at both the network layer
for routable protocols and at the data link layer for non-routable protocols

b. Core Router
A core router is a router designed to operate in the Internet backbone, or
core. To fulfill this role, a router must be able to support multiple
telecommunications interfaces of the highest speed in use in the core Internet
and must be able to forward IP packets at full speed on all of them. It forwards
packets to computer hosts within a network but not between networks.

c. Edge Router
An edge router is a specialized router residing at the edge or boundary of a
network. This router ensures the connectivity of its network with external
networks, a wide area network or the Internet. An edge router uses an External
Border Gateway Protocol, which is used extensively over the Internet to provide
connectivity with remote networks and acts as an entry point into the core of the
network

d. Virtual Router
A Virtual Router, or vRouter, is a software function that replicates in
software the functionality of a hardware-based Layer 3 Internet Protocol
(IP) routing, which has traditionally used a dedicated hardware device. It serves
as a back up router when the main router fails.

e. Wireless Router
A wireless router connects directly to a modem by a cable. This allows it to
receive information from — and transmit information to — the internet.
The router then creates and communicates with your home Wi-Fi network using
built-in antennas. As a result, all the devices on your home network have internet
access.
MODEM

Illustration 4

MODEM stands for Modulator + Demodulator. It modulates and demodulates the


signal between the digital data of a computer and the analogue signal of a telephone line
The first Modem, known as the Dataphone, was released by AT&T in 1960. Dial-
up Modems were commonly used by computers to connect to the Internet through the
early 2000's, until Broadband Internet started to be more widely available.
It is considered an input and output device because it sends data (upload / output)
and receives data (download / input)

Bridge

Illustration 5

Bridge is device that connects two local-area networks (LANs), or two segments
of the same LAN. Unlike a router, bridges are protocol -independent. They
forward packets without analyzing and re-routing messages. The bridge manages the
traffic to maintain optimum performance on both sides of the network.

Repeater

Illustration 6
Repeater is a device that boosts a network’s signal as it passes through. It
receives a signal and retransmits it at a higher level or higher power so that the signal
can cover longer distances.

E
Learning Task 4. In your own understanding and words, give at least 3 characteristics of
the following network devices. Write your answer in your notebook.

MODEM ROUTER HUB BRIDGE REPEATER SWITCH

Learning Task 5. Find 10 words related to the basic requirements of network. Write your
answer in your notebook.

Q W E B R I D G E R T Y U I M
P A S D F G H H J K L Q Z X O
C M V B N D G E H A D H F C U
F O M N B V C X Z S D G H J S
E D F G R H R E P E A T E R E
K E Y B O A R D F G E A C S G
L M K H F D S G E D G S O W D
D E G M D G D E D S W Q R M B
Z X C O D G C R E T H V E M B
S P O N I Y R O W R T F R R R
D F G I H R F U D E F F O D A
S W I T C H R T V B D T U Y W
Q D F O D G D E D A D S T A S
D G E R U O U R T Y E R E M S
A S D F G C O M P U T E R Q Z
A
Learning Task 6. Read and answer the following questions. Write the letter of the
correction answer in your notebook.

1. Which is NOT a Networking Hardware Requirement?


Computer Computer
A. B. C. Network Device D. Patched Cable
Peripherals Table
2. Which refers to Common connection or the central point of devices in a
network
Computer
A. Computer B. C. Network Device D. Patched Cable
Peripherals
3. Why Hub is NOT safe and secure as a network distributor? IT
A. copies the data packet to all its ports
B. does filtering and forwarding of packets
C. routes and reroutes traffic from one network to another
D. sends packets to the intended receiver
4. Which BEST describe an Edge Router?
A. act as back up router
B. connects hosts to network wirelessly
C. forwards packets to computer hosts within a network
D. it inspects, allows, or denies packet data to enter a network
5. Which DOES NOT refers to a MODEM?
A. Both an input and output device
B. Connects to the internet
C. Holds devices in the network together
D. It modulates and demodulates
6. Which of the following network device should you use if patch cables is not
available?
A. Hub
B. Repeater
C. Switch
D. Wireless router
7. You are setting up a network covering 2 classrooms. Each classroom has their
own LAN network. Which network device should you use to connect the two
LANs?
A. Bridge
B. MODEM
C. Repeater
D. Switch
8. The classroom of Grade 10 Lovelace is at the end of the grade 10 building which
is about 4 classrooms far from the computer laboratory. Wi-Fi signal won’t reach
the said classroom. Which of the following network device should you install to
extend and boost the signal?
A. Bridge
B. MODEM
C. Repeater
D. Switch
9. You are setting up a Local Area Network of 8 computers using patch cable in a
small room. Which network device would best to fit the common connection?
A. Bridge
B. Hub
C. Repeater
D. Switch
10. Which of the following is designed to receive, analyze, and move incoming
packets to another network?
A. Hub
B. Repeater
C. Switch
D. Router
References

CHS LM pp 98-111
CHS 10 LM pp. 217-222
https://www.youtube.com/watch?v=zyL1Fud1Z1c
https://youtu.be/Cj7PKD1uBFo

https://en.wikipedia.org/wiki/MAC_address
https://www.google.com/url?sa=i&url=https%3A%2F%2Fptop.only.wip.la%3A443%2Fhttps%2Fmypromo.my%2Flazada-
shopee-bank-
promo%2F&psig=AOvVaw28vIbsCYUaabhS6oVu25cn&ust=1594523987721000&
source=images&cd=vfe&ved=0CAIQjRxqFwoTCMi1__CexOoCFQAAAAAdAAAAA
BAJ
https://www.lifewire.com/command-prompt-2625840
https://www.examcollection.com/certification-training/network-plus-how-do-
common-networking-protocols-function.html
http://www.tcpipguide.com/free/t_IPFunctions.htm
https://www.pcmag.com/encyclopedia/term/57812/loopback-address
https://fossbytes.com/localhosts-ip-address-127-0-0-1-meaning/
https://www.techopedia.com/definition/2440/loopback-address
https://searchnetworking.techtarget.com/definition/multicast
https://www.techopedia.com/definition/2384/broadcast-address
https://www.oreilly.com/library/view/windows-nt-tcpip/1565923774/ch01s02.html
https://www.computerhope.com/jargon/e/encapsul.htm
https://www.javatpoint.com/computer-network-tcp-ip-model
https://bytescout.com/blog/windows-command-prompt-commands.html#9
https://www.digitalcitizen.life/command-prompt-how-use-basic-commands
https://www.webopedia.com/TERM/S/syntax.html
https://www.computerhope.com/jargon/t/traffic.htm
https://webhostinggeeks.com/blog/what-is-server-load/
http://www.function.com/networking/Lesson02.htm
https://fossbytes.com/networking-devices-and-hardware-types/
https://www.computerhope.com/jargon/r/router.htm
https://www.computerhope.com/jargon/e/edge-device.htm
https://www.computerhope.com/jargon/b/bridge.htm
https://www.computerhope.com/jargon/m/modem.htm
https://techbuzzersworld.wordpress.com/2011/08/10/types-of-networks-and-
networking-devices/
http://whatis.techtarget.com/definition/content-addressed-memory-CAM
Para sa mga katanungan o puna, sumulat o tumawag sa:

Department of Education│ Region 4A │ SDO Calamba City Office

Address: DepEd Bldg., City Hall Compound, Brgy. Real, Calamba City

Landline: 049-554 9830 local 14

Email Address: [email protected]

You might also like